diff options
77 files changed, 136 insertions, 136 deletions
@@ -1402,7 +1402,7 @@ *) New option -sigopt to dgst utility. Update dgst to use EVP_Digest{Sign,Verify}*. These two changes make it possible to use - alternative signing paramaters such as X9.31 or PSS in the dgst + alternative signing parameters such as X9.31 or PSS in the dgst utility. [Steve Henson] @@ -6448,7 +6448,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k *) Fix ssl/s3_enc.c, ssl/t1_enc.c and ssl/s3_pkt.c so that we don't reveal whether illegal block cipher padding was found or a MAC - verification error occured. (Neither SSLerr() codes nor alerts + verification error occurred. (Neither SSLerr() codes nor alerts are directly visible to potential attackers, but the information may leak via logfiles.) @@ -8855,7 +8855,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k *) Bugfix: ssl23_get_client_hello did not work properly when called in state SSL23_ST_SR_CLNT_HELLO_B, i.e. when the first 7 bytes of a SSLv2-compatible client hello for SSLv3 or TLSv1 could be read, - but a retry condition occured while trying to read the rest. + but a retry condition occurred while trying to read the rest. [Bodo Moeller] *) The PKCS7_ENC_CONTENT_new() function was setting the content type as @@ -9780,7 +9780,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k other platforms details on the command line without having to patch the Configure script everytime: One now can use ``perl Configure <id>:<details>'', i.e. platform ids are allowed to have details appended - to them (seperated by colons). This is treated as there would be a static + to them (separated by colons). This is treated as there would be a static pre-configured entry in Configure's %table under key <id> with value <details> and ``perl Configure <id>'' is called. So, when you want to perform a quick test-compile under FreeBSD 3.1 with pgcc and without diff --git a/CHANGES.SSLeay b/CHANGES.SSLeay index ca5cd72976..14bae79268 100644 --- a/CHANGES.SSLeay +++ b/CHANGES.SSLeay @@ -29,7 +29,7 @@ eric (about to go bushwalking for the 4 day easter break :-) 7-Jan-98 - Finally reworked the cipher string to ciphers again, so it works correctly - - All the app_data stuff is now ex_data with funcion calls to access. + - All the app_data stuff is now ex_data with function calls to access. The index is supplied by a function and 'methods' can be setup for the types that are called on XXX_new/XXX_free. This lets applications get notified on creation and destruction. Some of @@ -937,7 +937,7 @@ Reasons to start playing with version 0.5.0 certificate, it is my aim to use perl5/Tk but I don't have time to do this right now. It will generate the certificates but the management scripts still need to be written. This is not a hard task. -- Things have been cleaned up alot. +- Things have been cleaned up a lot. - Have a look at the enc and dgst programs in the apps directory. - It supports v3 of x509 certiticates. @@ -1590,7 +1590,7 @@ if ($aes_obj =~ /\.o$/) # aes-ctr.o is not a real file, only indication that assembler # module implements AES_ctr32_encrypt... $cflags.=" -DAES_CTR_ASM" if ($aes_obj =~ s/\s*aes\-ctr\.o//); - # aes-xts.o indicates presense of AES_xts_[en|de]crypt... + # aes-xts.o indicates presence of AES_xts_[en|de]crypt... $cflags.=" -DAES_XTS_ASM" if ($aes_obj =~ s/\s*aes\-xts\.o//); $aes_obj =~ s/\s*(vpaes|aesni)\-x86\.o//g if ($no_sse2); $aes_obj =~ s/\s*(vp|bs)aes-\w*\.o//g if ($fipscanisterinternal eq "y"); @@ -721,7 +721,7 @@ working across wider range of *BSD branches, not just OpenBSD. If the test program in question fails withs SIGILL, Illegal Instruction exception, then you more than likely to run SSE2-capable CPU, such as Intel P4, under control of kernel which does not support SSE2 -instruction extentions. See accompanying INSTALL file and +instruction extensions. See accompanying INSTALL file and OPENSSL_ia32cap(3) documentation page for further information. * Why does compiler fail to compile sha512.c? @@ -79,7 +79,7 @@ compiler flags for any other CPU specific configuration, e.g. "-m32" to build x86 code on an x64 system. - no-sse2 Exclude SSE2 code pathes. Normally SSE2 extention is + no-sse2 Exclude SSE2 code pathes. Normally SSE2 extension is detected at run-time, but the decision whether or not the machine code will be executed is taken solely on CPU capability vector. This means that if you happen to run OS diff --git a/INSTALL.NW b/INSTALL.NW index 609a7309e1..29eb8075b3 100644 --- a/INSTALL.NW +++ b/INSTALL.NW @@ -378,7 +378,7 @@ The openssl program has numerous options and can be used for many different things. Many of the options operate in an interactive mode requiring the user to enter data. Because of this, a default screen is created for the program. However, when running the test script it is not desirable to -have a seperate screen. Therefore, the build also creates openssl2.nlm. +have a separate screen. Therefore, the build also creates openssl2.nlm. Openssl2.nlm is functionally identical but uses the console screen. Openssl2 can be used when a non-interactive mode is desired. diff --git a/Netware/globals.txt b/Netware/globals.txt index fe05d390cf..7d1bd7ed0f 100644 --- a/Netware/globals.txt +++ b/Netware/globals.txt @@ -66,7 +66,7 @@ static LHASH *error_hash=NULL; static LHASH *thread_hash=NULL; several files have routines with static "init" to track if error strings - have been loaded ( may not want seperate error strings for each process ) + have been loaded ( may not want separate error strings for each process ) The "init" variable can't be left "global" because the error has is a ptr that is malloc'ed. The malloc'ed error has is dependant on the "init" vars. @@ -148,7 +148,7 @@ static const char *ca_usage[]={ "usage: ca args\n", "\n", -" -verbose - Talk alot while doing things\n", +" -verbose - Talk a lot while doing things\n", " -config file - A config file\n", " -name arg - The particular CA definition to use\n", " -gencrl - Generate a new CRL\n", @@ -179,7 +179,7 @@ static const char *ca_usage[]={ " -utf8 - input characters are UTF8 (default ASCII)\n", " -multivalue-rdn - enable support for multivalued RDNs\n", " -extensions .. - Extension section (override value in config file)\n", -" -extfile file - Configuration file with X509v3 extentions to add\n", +" -extfile file - Configuration file with X509v3 extensions to add\n", " -crlexts .. - CRL extension section (override value in config file)\n", #ifndef OPENSSL_NO_ENGINE " -engine e - use engine e, possibly a hardware device.\n", @@ -994,7 +994,7 @@ bad: } /*****************************************************************/ - /* Read extentions config file */ + /* Read extensions config file */ if (extfile) { extconf = NCONF_new(NULL); diff --git a/apps/openssl-vms.cnf b/apps/openssl-vms.cnf index 45e46a0fb4..abea6d8255 100644 --- a/apps/openssl-vms.cnf +++ b/apps/openssl-vms.cnf @@ -55,7 +55,7 @@ crl = $dir]crl.pem # The current CRL private_key = $dir.private]cakey.pem# The private key RANDFILE = $dir.private].rand # private random number file -x509_extensions = usr_cert # The extentions to add to the cert +x509_extensions = usr_cert # The extensions to add to the cert # Comment out the following two lines for the "traditional" # (and highly broken) format. @@ -107,7 +107,7 @@ default_bits = 1024 default_keyfile = privkey.pem distinguished_name = req_distinguished_name attributes = req_attributes -x509_extensions = v3_ca # The extentions to add to the self signed cert +x509_extensions = v3_ca # The extensions to add to the self signed cert # Passwords for private keys if not present they will be prompted for # input_password = secret diff --git a/apps/openssl.cnf b/apps/openssl.cnf index 18760c6e67..ccc21a290b 100644 --- a/apps/openssl.cnf +++ b/apps/openssl.cnf @@ -55,7 +55,7 @@ crl = $dir/crl.pem # The current CRL private_key = $dir/private/cakey.pem# The private key RANDFILE = $dir/private/.rand # private random number file -x509_extensions = usr_cert # The extentions to add to the cert +x509_extensions = usr_cert # The extensions to add to the cert # Comment out the following two lines for the "traditional" # (and highly broken) format. @@ -107,7 +107,7 @@ default_bits = 1024 default_keyfile = privkey.pem distinguished_name = req_distinguished_name attributes = req_attributes -x509_extensions = v3_ca # The extentions to add to the self signed cert +x509_extensions = v3_ca # The extensions to add to the self signed cert # Passwords for private keys if not present they will be prompted for # input_password = secret diff --git a/apps/s_client.c b/apps/s_client.c index a2876b8b68..2f135035b2 100644 --- a/apps/s_client.c +++ b/apps/s_client.c @@ -1866,7 +1866,7 @@ SSL_set_tlsext_status_ids(con, ids); if ((SSL_version(con) == DTLS1_VERSION) && DTLSv1_handle_timeout(con) > 0) { - BIO_printf(bio_err,"TIMEOUT occured\n"); + BIO_printf(bio_err,"TIMEOUT occurred\n"); } if (!ssl_pending && FD_ISSET(SSL_get_fd(con),&writefds)) diff --git a/apps/s_server.c b/apps/s_server.c index 1d8b6412bb..ae5b1618b5 100644 --- a/apps/s_server.c +++ b/apps/s_server.c @@ -2359,7 +2359,7 @@ static int sv_body(char *hostname, int s, int stype, unsigned char *context) if ((SSL_version(con) == DTLS1_VERSION) && DTLSv1_handle_timeout(con) > 0) { - BIO_printf(bio_err,"TIMEOUT occured\n"); + BIO_printf(bio_err,"TIMEOUT occurred\n"); } if (i <= 0) continue; diff --git a/apps/srp.c b/apps/srp.c index 92e5584bcb..749bc64c17 100644 --- a/apps/srp.c +++ b/apps/srp.c @@ -84,7 +84,7 @@ static char *srp_usage[]={ "usage: srp [args] [user] \n", "\n", -" -verbose Talk alot while doing things\n", +" -verbose Talk a lot while doing things\n", " -config file A config file\n", " -name arg The particular srp definition to use\n", " -srpvfile arg The srp verifier file name\n", diff --git a/bugs/sslref.dif b/bugs/sslref.dif index 0aa92bfe6d..0817009bb4 100644 --- a/bugs/sslref.dif +++ b/bugs/sslref.dif @@ -17,10 +17,10 @@ is returned as 1. ===== I have not tested the following but it is reported by holtzman@mit.edu. -SSLref clients wait to recieve a server-verify before they send a +SSLref clients wait to receive a server-verify before they send a client-finished. Besides this not being evident from the examples in 2.2.1, it makes more sense to always send all packets you can before -reading. SSLeay was waiting in the server to recieve a client-finish +reading. SSLeay was waiting in the server to receive a client-finish before sending the server-verify :-). I have changed SSLeay to send a server-verify before trying to read the client-finished. @@ -382,7 +382,7 @@ esac # # Do the Apollo stuff first. Here, we just simply assume -# that the existance of the /usr/apollo directory is proof +# that the existence of the /usr/apollo directory is proof # enough if [ -d /usr/apollo ]; then echo "whatever-apollo-whatever" @@ -862,7 +862,7 @@ case "$GUESSOS" in *) OUT=`echo $GUESSOS | awk -F- '{print $3}'`;; esac -# NB: This atalla support has been superceded by the ENGINE support +# NB: This atalla support has been superseded by the ENGINE support # That contains its own header and definitions anyway. Support can # be enabled or disabled on any supported platform without external # headers, eg. by adding the "hw-atalla" switch to ./config or diff --git a/crypto/asn1/tasn_utl.c b/crypto/asn1/tasn_utl.c index ca9ec7a32f..977564d6a9 100644 --- a/crypto/asn1/tasn_utl.c +++ b/crypto/asn1/tasn_utl.c @@ -95,7 +95,7 @@ int asn1_set_choice_selector(ASN1_VALUE **pval, int value, const ASN1_ITEM *it) /* Do reference counting. The value 'op' decides what to do. * if it is +1 then the count is incremented. If op is 0 count is * set to 1. If op is -1 count is decremented and the return value - * is the current refrence count or 0 if no reference count exists. + * is the current reference count or 0 if no reference count exists. */ int asn1_do_lock(ASN1_VALUE **pval, int op, const ASN1_ITEM *it) diff --git a/crypto/bn/asm/README b/crypto/bn/asm/README index b0f3a68a06..542894deee 100644 --- a/crypto/bn/asm/README +++ b/crypto/bn/asm/README @@ -19,7 +19,7 @@ a 2 times speedup :-). There are 3 versions of assember for the HP PA-RISC. -pa-risc.s is the origional one which works fine and generated using gcc :-) +pa-risc.s is the original one which works fine and generated using gcc :-) pa-risc2W.s and pa-risc2.s are 64 and 32-bit PA-RISC 2.0 implementations by Chris Ruemmler from HP (with some help from the HP C compiler). diff --git a/crypto/bn/asm/sparcv8plus.S b/crypto/bn/asm/sparcv8plus.S index b45bc24088..915a4e781a 100644 --- a/crypto/bn/asm/sparcv8plus.S +++ b/crypto/bn/asm/sparcv8plus.S @@ -71,7 +71,7 @@ * * Q. 64-bit registers under 32-bit kernels? Didn't you just say it * doesn't work? - * A. You can't adress *all* registers as 64-bit wide:-( The catch is + * A. You can't address *all* registers as 64-bit wide:-( The catch is * that you actually may rely upon %o0-%o5 and %g1-%g4 being fully * preserved if you're in a leaf function, i.e. such never calling * any other functions. All functions in this module are leaf and diff --git a/crypto/bn/asm/sparcv9a-mont.pl b/crypto/bn/asm/sparcv9a-mont.pl index a14205f2f0..4cde041ce5 100755 --- a/crypto/bn/asm/sparcv9a-mont.pl +++ b/crypto/bn/asm/sparcv9a-mont.pl @@ -867,7 +867,7 @@ ___ $code =~ s/\`([^\`]*)\`/eval($1)/gem; # Below substitution makes it possible to compile without demanding -# VIS extentions on command line, e.g. -xarch=v9 vs. -xarch=v9a. I +# VIS extensions on command line, e.g. -xarch=v9 vs. -xarch=v9a. I # dare to do this, because VIS capability is detected at run-time now # and this routine is not called on CPU not capable to execute it. Do # note that fzeros is not the only VIS dependency! Another dependency diff --git a/crypto/bn/asm/vis3-mont.pl b/crypto/bn/asm/vis3-mont.pl index a1357de0e9..8da52c638c 100644 --- a/crypto/bn/asm/vis3-mont.pl +++ b/crypto/bn/asm/vis3-mont.pl @@ -333,7 +333,7 @@ ___ # Purpose of these subroutines is to explicitly encode VIS instructions, # so that one can compile the module without having to specify VIS -# extentions on compiler command line, e.g. -xarch=v9 vs. -xarch=v9a. +# extensions on compiler command line, e.g. -xarch=v9 vs. -xarch=v9a. # Idea is to reserve for option to produce "universal" binary and let # programmer detect if current CPU is VIS capable at run-time. sub unvis3 { diff --git a/crypto/bn/todo b/crypto/bn/todo index e47e381aea..61e970f622 1 |