!18 【Mainline】fix spelling mistakes

From: @yixiangzhike 
Reviewed-by: @HuaxinLuGitee 
Signed-off-by: @HuaxinLuGitee
This commit is contained in:
openeuler-ci-bot 2022-10-18 09:37:07 +00:00 committed by Gitee
commit b65df92f7b
No known key found for this signature in database
GPG Key ID: 173E9B9CA92EEF8F
2 changed files with 56 additions and 2 deletions

View File

@ -1,10 +1,13 @@
Name: argon2
Version: 20190702
Release: 2
Release: 3
Summary: A password-hashing tool
License: Public Domain or ASL 2.0
URL: https://github.com/P-H-C/phc-winner-argon2
Source0: https://github.com/P-H-C/phc-winner-argon2/archive/62358ba2123abd17fccf2a108a301d4b52c01a7c/phc-winner-argon2-20190702-62358ba.tar.gz
Patch1: backport-fix-3-spelling-mistakes.patch
BuildRequires: gcc
Requires: libargon2%{?_isa} = %{version}-%{release}
@ -50,7 +53,7 @@ This package contains dynamic library for argon2
%package_help
%prep
%setup -qn phc-winner-argon2-62358ba2123abd17fccf2a108a301d4b52c01a7c
%autosetup -n phc-winner-argon2-62358ba2123abd17fccf2a108a301d4b52c01a7c -p1
if ! grep -q 'ABI_VERSION = 1' Makefile; then
: soname have changed
@ -112,6 +115,9 @@ make test
%{_mandir}/man1/*
%changelog
* Tue Oct 18 2022 yixiangzhike <yixiangzhike007@163.com> - 20190702-3
- fix spelling mistakes
* Tue Apr 12 2022 yixiangzhike <yixiangzhike007@163.com> - 20190702-2
- delete the old version .so file

View File

@ -0,0 +1,48 @@
From c985330b0120a2414c1480eac1f169ac6bf7d926 Mon Sep 17 00:00:00 2001
From: Bastian Bittorf <bb@npl.de>
Date: Fri, 25 Jun 2021 10:14:58 +0200
Subject: [PATCH] fix 3 spelling mistakes
---
README.md | 4 ++--
libargon2.pc.in | 2 +-
2 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/README.md b/README.md
index d936e33..91fc3fd 100644
--- a/README.md
+++ b/README.md
@@ -105,7 +105,7 @@ There are many additional parameters, but we will highlight three of them here.
https://en.wikipedia.org/wiki/Hash-based_message_authentication_code).
This allows a secret key to be input at hashing time (from some external
location) and be folded into the value of the hash. This means that even if
- your salts and hashes are compromized, an attacker cannot brute-force to find
+ your salts and hashes are compromised, an attacker cannot brute-force to find
the password without the key.
2. The `ad` parameter, which is used to fold any additional data into the hash
@@ -116,7 +116,7 @@ There are many additional parameters, but we will highlight three of them here.
key only usable at hashing time. The `ad` is for any other data.
3. The `flags` parameter, which determines which memory should be securely
- erased. This is useful if you want to securly delete the `pwd` or `secret`
+ erased. This is useful if you want to securely delete the `pwd` or `secret`
fields right after they are used. To do this set `flags` to either
`ARGON2_FLAG_CLEAR_PASSWORD` or `ARGON2_FLAG_CLEAR_SECRET`. To change how
internal memory is cleared, change the global flag
diff --git a/libargon2.pc.in b/libargon2.pc.in
index 7185324..a0d2929 100644
--- a/libargon2.pc.in
+++ b/libargon2.pc.in
@@ -3,7 +3,7 @@
## - replace @UPSTREAM_VER@ with current version, e.g. '20160406'
## - replace @HOST_MULTIARCH@ with target arch lib, e.g. 'lib', 'lib/x86_64-linux-gnu' or 'lib64'
## - replace @PREFIX@ with install path, e.g. '/usr', '/usr/local', '/usr/pkg'
-## - replace @INCLUDE@ with incluse path, e.g. 'include' or 'include/argon2'
+## - replace @INCLUDE@ with include path, e.g. 'include' or 'include/argon2'
prefix=@PREFIX@
exec_prefix=${prefix}
--
2.27.0