Skip to content

Commit a916a06

Browse files
committed
schemas: fix various typos
Some of these came up downstream, bitcoin-core/secp256k1#1686.
1 parent 4109e5e commit a916a06

File tree

89 files changed

+222
-222
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

89 files changed

+222
-222
lines changed

testvectors_v1/aead_aes_siv_cmac_test.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@
2121
},
2222
"Pseudorandom" : {
2323
"bugType" : "FUNCTIONALITY",
24-
"description" : "The test vector contains pseudorandomly generated inputs. The goal of the test vector is to check the correctness of the implementation for various sizes of the input parameters. Because of the S2V constrution it is possible to use IVs longer than a block size."
24+
"description" : "The test vector contains pseudorandomly generated inputs. The goal of the test vector is to check the correctness of the implementation for various sizes of the input parameters. Because of the S2V construction it is possible to use IVs longer than a block size."
2525
}
2626
},
2727
"testGroups" : [

testvectors_v1/aes_wrap_test.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@
99
"notes" : {
1010
"CounterOverflow" : {
1111
"bugType" : "FUNCTIONALITY",
12-
"description" : "The test vector contains a value that is long enough so that the round counter becames larger than 256."
12+
"description" : "The test vector contains a value that is long enough so that the round counter becomes larger than 256."
1313
},
1414
"EmptyKey" : {
1515
"bugType" : "AUTH_BYPASS",

testvectors_v1/aria_wrap_test.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@
99
"notes" : {
1010
"CounterOverflow" : {
1111
"bugType" : "FUNCTIONALITY",
12-
"description" : "The test vector contains a value that is long enough so that the round counter becames larger than 256."
12+
"description" : "The test vector contains a value that is long enough so that the round counter becomes larger than 256."
1313
},
1414
"EmptyKey" : {
1515
"bugType" : "AUTH_BYPASS",

testvectors_v1/camellia_wrap_test.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@
99
"notes" : {
1010
"CounterOverflow" : {
1111
"bugType" : "FUNCTIONALITY",
12-
"description" : "The test vector contains a value that is long enough so that the round counter becames larger than 256."
12+
"description" : "The test vector contains a value that is long enough so that the round counter becomes larger than 256."
1313
},
1414
"EmptyKey" : {
1515
"bugType" : "AUTH_BYPASS",

testvectors_v1/dsa_2048_224_sha224_p1363_test.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
"notes" : {
99
"ArithmeticError" : {
1010
"bugType" : "EDGE_CASE",
11-
"description" : "Some implementations of ECDSA have arithmetic errors that occur when intermediate results have extreme values. This test vector has been constructed to test such occurences."
11+
"description" : "Some implementations of ECDSA have arithmetic errors that occur when intermediate results have extreme values. This test vector has been constructed to test such occurrences."
1212
},
1313
"IntegerOverflow" : {
1414
"bugType" : "CAN_OF_WORMS",
@@ -18,7 +18,7 @@
1818
"InvalidSignature" : {
1919
"bugType" : "AUTH_BYPASS",
2020
"description" : "The signature contains special case values such as r=1 and s=0. Buggy implementations may accept such values, if the implementation does not check boundaries and computes s^(-1) == 0.",
21-
"effect" : "Accepting such signatures can have the effect that an adversary can forge signatures without even knowning the message to sign.",
21+
"effect" : "Accepting such signatures can have the effect that an adversary can forge signatures without even knowing the message to sign.",
2222
"cves" : [
2323
"CVE-2022-21449",
2424
"CVE-2021-43572",

testvectors_v1/dsa_2048_224_sha224_test.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
"notes" : {
88
"ArithmeticError" : {
99
"bugType" : "EDGE_CASE",
10-
"description" : "Some implementations of ECDSA have arithmetic errors that occur when intermediate results have extreme values. This test vector has been constructed to test such occurences."
10+
"description" : "Some implementations of ECDSA have arithmetic errors that occur when intermediate results have extreme values. This test vector has been constructed to test such occurrences."
1111
},
1212
"BerEncodedSignature" : {
1313
"bugType" : "BER_ENCODING",
@@ -33,7 +33,7 @@
3333
"InvalidSignature" : {
3434
"bugType" : "AUTH_BYPASS",
3535
"description" : "The signature contains special case values such as r=1 and s=0. Buggy implementations may accept such values, if the implementation does not check boundaries and computes s^(-1) == 0.",
36-
"effect" : "Accepting such signatures can have the effect that an adversary can forge signatures without even knowning the message to sign.",
36+
"effect" : "Accepting such signatures can have the effect that an adversary can forge signatures without even knowing the message to sign.",
3737
"cves" : [
3838
"CVE-2022-21449",
3939
"CVE-2021-43572",
@@ -43,7 +43,7 @@
4343
"InvalidTypesInSignature" : {
4444
"bugType" : "AUTH_BYPASS",
4545
"description" : "The signature contains invalid types. Dynamic typed languages sometime coerce such values of different types into integers. If an implementation is careless and has additional bugs, such as not checking integer boundaries then it may be possible that such signatures are accepted.",
46-
"effect" : "Accepting such signatures can have the effect that an adversary can forge signatures without even knowning the message to sign.",
46+
"effect" : "Accepting such signatures can have the effect that an adversary can forge signatures without even knowing the message to sign.",
4747
"cves" : [
4848
"CVE-2022-21449",
4949
"CVE-2022-24884"

testvectors_v1/dsa_2048_224_sha256_p1363_test.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
"notes" : {
99
"ArithmeticError" : {
1010
"bugType" : "EDGE_CASE",
11-
"description" : "Some implementations of ECDSA have arithmetic errors that occur when intermediate results have extreme values. This test vector has been constructed to test such occurences."
11+
"description" : "Some implementations of ECDSA have arithmetic errors that occur when intermediate results have extreme values. This test vector has been constructed to test such occurrences."
1212
},
1313
"IntegerOverflow" : {
1414
"bugType" : "CAN_OF_WORMS",
@@ -18,7 +18,7 @@
1818
"InvalidSignature" : {
1919
"bugType" : "AUTH_BYPASS",
2020
"description" : "The signature contains special case values such as r=1 and s=0. Buggy implementations may accept such values, if the implementation does not check boundaries and computes s^(-1) == 0.",
21-
"effect" : "Accepting such signatures can have the effect that an adversary can forge signatures without even knowning the message to sign.",
21+
"effect" : "Accepting such signatures can have the effect that an adversary can forge signatures without even knowing the message to sign.",
2222
"cves" : [
2323
"CVE-2022-21449",
2424
"CVE-2021-43572",

testvectors_v1/dsa_2048_224_sha256_test.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
"notes" : {
88
"ArithmeticError" : {
99
"bugType" : "EDGE_CASE",
10-
"description" : "Some implementations of ECDSA have arithmetic errors that occur when intermediate results have extreme values. This test vector has been constructed to test such occurences."
10+
"description" : "Some implementations of ECDSA have arithmetic errors that occur when intermediate results have extreme values. This test vector has been constructed to test such occurrences."
1111
},
1212
"BerEncodedSignature" : {
1313
"bugType" : "BER_ENCODING",
@@ -33,7 +33,7 @@
3333
"InvalidSignature" : {
3434
"bugType" : "AUTH_BYPASS",
3535
"description" : "The signature contains special case values such as r=1 and s=0. Buggy implementations may accept such values, if the implementation does not check boundaries and computes s^(-1) == 0.",
36-
"effect" : "Accepting such signatures can have the effect that an adversary can forge signatures without even knowning the message to sign.",
36+
"effect" : "Accepting such signatures can have the effect that an adversary can forge signatures without even knowing the message to sign.",
3737
"cves" : [
3838
"CVE-2022-21449",
3939
"CVE-2021-43572",
@@ -43,7 +43,7 @@
4343
"InvalidTypesInSignature" : {
4444
"bugType" : "AUTH_BYPASS",
4545
"description" : "The signature contains invalid types. Dynamic typed languages sometime coerce such values of different types into integers. If an implementation is careless and has additional bugs, such as not checking integer boundaries then it may be possible that such signatures are accepted.",
46-
"effect" : "Accepting such signatures can have the effect that an adversary can forge signatures without even knowning the message to sign.",
46+
"effect" : "Accepting such signatures can have the effect that an adversary can forge signatures without even knowing the message to sign.",
4747
"cves" : [
4848
"CVE-2022-21449",
4949
"CVE-2022-24884"

testvectors_v1/dsa_2048_256_sha256_p1363_test.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
"notes" : {
99
"ArithmeticError" : {
1010
"bugType" : "EDGE_CASE",
11-
"description" : "Some implementations of ECDSA have arithmetic errors that occur when intermediate results have extreme values. This test vector has been constructed to test such occurences."
11+
"description" : "Some implementations of ECDSA have arithmetic errors that occur when intermediate results have extreme values. This test vector has been constructed to test such occurrences."
1212
},
1313
"IntegerOverflow" : {
1414
"bugType" : "CAN_OF_WORMS",
@@ -18,7 +18,7 @@
1818
"InvalidSignature" : {
1919
"bugType" : "AUTH_BYPASS",
2020
"description" : "The signature contains special case values such as r=1 and s=0. Buggy implementations may accept such values, if the implementation does not check boundaries and computes s^(-1) == 0.",
21-
"effect" : "Accepting such signatures can have the effect that an adversary can forge signatures without even knowning the message to sign.",
21+
"effect" : "Accepting such signatures can have the effect that an adversary can forge signatures without even knowing the message to sign.",
2222
"cves" : [
2323
"CVE-2022-21449",
2424
"CVE-2021-43572",

testvectors_v1/dsa_2048_256_sha256_test.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
"notes" : {
88
"ArithmeticError" : {
99
"bugType" : "EDGE_CASE",
10-
"description" : "Some implementations of ECDSA have arithmetic errors that occur when intermediate results have extreme values. This test vector has been constructed to test such occurences."
10+
"description" : "Some implementations of ECDSA have arithmetic errors that occur when intermediate results have extreme values. This test vector has been constructed to test such occurrences."
1111
},
1212
"BerEncodedSignature" : {
1313
"bugType" : "BER_ENCODING",
@@ -33,7 +33,7 @@
3333
"InvalidSignature" : {
3434
"bugType" : "AUTH_BYPASS",
3535
"description" : "The signature contains special case values such as r=1 and s=0. Buggy implementations may accept such values, if the implementation does not check boundaries and computes s^(-1) == 0.",
36-
"effect" : "Accepting such signatures can have the effect that an adversary can forge signatures without even knowning the message to sign.",
36+
"effect" : "Accepting such signatures can have the effect that an adversary can forge signatures without even knowing the message to sign.",
3737
"cves" : [
3838
"CVE-2022-21449",
3939
"CVE-2021-43572",
@@ -43,7 +43,7 @@
4343
"InvalidTypesInSignature" : {
4444
"bugType" : "AUTH_BYPASS",
4545
"description" : "The signature contains invalid types. Dynamic typed languages sometime coerce such values of different types into integers. If an implementation is careless and has additional bugs, such as not checking integer boundaries then it may be possible that such signatures are accepted.",
46-
"effect" : "Accepting such signatures can have the effect that an adversary can forge signatures without even knowning the message to sign.",
46+
"effect" : "Accepting such signatures can have the effect that an adversary can forge signatures without even knowing the message to sign.",
4747
"cves" : [
4848
"CVE-2022-21449",
4949
"CVE-2022-24884"

0 commit comments

Comments
 (0)