diff options
96 files changed, 147 insertions, 147 deletions
@@ -2750,7 +2750,7 @@ *) New option -sigopt to dgst utility. Update dgst to use EVP_Digest{Sign,Verify}*. These two changes make it possible to use - alternative signing paramaters such as X9.31 or PSS in the dgst + alternative signing parameters such as X9.31 or PSS in the dgst utility. [Steve Henson] @@ -3957,7 +3957,7 @@ unofficial, and the ID has long expired. [Bodo Moeller] - *) Fix RSA blinding Heisenbug (problems sometimes occured on + *) Fix RSA blinding Heisenbug (problems sometimes occurred on dual-core machines) and other potential thread-safety issues. [Bodo Moeller] @@ -4972,7 +4972,7 @@ unofficial, and the ID has long expired. [Bodo Moeller] - *) Fix RSA blinding Heisenbug (problems sometimes occured on + *) Fix RSA blinding Heisenbug (problems sometimes occurred on dual-core machines) and other potential thread-safety issues. [Bodo Moeller] @@ -5077,7 +5077,7 @@ *) Added support for proxy certificates according to RFC 3820. Because they may be a security thread to unaware applications, - they must be explicitely allowed in run-time. See + they must be explicitly allowed in run-time. See docs/HOWTO/proxy_certificates.txt for further information. [Richard Levitte] @@ -7654,7 +7654,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k *) Fix ssl/s3_enc.c, ssl/t1_enc.c and ssl/s3_pkt.c so that we don't reveal whether illegal block cipher padding was found or a MAC - verification error occured. (Neither SSLerr() codes nor alerts + verification error occurred. (Neither SSLerr() codes nor alerts are directly visible to potential attackers, but the information may leak via logfiles.) @@ -10061,7 +10061,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k *) Bugfix: ssl23_get_client_hello did not work properly when called in state SSL23_ST_SR_CLNT_HELLO_B, i.e. when the first 7 bytes of a SSLv2-compatible client hello for SSLv3 or TLSv1 could be read, - but a retry condition occured while trying to read the rest. + but a retry condition occurred while trying to read the rest. [Bodo Moeller] *) The PKCS7_ENC_CONTENT_new() function was setting the content type as diff --git a/Netware/set_env.bat b/Netware/set_env.bat index ace024e529..f063cc9879 100644 --- a/Netware/set_env.bat +++ b/Netware/set_env.bat @@ -1,7 +1,7 @@ @echo off rem ======================================================================== -rem Batch file to assist in setting up the necessary enviroment for +rem Batch file to assist in setting up the necessary environment for rem building OpenSSL for NetWare. rem rem usage: @@ -84,10 +84,10 @@ echo using GNU GCC Compiler :info echo. -if "%LIBC_BUILD%" == "Y" echo Enviroment configured for LibC build +if "%LIBC_BUILD%" == "Y" echo Environment configured for LibC build if "%LIBC_BUILD%" == "Y" echo use "netware\build.bat netware-libc ..." -if "%CLIB_BUILD%" == "Y" echo Enviroment configured for CLib build +if "%CLIB_BUILD%" == "Y" echo Environment configured for CLib build if "%CLIB_BUILD%" == "Y" echo use "netware\build.bat netware-clib ..." goto end diff --git a/apps/dgst.c b/apps/dgst.c index 09396e6fa0..5d25c58e32 100644 --- a/apps/dgst.c +++ b/apps/dgst.c @@ -107,7 +107,7 @@ OPTIONS dgst_options[] = { {"debug", OPT_DEBUG, '-'}, {"fips-fingerprint", OPT_FIPS_FINGERPRINT, '-'}, {"hmac", OPT_HMAC, 's', "Create hashed MAC with key"}, - {"mac", OPT_MAC, 's', "Create MAC (not neccessarily HMAC)"}, + {"mac", OPT_MAC, 's', "Create MAC (not necessarily HMAC)"}, {"sigopt", OPT_SIGOPT, 's', "Signature parameter in n:v form"}, {"macopt", OPT_MACOPT, 's', "MAC algorithm parameters in n:v form or key"}, {"", OPT_DIGEST, '-', "Any supported digest"}, diff --git a/apps/s_cb.c b/apps/s_cb.c index b8e1ccc1f2..096471a86f 100644 --- a/apps/s_cb.c +++ b/apps/s_cb.c @@ -831,7 +831,7 @@ static STRINT_PAIR chain_flags[] = { {"CA signature", CERT_PKEY_CA_SIGNATURE}, {"EE key parameters", CERT_PKEY_EE_PARAM}, {"CA key parameters", CERT_PKEY_CA_PARAM}, - {"Explicity sign with EE key", CERT_PKEY_EXPLICIT_SIGN}, + {"Explicitly sign with EE key", CERT_PKEY_EXPLICIT_SIGN}, {"Issuer Name", CERT_PKEY_ISSUER_NAME}, {"Certificate Type", CERT_PKEY_CERT_TYPE}, {NULL} diff --git a/crypto/aes/asm/aes-armv4.pl b/crypto/aes/asm/aes-armv4.pl index fbe45975a5..f72d027458 100644 --- a/crypto/aes/asm/aes-armv4.pl +++ b/crypto/aes/asm/aes-armv4.pl @@ -767,7 +767,7 @@ _armv4_AES_set_enc2dec_key: ldr $rounds,[r0,#240] mov $i1,r0 @ input add $i2,r0,$rounds,lsl#4 - mov $key,r1 @ ouput + mov $key,r1 @ output add $tbl,r1,$rounds,lsl#4 str $rounds,[r1,#240] diff --git a/crypto/aes/asm/aes-c64xplus.pl b/crypto/aes/asm/aes-c64xplus.pl index 5bbc2accff..54426f7dda 100644 --- a/crypto/aes/asm/aes-c64xplus.pl +++ b/crypto/aes/asm/aes-c64xplus.pl @@ -566,7 +566,7 @@ __set_encrypt_key: NOP BNOP RA,5 -|| MVK -2,RET ; unknown bit lenght +|| MVK -2,RET ; unknown bit length || MVK 0,B0 ; redundant ;;==================================================================== ;;==================================================================== diff --git a/crypto/asn1/a_int.c b/crypto/asn1/a_int.c index af52beb420..ec623f7b5a 100644 --- a/crypto/asn1/a_int.c +++ b/crypto/asn1/a_int.c @@ -186,7 +186,7 @@ static size_t i2c_ibuf(const unsigned char *b, size_t blen, int neg, /* * convert content octets into a big endian buffer. Returns the length - * of buffer or 0 on error: for malformed INTEGER. If output bufer is + * of buffer or 0 on error: for malformed INTEGER. If output buffer is * NULL just return length. */ diff --git a/crypto/asn1/asn_mime.c b/crypto/asn1/asn_mime.c index 0fb5126260..6ac9b2c8e2 100644 --- a/crypto/asn1/asn_mime.c +++ b/crypto/asn1/asn_mime.c @@ -364,7 +364,7 @@ static int asn1_output_data(BIO *out, BIO *data, ASN1_VALUE *val, int flags, int rv = 1; /* - * If data is not deteched or resigning then the output BIO is already + * If data is not detached or resigning then the output BIO is already * set up to finalise when it is written through. */ if (!(flags & SMIME_DETACHED) || (flags & PKCS7_REUSE_DIGEST)) { diff --git a/crypto/asn1/asn_mstbl.c b/crypto/asn1/asn_mstbl.c index ad1c4cfce6..f90b442673 100644 --- a/crypto/asn1/asn_mstbl.c +++ b/crypto/asn1/asn_mstbl.c @@ -59,7 +59,7 @@ #include <openssl/conf.h> #include <openssl/x509v3.h> -/* Multi string module: add table enstries from a given section */ +/* Multi string module: add table entries from a given section */ static int do_tcreate(char *value, char *name); diff --git a/crypto/asn1/tasn_dec.c b/crypto/asn1/tasn_dec.c index 67dddcf112..b025e5809f 100644 --- a/crypto/asn1/tasn_dec.c +++ b/crypto/asn1/tasn_dec.c @@ -984,7 +984,7 @@ static int asn1_find_end(const unsigned char **in, long len, char inf) } /* - * This function collects the asn1 data from a constructred string type into + * This function collects the asn1 data from a constructed string type into * a buffer. The values of 'in' and 'len' should refer to the contents of the * constructed type and 'inf' should be set if it is indefinite length. */ diff --git a/crypto/bio/b_sock.c b/crypto/bio/b_sock.c index fab5b09f37..567ee4824d 100644 --- a/crypto/bio/b_sock.c +++ b/crypto/bio/b_sock.c @@ -195,7 +195,7 @@ int BIO_sock_init(void) memset(&wsa_state, 0, sizeof(wsa_state)); /* * Not making wsa_state available to the rest of the code is formally - * wrong. But the structures we use are [beleived to be] invariable + * wrong. But the structures we use are [believed to be] invariable * among Winsock DLLs, while API availability is [expected to be] * probed at run-time with DSO_global_lookup. */ diff --git a/crypto/bio/bss_dgram.c b/crypto/bio/bss_dgram.c index a3d8a0cab9..0887293e29 100644 --- a/crypto/bio/bss_dgram.c +++ b/crypto/bio/bss_dgram.c @@ -299,7 +299,7 @@ static void dgram_adjust_rcv_timeout(BIO *b) } /* - * Adjust socket timeout if next handhake message timer will expire + * Adjust socket timeout if next handshake message timer will expire * earlier. */ if ((data->socket_timeout.tv_sec == 0 diff --git a/crypto/bio/bss_file.c b/crypto/bio/bss_file.c index 334eca038d..2689a283b8 100644 --- a/crypto/bio/bss_file.c +++ b/crypto/bio/bss_file.c @@ -196,8 +196,8 @@ BIO *BIO_new_fp(FILE *stream, int close_flag) if ((ret = BIO_new(BIO_s_file())) == NULL) return (NULL); - BIO_set_flags(ret, BIO_FLAGS_UPLINK); /* redundant, left for - * documentation puposes */ + /* redundant flag, left for documentation purposes */ + BIO_set_flags(ret, BIO_FLAGS_UPLINK); BIO_set_fp(ret, stream, close_flag); return (ret); } diff --git a/crypto/bn/asm/ia64.S b/crypto/bn/asm/ia64.S index a9a42abfc3..9e090ab8fd 100644 --- a/crypto/bn/asm/ia64.S +++ b/crypto/bn/asm/ia64.S |