summaryrefslogtreecommitdiffhomepage
diff options
context:
space:
mode:
-rw-r--r--.codespellrc6
-rw-r--r--sites/www/changelog.rst2
2 files changed, 2 insertions, 6 deletions
diff --git a/.codespellrc b/.codespellrc
index 1ba44a9c..402b8e86 100644
--- a/.codespellrc
+++ b/.codespellrc
@@ -1,7 +1,3 @@
[codespell]
-# skip most common present files which might be on the system
skip = venvs,.venv,.git,build,*.egg-info,*.lock
-# Flage and Constans are names
-# uite - just truncated word in the test, cannot have
-# inline annotations yet: https://github.com/codespell-project/codespell/pull/2400
-ignore-words-list = flage,constans,uite
+ignore-words-list = keypair
diff --git a/sites/www/changelog.rst b/sites/www/changelog.rst
index ae1d7365..239c9e2c 100644
--- a/sites/www/changelog.rst
+++ b/sites/www/changelog.rst
@@ -334,7 +334,7 @@ Changelog
This fixes a security flaw! If you are running Paramiko on 32-bit systems
with low entropy (such as any 32-bit Python 2, or a 32-bit Python 3 which
is running with ``PYTHONHASHSEED=0``) it is possible for an attacker to
- craft a new key pair from an exfiltrated public key, which Paramiko would
+ craft a new keypair from an exfiltrated public key, which Paramiko would
consider equal to the original key.
This could enable attacks such as, but not limited to, the following: