diff options
-rw-r--r-- | docs/glossary.rst | 2 | ||||
-rw-r--r-- | docs/spelling_wordlist.txt | 1 | ||||
-rw-r--r-- | src/rust/cryptography-keepalive/src/lib.rs | 2 | ||||
-rw-r--r-- | src/rust/src/backend/cipher_registry.rs | 2 |
4 files changed, 3 insertions, 4 deletions
diff --git a/docs/glossary.rst b/docs/glossary.rst index 86718cc..3c2272a 100644 --- a/docs/glossary.rst +++ b/docs/glossary.rst @@ -94,7 +94,7 @@ Glossary A bytes-like object contains binary data and supports the `buffer protocol`_. This includes ``bytes``, ``bytearray``, and ``memoryview`` objects. It is :term:`unsafe` to pass a mutable object - (e.g., a ``bytearray`` or other implementor of the buffer protocol) + (e.g., a ``bytearray`` or other implementer of the buffer protocol) and to `mutate it concurrently`_ with the operation it has been provided for. diff --git a/docs/spelling_wordlist.txt b/docs/spelling_wordlist.txt index 9be4a10..e7e9afd 100644 --- a/docs/spelling_wordlist.txt +++ b/docs/spelling_wordlist.txt @@ -62,7 +62,6 @@ hazmat Homebrew hostname hostnames -implementor incrementing indistinguishability initialisms diff --git a/src/rust/cryptography-keepalive/src/lib.rs b/src/rust/cryptography-keepalive/src/lib.rs index 46e9f32..9542f9e 100644 --- a/src/rust/cryptography-keepalive/src/lib.rs +++ b/src/rust/cryptography-keepalive/src/lib.rs @@ -13,7 +13,7 @@ pub struct KeepAlive<T: StableDeref> { } /// # Safety -/// Implementors of this trait must ensure that the value returned by +/// Implementers of this trait must ensure that the value returned by /// `deref()` must remain valid, even if `self` is moved. pub unsafe trait StableDeref: Deref {} // SAFETY: `Vec`'s data is on the heap, so as long as it's not mutated, the diff --git a/src/rust/src/backend/cipher_registry.rs b/src/rust/src/backend/cipher_registry.rs index 40ae826..fb829c0 100644 --- a/src/rust/src/backend/cipher_registry.rs +++ b/src/rust/src/backend/cipher_registry.rs @@ -262,7 +262,7 @@ fn get_cipher_registry( m.add(&chacha20, none_type.as_any(), None, Cipher::chacha20())?; // Don't register legacy ciphers if they're unavailable. In theory - // this should't be necessary but OpenSSL 3 will return an EVP_CIPHER + // this shouldn't be necessary but OpenSSL 3 will return an EVP_CIPHER // even when the cipher is unavailable. if cfg!(not(CRYPTOGRAPHY_OPENSSL_300_OR_GREATER)) || types::LEGACY_PROVIDER_LOADED.get(py)?.is_truthy()? |