summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--CHANGES8
-rw-r--r--CHANGES.SSLeay4
-rwxr-xr-xConfigure2
-rw-r--r--FAQ2
-rw-r--r--INSTALL2
-rw-r--r--INSTALL.NW2
-rw-r--r--Netware/globals.txt2
-rw-r--r--apps/ca.c6
-rw-r--r--apps/openssl-vms.cnf4
-rw-r--r--apps/openssl.cnf4
-rw-r--r--apps/s_client.c2
-rw-r--r--apps/s_server.c2
-rw-r--r--apps/srp.c2
-rw-r--r--bugs/sslref.dif4
-rwxr-xr-xconfig4
-rw-r--r--crypto/asn1/tasn_utl.c2
-rw-r--r--crypto/bn/asm/README2
-rw-r--r--crypto/bn/asm/sparcv8plus.S2
-rwxr-xr-xcrypto/bn/asm/sparcv9a-mont.pl2
-rw-r--r--crypto/bn/asm/vis3-mont.pl2
-rw-r--r--crypto/bn/todo2
-rw-r--r--crypto/des/VERSION2
-rw-r--r--crypto/des/asm/des_enc.m44
-rw-r--r--crypto/des/makefile.bc2
-rw-r--r--crypto/dh/dh_ameth.c2
-rw-r--r--crypto/dsa/fips186a.txt2
-rw-r--r--crypto/dso/dso.h8
-rw-r--r--crypto/dso/dso_dl.c4
-rw-r--r--crypto/ec/ec.h50
-rw-r--r--crypto/engine/README2
-rw-r--r--crypto/engine/eng_table.c2
-rw-r--r--crypto/err/err.c2
-rw-r--r--crypto/evp/encode.c2
-rw-r--r--crypto/md5/asm/md5-sparcv9.pl2
-rw-r--r--crypto/modes/asm/ghash-sparcv9.pl2
-rw-r--r--crypto/objects/obj_dat.c2
-rw-r--r--crypto/perlasm/readme2
-rw-r--r--crypto/perlasm/sparcv9_modes.pl2
-rwxr-xr-xcrypto/perlasm/x86_64-xlate.pl2
-rw-r--r--crypto/pkcs7/bio_ber.c2
-rw-r--r--crypto/pkcs7/example.c4
-rw-r--r--crypto/pkcs7/pk7_doit.c2
-rw-r--r--crypto/rand/rand_egd.c4
-rw-r--r--crypto/rand/rand_nw.c2
-rw-r--r--crypto/rc2/version2
-rw-r--r--crypto/ripemd/README2
-rw-r--r--crypto/sha/asm/sha1-sparcv9.pl2
-rw-r--r--crypto/sha/asm/sha1-sparcv9a.pl2
-rw-r--r--crypto/sha/asm/sha512-sparcv9.pl2
-rw-r--r--crypto/x509v3/pcy_tree.c2
-rw-r--r--demos/certs/apps/apps.cnf2
-rw-r--r--demos/certs/ca.cnf2
-rw-r--r--demos/easy_tls/easy-tls.c2
-rw-r--r--demos/engines/zencod/hw_zencod.h4
-rw-r--r--doc/apps/openssl.pod2
-rw-r--r--doc/apps/req.pod2
-rw-r--r--doc/apps/x509v3_config.pod2
-rw-r--r--doc/crypto/ASN1_generate_nconf.pod2
-rw-r--r--doc/crypto/BN_BLINDING_new.pod2
-rw-r--r--doc/crypto/EVP_DigestInit.pod2
-rw-r--r--doc/crypto/EVP_PKEY_cmp.pod4
-rw-r--r--doc/crypto/X509_NAME_add_entry_by_txt.pod2
-rw-r--r--doc/crypto/X509_STORE_CTX_get_error.pod8
-rw-r--r--doc/crypto/rand.pod2
-rw-r--r--doc/ssleay.txt28
-rw-r--r--e_os.h2
-rw-r--r--engines/ccgost/README.gost2
-rw-r--r--fips/fips_post.c2
-rw-r--r--openssl.spec2
-rw-r--r--ssl/d1_enc.c2
-rw-r--r--ssl/s3_cbc.c2
-rw-r--r--ssl/s3_clnt.c2
-rw-r--r--ssl/s3_enc.c2
-rw-r--r--ssl/s3_pkt.c2
-rw-r--r--ssl/t1_enc.c2
-rw-r--r--test/CAss.cnf2
-rw-r--r--test/CAtsa.cnf2
77 files changed, 136 insertions, 136 deletions
diff --git a/CHANGES b/CHANGES
index 5406c82c30..166fe5626b 100644
--- a/CHANGES
+++ b/CHANGES
@@ -1402,7 +1402,7 @@
*) New option -sigopt to dgst utility. Update dgst to use
EVP_Digest{Sign,Verify}*. These two changes make it possible to use
- alternative signing paramaters such as X9.31 or PSS in the dgst
+ alternative signing parameters such as X9.31 or PSS in the dgst
utility.
[Steve Henson]
@@ -6448,7 +6448,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
*) Fix ssl/s3_enc.c, ssl/t1_enc.c and ssl/s3_pkt.c so that we don't
reveal whether illegal block cipher padding was found or a MAC
- verification error occured. (Neither SSLerr() codes nor alerts
+ verification error occurred. (Neither SSLerr() codes nor alerts
are directly visible to potential attackers, but the information
may leak via logfiles.)
@@ -8855,7 +8855,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
*) Bugfix: ssl23_get_client_hello did not work properly when called in
state SSL23_ST_SR_CLNT_HELLO_B, i.e. when the first 7 bytes of
a SSLv2-compatible client hello for SSLv3 or TLSv1 could be read,
- but a retry condition occured while trying to read the rest.
+ but a retry condition occurred while trying to read the rest.
[Bodo Moeller]
*) The PKCS7_ENC_CONTENT_new() function was setting the content type as
@@ -9780,7 +9780,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
other platforms details on the command line without having to patch the
Configure script everytime: One now can use ``perl Configure
<id>:<details>'', i.e. platform ids are allowed to have details appended
- to them (seperated by colons). This is treated as there would be a static
+ to them (separated by colons). This is treated as there would be a static
pre-configured entry in Configure's %table under key <id> with value
<details> and ``perl Configure <id>'' is called. So, when you want to
perform a quick test-compile under FreeBSD 3.1 with pgcc and without
diff --git a/CHANGES.SSLeay b/CHANGES.SSLeay
index ca5cd72976..14bae79268 100644
--- a/CHANGES.SSLeay
+++ b/CHANGES.SSLeay
@@ -29,7 +29,7 @@ eric (about to go bushwalking for the 4 day easter break :-)
7-Jan-98
- Finally reworked the cipher string to ciphers again, so it
works correctly
- - All the app_data stuff is now ex_data with funcion calls to access.
+ - All the app_data stuff is now ex_data with function calls to access.
The index is supplied by a function and 'methods' can be setup
for the types that are called on XXX_new/XXX_free. This lets
applications get notified on creation and destruction. Some of
@@ -937,7 +937,7 @@ Reasons to start playing with version 0.5.0
certificate, it is my aim to use perl5/Tk but I don't have time to do
this right now. It will generate the certificates but the management
scripts still need to be written. This is not a hard task.
-- Things have been cleaned up alot.
+- Things have been cleaned up a lot.
- Have a look at the enc and dgst programs in the apps directory.
- It supports v3 of x509 certiticates.
diff --git a/Configure b/Configure
index 45ae45c570..d742dfc327 100755
--- a/Configure
+++ b/Configure
@@ -1590,7 +1590,7 @@ if ($aes_obj =~ /\.o$/)
# aes-ctr.o is not a real file, only indication that assembler
# module implements AES_ctr32_encrypt...
$cflags.=" -DAES_CTR_ASM" if ($aes_obj =~ s/\s*aes\-ctr\.o//);
- # aes-xts.o indicates presense of AES_xts_[en|de]crypt...
+ # aes-xts.o indicates presence of AES_xts_[en|de]crypt...
$cflags.=" -DAES_XTS_ASM" if ($aes_obj =~ s/\s*aes\-xts\.o//);
$aes_obj =~ s/\s*(vpaes|aesni)\-x86\.o//g if ($no_sse2);
$aes_obj =~ s/\s*(vp|bs)aes-\w*\.o//g if ($fipscanisterinternal eq "y");
diff --git a/FAQ b/FAQ
index 612e33060c..d2ef2cb078 100644
--- a/FAQ
+++ b/FAQ
@@ -721,7 +721,7 @@ working across wider range of *BSD branches, not just OpenBSD.
If the test program in question fails withs SIGILL, Illegal Instruction
exception, then you more than likely to run SSE2-capable CPU, such as
Intel P4, under control of kernel which does not support SSE2
-instruction extentions. See accompanying INSTALL file and
+instruction extensions. See accompanying INSTALL file and
OPENSSL_ia32cap(3) documentation page for further information.
* Why does compiler fail to compile sha512.c?
diff --git a/INSTALL b/INSTALL
index 85e2660191..610f7dad26 100644
--- a/INSTALL
+++ b/INSTALL
@@ -79,7 +79,7 @@
compiler flags for any other CPU specific configuration,
e.g. "-m32" to build x86 code on an x64 system.
- no-sse2 Exclude SSE2 code pathes. Normally SSE2 extention is
+ no-sse2 Exclude SSE2 code pathes. Normally SSE2 extension is
detected at run-time, but the decision whether or not the
machine code will be executed is taken solely on CPU
capability vector. This means that if you happen to run OS
diff --git a/INSTALL.NW b/INSTALL.NW
index 609a7309e1..29eb8075b3 100644
--- a/INSTALL.NW
+++ b/INSTALL.NW
@@ -378,7 +378,7 @@ The openssl program has numerous options and can be used for many different
things. Many of the options operate in an interactive mode requiring the
user to enter data. Because of this, a default screen is created for the
program. However, when running the test script it is not desirable to
-have a seperate screen. Therefore, the build also creates openssl2.nlm.
+have a separate screen. Therefore, the build also creates openssl2.nlm.
Openssl2.nlm is functionally identical but uses the console screen.
Openssl2 can be used when a non-interactive mode is desired.
diff --git a/Netware/globals.txt b/Netware/globals.txt
index fe05d390cf..7d1bd7ed0f 100644
--- a/Netware/globals.txt
+++ b/Netware/globals.txt
@@ -66,7 +66,7 @@ static LHASH *error_hash=NULL;
static LHASH *thread_hash=NULL;
several files have routines with static "init" to track if error strings
- have been loaded ( may not want seperate error strings for each process )
+ have been loaded ( may not want separate error strings for each process )
The "init" variable can't be left "global" because the error has is a ptr
that is malloc'ed. The malloc'ed error has is dependant on the "init"
vars.
diff --git a/apps/ca.c b/apps/ca.c
index 5d488e2fac..934970d9e4 100644
--- a/apps/ca.c
+++ b/apps/ca.c
@@ -148,7 +148,7 @@
static const char *ca_usage[]={
"usage: ca args\n",
"\n",
-" -verbose - Talk alot while doing things\n",
+" -verbose - Talk a lot while doing things\n",
" -config file - A config file\n",
" -name arg - The particular CA definition to use\n",
" -gencrl - Generate a new CRL\n",
@@ -179,7 +179,7 @@ static const char *ca_usage[]={
" -utf8 - input characters are UTF8 (default ASCII)\n",
" -multivalue-rdn - enable support for multivalued RDNs\n",
" -extensions .. - Extension section (override value in config file)\n",
-" -extfile file - Configuration file with X509v3 extentions to add\n",
+" -extfile file - Configuration file with X509v3 extensions to add\n",
" -crlexts .. - CRL extension section (override value in config file)\n",
#ifndef OPENSSL_NO_ENGINE
" -engine e - use engine e, possibly a hardware device.\n",
@@ -994,7 +994,7 @@ bad:
}
/*****************************************************************/
- /* Read extentions config file */
+ /* Read extensions config file */
if (extfile)
{
extconf = NCONF_new(NULL);
diff --git a/apps/openssl-vms.cnf b/apps/openssl-vms.cnf
index 45e46a0fb4..abea6d8255 100644
--- a/apps/openssl-vms.cnf
+++ b/apps/openssl-vms.cnf
@@ -55,7 +55,7 @@ crl = $dir]crl.pem # The current CRL
private_key = $dir.private]cakey.pem# The private key
RANDFILE = $dir.private].rand # private random number file
-x509_extensions = usr_cert # The extentions to add to the cert
+x509_extensions = usr_cert # The extensions to add to the cert
# Comment out the following two lines for the "traditional"
# (and highly broken) format.
@@ -107,7 +107,7 @@ default_bits = 1024
default_keyfile = privkey.pem
distinguished_name = req_distinguished_name
attributes = req_attributes
-x509_extensions = v3_ca # The extentions to add to the self signed cert
+x509_extensions = v3_ca # The extensions to add to the self signed cert
# Passwords for private keys if not present they will be prompted for
# input_password = secret
diff --git a/apps/openssl.cnf b/apps/openssl.cnf
index 18760c6e67..ccc21a290b 100644
--- a/apps/openssl.cnf
+++ b/apps/openssl.cnf
@@ -55,7 +55,7 @@ crl = $dir/crl.pem # The current CRL
private_key = $dir/private/cakey.pem# The private key
RANDFILE = $dir/private/.rand # private random number file
-x509_extensions = usr_cert # The extentions to add to the cert
+x509_extensions = usr_cert # The extensions to add to the cert
# Comment out the following two lines for the "traditional"
# (and highly broken) format.
@@ -107,7 +107,7 @@ default_bits = 1024
default_keyfile = privkey.pem
distinguished_name = req_distinguished_name
attributes = req_attributes
-x509_extensions = v3_ca # The extentions to add to the self signed cert
+x509_extensions = v3_ca # The extensions to add to the self signed cert
# Passwords for private keys if not present they will be prompted for
# input_password = secret
diff --git a/apps/s_client.c b/apps/s_client.c
index a2876b8b68..2f135035b2 100644
--- a/apps/s_client.c
+++ b/apps/s_client.c
@@ -1866,7 +1866,7 @@ SSL_set_tlsext_status_ids(con, ids);
if ((SSL_version(con) == DTLS1_VERSION) && DTLSv1_handle_timeout(con) > 0)
{
- BIO_printf(bio_err,"TIMEOUT occured\n");
+ BIO_printf(bio_err,"TIMEOUT occurred\n");
}
if (!ssl_pending && FD_ISSET(SSL_get_fd(con),&writefds))
diff --git a/apps/s_server.c b/apps/s_server.c
index 1d8b6412bb..ae5b1618b5 100644
--- a/apps/s_server.c
+++ b/apps/s_server.c
@@ -2359,7 +2359,7 @@ static int sv_body(char *hostname, int s, int stype, unsigned char *context)
if ((SSL_version(con) == DTLS1_VERSION) && DTLSv1_handle_timeout(con) > 0)
{
- BIO_printf(bio_err,"TIMEOUT occured\n");
+ BIO_printf(bio_err,"TIMEOUT occurred\n");
}
if (i <= 0) continue;
diff --git a/apps/srp.c b/apps/srp.c
index 92e5584bcb..749bc64c17 100644
--- a/apps/srp.c
+++ b/apps/srp.c
@@ -84,7 +84,7 @@
static char *srp_usage[]={
"usage: srp [args] [user] \n",
"\n",
-" -verbose Talk alot while doing things\n",
+" -verbose Talk a lot while doing things\n",
" -config file A config file\n",
" -name arg The particular srp definition to use\n",
" -srpvfile arg The srp verifier file name\n",
diff --git a/bugs/sslref.dif b/bugs/sslref.dif
index 0aa92bfe6d..0817009bb4 100644
--- a/bugs/sslref.dif
+++ b/bugs/sslref.dif
@@ -17,10 +17,10 @@ is returned as 1.
=====
I have not tested the following but it is reported by holtzman@mit.edu.
-SSLref clients wait to recieve a server-verify before they send a
+SSLref clients wait to receive a server-verify before they send a
client-finished. Besides this not being evident from the examples in
2.2.1, it makes more sense to always send all packets you can before
-reading. SSLeay was waiting in the server to recieve a client-finish
+reading. SSLeay was waiting in the server to receive a client-finish
before sending the server-verify :-). I have changed SSLeay to send a
server-verify before trying to read the client-finished.
diff --git a/config b/config
index a019f20a9f..b432f627cc 100755
--- a/config
+++ b/config
@@ -382,7 +382,7 @@ esac
#
# Do the Apollo stuff first. Here, we just simply assume
-# that the existance of the /usr/apollo directory is proof
+# that the existence of the /usr/apollo directory is proof
# enough
if [ -d /usr/apollo ]; then
echo "whatever-apollo-whatever"
@@ -862,7 +862,7 @@ case "$GUESSOS" in
*) OUT=`echo $GUESSOS | awk -F- '{print $3}'`;;
esac
-# NB: This atalla support has been superceded by the ENGINE support
+# NB: This atalla support has been superseded by the ENGINE support
# That contains its own header and definitions anyway. Support can
# be enabled or disabled on any supported platform without external
# headers, eg. by adding the "hw-atalla" switch to ./config or
diff --git a/crypto/asn1/tasn_utl.c b/crypto/asn1/tasn_utl.c
index ca9ec7a32f..977564d6a9 100644
--- a/crypto/asn1/tasn_utl.c
+++ b/crypto/asn1/tasn_utl.c
@@ -95,7 +95,7 @@ int asn1_set_choice_selector(ASN1_VALUE **pval, int value, const ASN1_ITEM *it)
/* Do reference counting. The value 'op' decides what to do.
* if it is +1 then the count is incremented. If op is 0 count is
* set to 1. If op is -1 count is decremented and the return value
- * is the current refrence count or 0 if no reference count exists.
+ * is the current reference count or 0 if no reference count exists.
*/
int asn1_do_lock(ASN1_VALUE **pval, int op, const ASN1_ITEM *it)
diff --git a/crypto/bn/asm/README b/crypto/bn/asm/README
index b0f3a68a06..542894deee 100644
--- a/crypto/bn/asm/README
+++ b/crypto/bn/asm/README
@@ -19,7 +19,7 @@ a 2 times speedup :-).
There are 3 versions of assember for the HP PA-RISC.