Skip to content

Commit c2969ff

Browse files
Coeurmspncp
authored andcommitted
Fix Typos
CLA: trivial Reviewed-by: Richard Levitte <[email protected]> Reviewed-by: Matthias St. Pierre <[email protected]> (Merged from openssl#9288)
1 parent f663ddc commit c2969ff

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

69 files changed

+89
-89
lines changed

CHANGES

+2-2
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@
3939
EVP_KDF_CTRL_SET_PBKDF2_PKCS5_MODE.
4040
[Shane Lontis]
4141

42-
*) Default cipher lists/suites are now avaialble via a function, the
42+
*) Default cipher lists/suites are now available via a function, the
4343
#defines are deprecated.
4444
[Todd Short]
4545

@@ -462,7 +462,7 @@
462462
SSL_set_ciphersuites()
463463
[Matt Caswell]
464464

465-
*) Memory allocation failures consistenly add an error to the error
465+
*) Memory allocation failures consistently add an error to the error
466466
stack.
467467
[Rich Salz]
468468

Configurations/15-ios.conf

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
#### iPhoneOS/iOS
22
#
3-
# It takes recent enough XCode to use following two targets. It shouldn't
3+
# It takes recent enough Xcode to use following two targets. It shouldn't
44
# be a problem by now, but if they don't work, original targets below
55
# that depend on manual definition of environment variables should still
66
# work...

Configurations/50-win-onecore.conf

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Windows OneCore targets.
22
#
3-
# OneCore is new API stability "contract" that transends Desktop, IoT and
3+
# OneCore is new API stability "contract" that transcends Desktop, IoT and
44
# Mobile[?] Windows editions. It's a set up "umbrella" libraries that
55
# export subset of Win32 API that are common to all Windows 10 devices.
66
#

Configurations/common0.tmpl

+1-1
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@
2222
our @generated =
2323
sort ( ( grep { defined $unified_info{generate}->{$_} }
2424
sort keys %generatables ),
25-
# Scripts are assumed to be generated, so add thhem too
25+
# Scripts are assumed to be generated, so add them too
2626
( grep { defined $unified_info{sources}->{$_} }
2727
@{$unified_info{scripts}} ) );
2828

apps/pkcs12.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -838,7 +838,7 @@ static int alg_print(const X509_ALGOR *alg)
838838
goto done;
839839
}
840840
BIO_printf(bio_err, ", Salt length: %d, Cost(N): %ld, "
841-
"Block size(r): %ld, Paralelizm(p): %ld",
841+
"Block size(r): %ld, Parallelism(p): %ld",
842842
ASN1_STRING_length(kdf->salt),
843843
ASN1_INTEGER_get(kdf->costParameter),
844844
ASN1_INTEGER_get(kdf->blockSize),

apps/speed.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -1876,7 +1876,7 @@ int speed_main(int argc, char **argv)
18761876
}
18771877

18781878
buflen = lengths[size_num - 1];
1879-
if (buflen < 36) /* size of random vector in RSA bencmark */
1879+
if (buflen < 36) /* size of random vector in RSA benchmark */
18801880
buflen = 36;
18811881
buflen += MAX_MISALIGNMENT + 1;
18821882
loopargs[i].buf_malloc = app_malloc(buflen, "input buffer");

apps/storeutl.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ int storeutl_main(int argc, char *argv[])
125125
}
126126
/*
127127
* If expected wasn't set at this point, it means the map
128-
* isn't syncronised with the possible options leading here.
128+
* isn't synchronised with the possible options leading here.
129129
*/
130130
OPENSSL_assert(expected != 0);
131131
}

crypto/README.sparse_array

+1-1
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ The tree height is dynamically increased as needed based on additions.
4343
An empty tree is represented by a NULL root pointer. Inserting a value at
4444
index 0 results in the allocation of a top level node full of null pointers
4545
except for the single pointer to the user's data (N = SA_BLOCK_MAX for
46-
breviety):
46+
brevity):
4747

4848
+----+
4949
|Root|

crypto/aes/asm/aes-s390x.pl

+2-2
Original file line numberDiff line numberDiff line change
@@ -38,14 +38,14 @@
3838
# Implement AES_set_[en|de]crypt_key. Key schedule setup is avoided
3939
# for 128-bit keys, if hardware support is detected.
4040

41-
# Januray 2009.
41+
# January 2009.
4242
#
4343
# Add support for hardware AES192/256 and reschedule instructions to
4444
# minimize/avoid Address Generation Interlock hazard and to favour
4545
# dual-issue z10 pipeline. This gave ~25% improvement on z10 and
4646
# almost 50% on z9. The gain is smaller on z10, because being dual-
4747
# issue z10 makes it impossible to eliminate the interlock condition:
48-
# critial path is not long enough. Yet it spends ~24 cycles per byte
48+
# critical path is not long enough. Yet it spends ~24 cycles per byte
4949
# processed with 128-bit key.
5050
#
5151
# Unlike previous version hardware support detection takes place only

crypto/asn1/a_time.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ static void determine_days(struct tm *tm)
6767
}
6868
c = y / 100;
6969
y %= 100;
70-
/* Zeller's congruance */
70+
/* Zeller's congruence */
7171
tm->tm_wday = (d + (13 * m) / 5 + y + y / 4 + c / 4 + 5 * c + 6) % 7;
7272
}
7373

crypto/bio/bss_dgram.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -784,7 +784,7 @@ static long dgram_ctrl(BIO *b, int cmd, long num, void *ptr)
784784
* reasons. When BIO_CTRL_DGRAM_SET_PEEK_MODE was first defined its value
785785
* was incorrectly clashing with BIO_CTRL_DGRAM_SCTP_SET_IN_HANDSHAKE. The
786786
* value has been updated to a non-clashing value. However to preserve
787-
* binary compatiblity we now respond to both the old value and the new one
787+
* binary compatibility we now respond to both the old value and the new one
788788
*/
789789
case BIO_CTRL_DGRAM_SCTP_SET_IN_HANDSHAKE:
790790
case BIO_CTRL_DGRAM_SET_PEEK_MODE:

crypto/bn/asm/mips.pl

+1-1
Original file line numberDiff line numberDiff line change
@@ -800,7 +800,7 @@
800800
#if 0
801801
/*
802802
* The bn_div_3_words entry point is re-used for constant-time interface.
803-
* Implementation is retained as hystorical reference.
803+
* Implementation is retained as historical reference.
804804
*/
805805
.align 5
806806
.globl bn_div_3_words

crypto/bn/bn_div.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -258,7 +258,7 @@ int BN_div(BIGNUM *dv, BIGNUM *rm, const BIGNUM *num, const BIGNUM *divisor,
258258
*
259259
* - availability of constant-time bn_div_3_words;
260260
* - dividend is at least as "wide" as divisor, limb-wise, zero-padded
261-
* if so requied, which shouldn't be a privacy problem, because
261+
* if so required, which shouldn't be a privacy problem, because
262262
* divisor's length is considered public;
263263
*/
264264
int bn_div_fixed_top(BIGNUM *dv, BIGNUM *rm, const BIGNUM *num,

crypto/bn/bn_lcl.h

+1-1
Original file line numberDiff line numberDiff line change
@@ -295,7 +295,7 @@ struct bn_gencb_st {
295295
(b) > 23 ? 3 : 1)
296296

297297
/*
298-
* BN_mod_exp_mont_conttime is based on the assumption that the L1 data cache
298+
* BN_mod_exp_mont_consttime is based on the assumption that the L1 data cache
299299
* line width of the target processor is at least the following value.
300300
*/
301301
# define MOD_EXP_CTIME_MIN_CACHE_LINE_WIDTH ( 64 )

crypto/dsa/dsa_ossl.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -248,7 +248,7 @@ static int dsa_sign_setup(DSA *dsa, BN_CTX *ctx_in,
248248
* one bit longer than the modulus.
249249
*
250250
* There are some concerns about the efficacy of doing this. More
251-
* specificly refer to the discussion starting with:
251+
* specifically refer to the discussion starting with:
252252
* https://github.com/openssl/openssl/pull/7486#discussion_r228323705
253253
* The fix is to rework BN so these gymnastics aren't required.
254254
*/

crypto/ec/asm/ecp_nistz256-x86_64.pl

+1-1
Original file line numberDiff line numberDiff line change
@@ -1301,7 +1301,7 @@
13011301
13021302
################################# reduction
13031303
mulx 8*0+128(%r14), $t0, $t1
1304-
adcx $t0, $acc3 # guranteed to be zero
1304+
adcx $t0, $acc3 # guaranteed to be zero
13051305
adox $t1, $acc4
13061306
13071307
mulx 8*1+128(%r14), $t0, $t1

crypto/ec/asm/x25519-ppc64.pl

+2-2
Original file line numberDiff line numberDiff line change
@@ -451,7 +451,7 @@
451451
and $t0,$t0,$t1
452452
sldi $a3,$a3,1
453453
add $t0,$t0,$t1 # compare to modulus in the same go
454-
srdi $a3,$a3,1 # most signifcant bit cleared
454+
srdi $a3,$a3,1 # most significant bit cleared
455455
456456
addc $a0,$a0,$t0
457457
addze $a1,$a1
@@ -462,7 +462,7 @@
462462
sradi $t0,$a3,63 # most significant bit -> mask
463463
sldi $a3,$a3,1
464464
andc $t0,$t1,$t0
465-
srdi $a3,$a3,1 # most signifcant bit cleared
465+
srdi $a3,$a3,1 # most significant bit cleared
466466
467467
subi $rp,$rp,1
468468
subfc $a0,$t0,$a0

crypto/ec/ec_lcl.h

+1-1
Original file line numberDiff line numberDiff line change
@@ -154,7 +154,7 @@ struct ec_method_st {
154154
int (*field_div) (const EC_GROUP *, BIGNUM *r, const BIGNUM *a,
155155
const BIGNUM *b, BN_CTX *);
156156
/*-
157-
* 'field_inv' computes the multipicative inverse of a in the field,
157+
* 'field_inv' computes the multiplicative inverse of a in the field,
158158
* storing the result in r.
159159
*
160160
* If 'a' is zero (or equivalent), you'll get an EC_R_CANNOT_INVERT error.

crypto/ec/ecp_nistp521.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -1269,7 +1269,7 @@ static void point_add(felem x3, felem y3, felem z3,
12691269
* ffffffa51868783bf2f966b7fcc0148f709a5d03bb5c9b8899c47aebb6fb
12701270
* 71e913863f7, in that case the penultimate intermediate is -9G and
12711271
* the final digit is also -9G. Since this only happens for a single
1272-
* scalar, the timing leak is irrelevent. (Any attacker who wanted to
1272+
* scalar, the timing leak is irrelevant. (Any attacker who wanted to
12731273
* check whether a secret scalar was that exact value, can already do
12741274
* so.)
12751275
*/

crypto/ec/ecx_meth.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -532,7 +532,7 @@ static int ecd_item_sign25519(EVP_MD_CTX *ctx, const ASN1_ITEM *it, void *asn,
532532
X509_ALGOR_set0(alg1, OBJ_nid2obj(NID_ED25519), V_ASN1_UNDEF, NULL);
533533
if (alg2)
534534
X509_ALGOR_set0(alg2, OBJ_nid2obj(NID_ED25519), V_ASN1_UNDEF, NULL);
535-
/* Algorithm idetifiers set: carry on as normal */
535+
/* Algorithm identifiers set: carry on as normal */
536536
return 3;
537537
}
538538

crypto/err/openssl.txt

+1-1
Original file line numberDiff line numberDiff line change
@@ -2439,7 +2439,7 @@ EVP_R_NO_OPERATION_SET:149:no operation set
24392439
EVP_R_ONLY_ONESHOT_SUPPORTED:177:only oneshot supported
24402440
EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE:150:\
24412441
operation not supported for this keytype
2442-
EVP_R_OPERATON_NOT_INITIALIZED:151:operaton not initialized
2442+
EVP_R_OPERATON_NOT_INITIALIZED:151:operation not initialized
24432443
EVP_R_PARAMETER_TOO_LARGE:187:parameter too large
24442444
EVP_R_PARTIALLY_OVERLAPPING:162:partially overlapping buffers
24452445
EVP_R_PBKDF2_ERROR:181:pbkdf2 error

crypto/evp/evp_err.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -284,7 +284,7 @@ static const ERR_STRING_DATA EVP_str_reasons[] = {
284284
{ERR_PACK(ERR_LIB_EVP, 0, EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE),
285285
"operation not supported for this keytype"},
286286
{ERR_PACK(ERR_LIB_EVP, 0, EVP_R_OPERATON_NOT_INITIALIZED),
287-
"operaton not initialized"},
287+
"operation not initialized"},
288288
{ERR_PACK(ERR_LIB_EVP, 0, EVP_R_PARAMETER_TOO_LARGE),
289289
"parameter too large"},
290290
{ERR_PACK(ERR_LIB_EVP, 0, EVP_R_PARTIALLY_OVERLAPPING),

crypto/initthread.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -139,7 +139,7 @@ init_get_thread_local(CRYPTO_THREAD_LOCAL *local, int alloc, int keep)
139139
* destructor for threads terminating before libcrypto is initialized or
140140
* after it's de-initialized. Access to the key doesn't have to be
141141
* serialized for the said threads, because they didn't use libcrypto
142-
* and it doesn't matter if they pick "impossible" or derefernce real
142+
* and it doesn't matter if they pick "impossible" or dereference real
143143
* key value and pull NULL past initialization in the first thread that
144144
* intends to use libcrypto.
145145
*/

crypto/lhash/lhash.c

+3-3
Original file line numberDiff line numberDiff line change
@@ -19,14 +19,14 @@
1919

2020
/*
2121
* A hashing implementation that appears to be based on the linear hashing
22-
* alogrithm:
22+
* algorithm:
2323
* https://en.wikipedia.org/wiki/Linear_hashing
2424
*
2525
* Litwin, Witold (1980), "Linear hashing: A new tool for file and table
2626
* addressing", Proc. 6th Conference on Very Large Databases: 212-223
27-
* http://hackthology.com/pdfs/Litwin-1980-Linear_Hashing.pdf
27+
* https://hackthology.com/pdfs/Litwin-1980-Linear_Hashing.pdf
2828
*
29-
* From the wikipedia article "Linear hashing is used in the BDB Berkeley
29+
* From the Wikipedia article "Linear hashing is used in the BDB Berkeley
3030
* database system, which in turn is used by many software systems such as
3131
* OpenLDAP, using a C implementation derived from the CACM article and first
3232
* published on the Usenet in 1988 by Esmond Pitt."

crypto/poly1305/asm/poly1305-ppc.pl

+3-3
Original file line numberDiff line numberDiff line change
@@ -969,15 +969,15 @@
969969
addi $t1,$ctx,`48+(12^$BIG_ENDIAN)`
970970
bl __poly1305_splat
971971
972-
bl __poly1305_mul # caclulate r^2
972+
bl __poly1305_mul # calculate r^2
973973
addi $t1,$ctx,`48+(4^$BIG_ENDIAN)`
974974
bl __poly1305_splat
975975
976-
bl __poly1305_mul # caclulate r^3
976+
bl __poly1305_mul # calculate r^3
977977
addi $t1,$ctx,`48+(8^$BIG_ENDIAN)`
978978
bl __poly1305_splat
979979
980-
bl __poly1305_mul # caclulate r^4
980+
bl __poly1305_mul # calculate r^4
981981
addi $t1,$ctx,`48+(0^$BIG_ENDIAN)`
982982
bl __poly1305_splat
983983

crypto/rand/drbg_lib.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -546,7 +546,7 @@ int RAND_DRBG_instantiate(RAND_DRBG *drbg,
546546
/*
547547
* NIST SP800-90Ar1 section 9.1 says you can combine getting the entropy
548548
* and nonce in 1 call by increasing the entropy with 50% and increasing
549-
* the minimum length to accomadate the length of the nonce.
549+
* the minimum length to accommodate the length of the nonce.
550550
* We do this in case a nonce is require and get_nonce is NULL.
551551
*/
552552
if (drbg->min_noncelen > 0 && drbg->get_nonce == NULL) {

crypto/rand/rand_lib.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -292,7 +292,7 @@ void rand_cleanup_int(void)
292292

293293
/* TODO(3.0): Do we need to handle this somehow in the FIPS module? */
294294
/*
295-
* RAND_close_seed_files() ensures that any seed file decriptors are
295+
* RAND_close_seed_files() ensures that any seed file descriptors are
296296
* closed after use.
297297
*/
298298
void RAND_keep_random_devices_open(int keep)

crypto/rsa/rsa_gen.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -256,7 +256,7 @@ static int rsa_builtin_keygen(RSA *rsa, int bits, int primes, BIGNUM *e_value,
256256
*
257257
* This strategy has the following goals:
258258
*
259-
* 1. 1024-bit factors are effcient when using 3072 and 4096-bit key
259+
* 1. 1024-bit factors are efficient when using 3072 and 4096-bit key
260260
* 2. stay the same logic with normal 2-prime key
261261
*/
262262
bitse -= bitsr[i];

crypto/sha/asm/sha512-sparcv9.pl

+1-1
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@
2727
# over 2x than 32-bit code. X[16] resides on stack, but access to it
2828
# is scheduled for L2 latency and staged through 32 least significant
2929
# bits of %l0-%l7. The latter is done to achieve 32-/64-bit ABI
30-
# duality. Nevetheless it's ~40% faster than SHA256, which is pretty
30+
# duality. Nevertheless it's ~40% faster than SHA256, which is pretty
3131
# good [optimal coefficient is 50%].
3232
#
3333
# SHA512 on UltraSPARC T1.

crypto/sm2/sm2_sign.c

+2-2
Original file line numberDiff line numberDiff line change
@@ -313,12 +313,12 @@ static int sm2_sig_verify(const EC_KEY *key, const ECDSA_SIG *sig,
313313

314314
/*
315315
* B1: verify whether r' in [1,n-1], verification failed if not
316-
* B2: vefify whether s' in [1,n-1], verification failed if not
316+
* B2: verify whether s' in [1,n-1], verification failed if not
317317
* B3: set M'~=ZA || M'
318318
* B4: calculate e'=Hv(M'~)
319319
* B5: calculate t = (r' + s') modn, verification failed if t=0
320320
* B6: calculate the point (x1', y1')=[s']G + [t]PA
321-
* B7: calculate R=(e'+x1') modn, verfication pass if yes, otherwise failed
321+
* B7: calculate R=(e'+x1') modn, verification pass if yes, otherwise failed
322322
*/
323323

324324
ECDSA_SIG_get0(sig, &r, &s);

crypto/sparse_array.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@
1313
#include "internal/sparse_array.h"
1414

1515
/*
16-
* How many bits are used to index each level in the tree structre?
16+
* How many bits are used to index each level in the tree structure?
1717
* This setting determines the number of pointers stored in each node of the
1818
* tree used to represent the sparse array. Having more pointers reduces the
1919
* depth of the tree but potentially wastes more memory. That is, this is a

crypto/store/loader_file.c

+2-2
Original file line numberDiff line numberDiff line change
@@ -172,7 +172,7 @@ typedef OSSL_STORE_INFO *(*file_try_decode_fn)(const char *pem_name,
172172
typedef int (*file_eof_fn)(void *handler_ctx);
173173
/*
174174
* The destroy_ctx function is used to destroy the handler_ctx that was
175-
* intiated by a repeatable try_decode fuction. This is only used when
175+
* initiated by a repeatable try_decode function. This is only used when
176176
* the handler is marked repeatable.
177177
*/
178178
typedef void (*file_destroy_ctx_fn)(void **handler_ctx);
@@ -470,7 +470,7 @@ static FILE_HANDLER PrivateKey_handler = {
470470
};
471471

472472
/*
473-
* Public key decoder. Only supports SubjectPublicKeyInfo formated keys.
473+
* Public key decoder. Only supports SubjectPublicKeyInfo formatted keys.
474474
*/
475475
static OSSL_STORE_INFO *try_decode_PUBKEY(const char *pem_name,
476476
const char *pem_header,

demos/bio/descrip.mms

+1-1
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ server-arg.exe : server-arg.obj
3737
server-cmod.exe : server-cmod.obj
3838
server-conf.exe : server-conf.obj
3939

40-
# Stoopid MMS doesn't infer this automatically...
40+
# MMS doesn't infer this automatically...
4141
client-arg.obj : client-arg.c
4242
client-conf.obj : client-conf.c
4343
saccept.obj : saccept.c

demos/evp/aesgcm.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ void aes_gcm_decrypt(void)
8484
EVP_CIPHER_CTX *ctx;
8585
int outlen, tmplen, rv;
8686
unsigned char outbuf[1024];
87-
printf("AES GCM Derypt:\n");
87+
printf("AES GCM Decrypt:\n");
8888
printf("Ciphertext:\n");
8989
BIO_dump_fp(stdout, gcm_ct, sizeof(gcm_ct));
9090
ctx = EVP_CIPHER_CTX_new();

doc/internal/man3/openssl_ctx_get_data.pod

+1-1
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ as a C<CRYPTO_EX_DATA>, which allows data from diverse parts of the
2929
library to be added and removed dynamically.
3030
Each such data item must have a corresponding CRYPTO_EX_DATA index
3131
associated with it. Unlike normal CRYPTO_EX_DATA objects we use static indexes
32-
to identify data items. These are mapped transparetnly to CRYPTO_EX_DATA dynamic
32+
to identify data items. These are mapped transparently to CRYPTO_EX_DATA dynamic
3333
indexes internally to the implementation.
3434
See the example further down to see how that's done.
3535

doc/internal/man3/ossl_method_construct.pod

+1-1
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,7 @@ must be incremented, using ossl_provider_upref().
135135

136136
This function is expected to set the method's reference count to 1.
137137

138-
=item desctruct()
138+
=item destruct()
139139

140140
Decrement the I<method>'s reference count, and destruct it when
141141
the reference count reaches zero.

doc/internal/man3/ossl_provider_new.pod

+1-1
Original file line numberDiff line numberDiff line change
@@ -141,7 +141,7 @@ function will get called.
141141

142142
=item *
143143

144-
If no intialization function was given with ossl_provider_new(), a
144+
If no initialization function was given with ossl_provider_new(), a
145145
loadable module with the I<name> that was given to ossl_provider_new()
146146
will be located and loaded, then the symbol B<OSSL_provider_init> will
147147
be located in that module, and called.

doc/man1/mac.pod

+1-1
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ To see the list of supported digests, use the command I<list -digest-commands>.
7676

7777
=item B<cipher:string>
7878

79-
Used by CMAC and GMAC to specifiy the cipher algorithm.
79+
Used by CMAC and GMAC to specify the cipher algorithm.
8080
For CMAC it must be one of AES-128-CBC, AES-192-CBC, AES-256-CBC or
8181
DES-EDE3-CBC.
8282
For GMAC it should be a GCM mode cipher e.g. AES-128-GCM.

0 commit comments

Comments
 (0)