[SCM] Debian packaging of libnet-ssleay-perl branch, master, updated. debian/1.45-2-9-g946a207
Salvatore Bonaccorso
carnil at debian.org
Tue Apr 3 05:41:26 UTC 2012
The following commit has been merged in the master branch:
commit 1a60691da3b53800284ea6245c3582bafafc6e0d
Author: Salvatore Bonaccorso <carnil at debian.org>
Date: Tue Apr 3 07:26:13 2012 +0200
Refresh fix_spelling.patch patch
Refresh for offsets and remove some hunks which don't apply anymore.
Add some more spelling fixes reported by lintian.
diff --git a/debian/patches/fix_spelling.patch b/debian/patches/fix_spelling.patch
index d301857..0cbf06c 100644
--- a/debian/patches/fix_spelling.patch
+++ b/debian/patches/fix_spelling.patch
@@ -2,61 +2,80 @@ Description: Fix spelling errors found by lintian.
Origin: vendor
Forwarded: no
Author: Alessandro Ghedini <al3xbio at gmail.com>
-Last-Update: 2012-02-24
+Reviewed-by: Salvatore Bonaccorso <carnil at debian.org>
+Last-Update: 2012-04-03
--- a/lib/Net/SSLeay.pod
+++ b/lib/Net/SSLeay.pod
@@ -488,7 +488,7 @@
- of such a module in the main thread before calling C<< threads->new(..) >> or
+ of such a module in the main thread before calling C<< threads->new(..) >> or
C<< threads->create(..) >> but it might differ module by module.
-To be play safe you can load and init Net::SSLeay explicitely in the main thread:
+To be play safe you can load and init Net::SSLeay explicitly in the main thread:
- use Net::SSLeay;
+ use Net::SSLeay;
use Other::SSLeay::Based::Module;
-@@ -2254,7 +2254,7 @@
+@@ -2578,7 +2578,7 @@
my $rv = Net::SSLeay::CTX_set_session_id_context($ctx, $sid_ctx, $sid_ctx_len);
- # $ctx - value coresponding to openssl's SSL_CTX structure
+ # $ctx - value corresponding to openssl's SSL_CTX structure
# $sid_ctx - data buffer
- # $sid_ctx_len - lenght of data in $sid_ctx
+ # $sid_ctx_len - length of data in $sid_ctx
#
# returns: 1 on success, 0 on failure (the error is logged to the error stack)
-@@ -2748,7 +2748,7 @@
+@@ -3072,7 +3072,7 @@
my $rv = Net::SSLeay::get_error($ssl, $ret);
- # $ssl - value coresponding to openssl's SSL structure
+ # $ssl - value corresponding to openssl's SSL structure
- # $ret - return value of preceeding TLS/SSL I/O operation
+ # $ret - return value of preceding TLS/SSL I/O operation
#
# returns: result code, which is one of the following values:
# 0 - SSL_ERROR_NONE
-@@ -3476,7 +3476,7 @@
+@@ -3798,7 +3798,7 @@
my $rv = Net::SSLeay::set_session_id_context($ssl, $sid_ctx, $sid_ctx_len);
- # $ssl - value coresponding to openssl's SSL structure
+ # $ssl - value corresponding to openssl's SSL structure
# $sid_ctx - data buffer
- # $sid_ctx_len - lenght of data in $sid_ctx
+ # $sid_ctx_len - length of data in $sid_ctx
#
# returns: 1 on success, 0 on failure
-@@ -4107,7 +4107,7 @@
+@@ -4566,7 +4566,7 @@
B<BEWARE:> It is platform dependent how this function will handle dates after 2038.
- Although perl's integer is large enough the internal implementation of this function
+ Although perl's integer is large enough the internal implementation of this function
-is dependant on the size of time_t structure (32bit time_t has problem with 2038).
+is dependent on the size of time_t structure (32bit time_t has problem with 2038).
If you want to safely set date and time after 2038 use function L</P_ASN1_TIME_set_isotime>.
-@@ -4698,7 +4698,7 @@
+@@ -4995,7 +4995,7 @@
#
- # returns: value coresponding to openssl's ASN1_TIME structure (0 on failure)
+ # returns: value corresponding to openssl's ASN1_TIME structure (0 on failure)
--L<BEWARE:> this function may fail for dates after 2038 as it is dependant on time_t size on your
-+L<BEWARE:> this function may fail for dates after 2038 as it is dependent on time_t size on your
+-B<BEWARE:> this function may fail for dates after 2038 as it is dependant on time_t size on your
++B<BEWARE:> this function may fail for dates after 2038 as it is dependent on time_t size on your
system (32bit time_t does not work after 2038). Consider using L</P_ASN1_TIME_set_isotime> instead).
-
+
=item * X509_load_cert_crl_file
+@@ -7059,7 +7059,7 @@
+
+ while (1) {
+ my $ssl = Net::SSLeay::new($ctx);
+- warn("server:waiting for incomming connection...\n");
++ warn("server:waiting for incoming connection...\n");
+ my $fd = $sock->accept();
+ Net::SSLeay::set_fd($ssl, $fd->fileno);
+ Net::SSLeay::accept($ssl);
+@@ -7095,7 +7095,7 @@
+
+ B<NOTE:> You need CTX_set_next_proto_select_cb on B<client side> of SSL connection.
+
+-Simple usage - in this case a "common" negotiation algoritm (as implemented by openssl's function SSL_select_next_proto) is used.
++Simple usage - in this case a "common" negotiation algorithm (as implemented by openssl's function SSL_select_next_proto) is used.
+
+ $rv = Net::SSleay::CTX_set_next_proto_select_cb($ctx, $arrayref);
+ # $ctx - value corresponding to openssl's SSL_CTX structure
--
Debian packaging of libnet-ssleay-perl
More information about the Pkg-perl-cvs-commits
mailing list