diff options
author | Yuchen Wu <[email protected]> | 2024-03-29 15:42:20 -0700 |
---|---|---|
committer | Andrew Hauck <[email protected]> | 2024-04-05 11:46:20 -0700 |
commit | dfcd3d1d9f493b830e97757ba8d43c07ee81c030 (patch) | |
tree | 0cfa357cd4257b0ea2b7c2d116c937426190b1cd /pingora-boringssl | |
parent | 3c5d99c3f49a8d40a0fc16895b148dea9ea18e8d (diff) | |
download | pingora-dfcd3d1d9f493b830e97757ba8d43c07ee81c030.tar.gz pingora-dfcd3d1d9f493b830e97757ba8d43c07ee81c030.zip |
Fix typos and grammar issues in docs
And other things.
Co-authored-by: DimanNe <[email protected]>
Co-authored-by: Xiaobo Liu <[email protected]>
Co-authored-by: houseme <[email protected]>
Co-authored-by: lilo <[email protected]>
Co-authored-by: Yang He <[email protected]>
Diffstat (limited to 'pingora-boringssl')
-rw-r--r-- | pingora-boringssl/src/ext.rs | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/pingora-boringssl/src/ext.rs b/pingora-boringssl/src/ext.rs index bdc0d56..a702a12 100644 --- a/pingora-boringssl/src/ext.rs +++ b/pingora-boringssl/src/ext.rs @@ -140,7 +140,7 @@ pub fn ssl_use_second_key_share(_ssl: &mut SslRef, _enabled: bool) {} /// Clear the error stack /// /// SSL calls should check and clear the BoringSSL error stack. But some calls fail to do so. -/// This causes the next unrelated SSL call to fail due to the leftover errors. This function allow +/// This causes the next unrelated SSL call to fail due to the leftover errors. This function allows /// the caller to clear the error stack before performing SSL calls to avoid this issue. pub fn clear_error_stack() { let _ = ErrorStack::get(); @@ -186,7 +186,7 @@ pub fn is_suspended_for_cert(error: &boring::ssl::Error) -> bool { #[allow(clippy::mut_from_ref)] /// Get a mutable SslRef ouf of SslRef. which is a missing functionality for certain SslStream /// # Safety -/// the caller need to make sure that they hold a &mut SslRef +/// the caller needs to make sure that they hold a &mut SslRef pub unsafe fn ssl_mut(ssl: &SslRef) -> &mut SslRef { unsafe { SslRef::from_ptr_mut(ssl.as_ptr()) } } |