summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--CHANGES46
-rw-r--r--Configurations/README2
-rw-r--r--Configurations/common.tmpl2
-rwxr-xr-xConfigure8
-rw-r--r--NEWS8
-rw-r--r--README2
-rw-r--r--apps/ocsp.c2
-rw-r--r--apps/progs.pl2
-rw-r--r--apps/vms_term_sock.c2
-rwxr-xr-xcrypto/aes/asm/aes-586.pl16
-rw-r--r--crypto/aes/asm/aes-mips.pl2
-rw-r--r--crypto/aes/asm/aes-parisc.pl2
-rw-r--r--crypto/aes/asm/aes-s390x.pl2
-rwxr-xr-xcrypto/aes/asm/aes-x86_64.pl2
-rw-r--r--crypto/aes/asm/aesfx-sparcv9.pl2
-rw-r--r--crypto/aes/asm/aesni-mb-x86_64.pl8
-rw-r--r--crypto/aes/asm/aesni-x86.pl2
-rw-r--r--crypto/aes/asm/aesni-x86_64.pl16
-rw-r--r--crypto/aes/asm/aest4-sparcv9.pl2
-rwxr-xr-xcrypto/aes/asm/aesv8-armx.pl4
-rwxr-xr-xcrypto/aes/asm/vpaes-armv8.pl4
-rw-r--r--crypto/arm_arch.h2
-rw-r--r--crypto/asn1/standard_methods.h2
-rw-r--r--crypto/bn/asm/c64xplus-gf2m.pl2
-rw-r--r--crypto/bn/asm/ia64.S10
-rw-r--r--crypto/bn/asm/parisc-mont.pl2
-rw-r--r--crypto/bn/asm/ppc-mont.pl2
-rw-r--r--crypto/bn/asm/ppc64-mont.pl4
-rw-r--r--crypto/bn/asm/s390x-gf2m.pl2
-rw-r--r--crypto/bn/asm/sparcv8.S10
-rw-r--r--crypto/bn/asm/sparcv8plus.S10
-rw-r--r--crypto/bn/asm/sparcv9-mont.pl2
-rwxr-xr-xcrypto/bn/asm/sparcv9a-mont.pl2
-rw-r--r--crypto/bn/asm/vis3-mont.pl2
-rw-r--r--crypto/bn/asm/x86-gf2m.pl2
-rwxr-xr-xcrypto/bn/asm/x86-mont.pl2
-rw-r--r--crypto/bn/asm/x86_64-gf2m.pl2
-rwxr-xr-xcrypto/bn/asm/x86_64-mont.pl4
-rwxr-xr-xcrypto/bn/asm/x86_64-mont5.pl4
-rw-r--r--crypto/c64xpluscpuid.pl2
-rw-r--r--crypto/camellia/asm/cmllt4-sparcv9.pl4
-rwxr-xr-xcrypto/chacha/asm/chacha-c64xplus.pl2
-rw-r--r--crypto/des/asm/des-586.pl2
-rw-r--r--crypto/des/asm/des_enc.m416
-rw-r--r--crypto/des/cfb_enc.c2
-rwxr-xr-xcrypto/ec/asm/ecp_nistz256-armv4.pl4
-rwxr-xr-xcrypto/ec/asm/ecp_nistz256-avx2.pl4
-rwxr-xr-xcrypto/ec/asm/ecp_nistz256-ppc64.pl2
-rwxr-xr-xcrypto/ec/asm/ecp_nistz256-sparcv9.pl6
-rw-r--r--crypto/ec/ecdsa_ossl.c2
-rw-r--r--crypto/ec/ecp_nistp224.c2
-rw-r--r--crypto/ec/ecp_oct.c2
-rw-r--r--crypto/engine/README6
-rw-r--r--crypto/include/internal/aria.h4
-rw-r--r--crypto/include/internal/evp_int.h2
-rwxr-xr-xcrypto/modes/asm/ghash-ia64.pl2
-rw-r--r--crypto/modes/asm/ghash-parisc.pl2
-rw-r--r--crypto/modes/asm/ghash-x86.pl2
-rwxr-xr-xcrypto/modes/asm/ghashp8-ppc.pl2
-rw-r--r--crypto/modes/asm/ghashv8-armx.pl8
-rw-r--r--crypto/objects/README2
-rw-r--r--crypto/objects/objects.txt4
-rwxr-xr-xcrypto/perlasm/x86_64-xlate.pl6
-rwxr-xr-xcrypto/poly1305/asm/poly1305-x86.pl2
-rwxr-xr-xcrypto/poly1305/asm/poly1305-x86_64.pl6
-rw-r--r--crypto/rc4/asm/rc4-586.pl2
-rwxr-xr-xcrypto/rc4/asm/rc4-x86_64.pl2
-rw-r--r--crypto/rsa/rsa_pmeth.c2
-rw-r--r--crypto/sha/asm/sha1-586.pl4
-rw-r--r--crypto/sha/asm/sha1-mb-x86_64.pl10
-rwxr-xr-xcrypto/sha/asm/sha1-x86_64.pl6
-rw-r--r--crypto/sha/asm/sha256-586.pl2
-rw-r--r--crypto/sha/asm/sha256-mb-x86_64.pl8
-rw-r--r--crypto/sha/asm/sha512-586.pl2
-rw-r--r--crypto/sha/asm/sha512-armv8.pl2
-rwxr-xr-xcrypto/sha/asm/sha512-parisc.pl2
-rwxr-xr-xcrypto/sha/asm/sha512-ppc.pl2
-rwxr-xr-xcrypto/sha/asm/sha512p8-ppc.pl2
-rw-r--r--crypto/sha/keccak1600.c2
-rw-r--r--crypto/sha/sha_locl.h2
-rw-r--r--crypto/x86cpuid.pl2
-rw-r--r--demos/bio/cmod.cnf2
-rw-r--r--engines/e_afalg.c2
-rw-r--r--include/openssl/engine.h2
-rw-r--r--include/openssl/ui.h2
-rwxr-xr-xms/segrenam.pl2
-rw-r--r--ssl/ssl_locl.h2
-rw-r--r--test/README.external2
-rw-r--r--test/build.info2
-rwxr-xr-xtest/certs/mkcert.sh4
-rw-r--r--test/pkits-test.pl4
-rw-r--r--test/recipes/25-test_verify.t6
-rw-r--r--test/recipes/70-test_key_share.t2
-rw-r--r--test/recipes/70-test_sslmessages.t2
-rw-r--r--test/recipes/70-test_sslrecords.t6
-rw-r--r--test/recipes/70-test_tls13kexmodes.t8
-rw-r--r--test/recipes/80-test_pkcs12.t2
-rw-r--r--test/recipes/80-test_ssl_old.t2
-rw-r--r--test/sanitytest.c4
-rw-r--r--test/testutil/output.h2
-rw-r--r--util/dofile.pl2
-rwxr-xr-xutil/find-doc-nits2
-rw-r--r--util/indent.pro2
-rwxr-xr-xutil/mkdef.pl4
-rw-r--r--util/perl/OpenSSL/Test.pm8
105 files changed, 214 insertions, 214 deletions
diff --git a/CHANGES b/CHANGES
index c35990e2af..0b0c3cab2d 100644
--- a/CHANGES
+++ b/CHANGES
@@ -889,7 +889,7 @@
*) Add support for setting the minimum and maximum supported protocol.
It can bet set via the SSL_set_min_proto_version() and
SSL_set_max_proto_version(), or via the SSL_CONF's MinProtocol and
- MaxProtcol. It's recommended to use the new APIs to disable
+ MaxProtocol. It's recommended to use the new APIs to disable
protocols instead of disabling individual protocols using
SSL_set_options() or SSL_CONF's Protocol. This change also
removes support for disabling TLS 1.2 in the OpenSSL TLS
@@ -2853,7 +2853,7 @@
*) OpenSSL 1.0.0 sets SSL_OP_ALL to 0x80000FFFL and OpenSSL 1.0.1 and
1.0.1a set SSL_OP_NO_TLSv1_1 to 0x00000400L which would unfortunately
mean any application compiled against OpenSSL 1.0.0 headers setting
- SSL_OP_ALL would also set SSL_OP_NO_TLSv1_1, unintentionally disablng
+ SSL_OP_ALL would also set SSL_OP_NO_TLSv1_1, unintentionally disabling
TLS 1.1 also. Fix this by changing the value of SSL_OP_NO_TLSv1_1 to
0x10000000L Any application which was previously compiled against
OpenSSL 1.0.1 or 1.0.1a headers and which cares about SSL_OP_NO_TLSv1_1
@@ -2862,7 +2862,7 @@
in unlike event, limit maximum offered version to TLS 1.0 [see below].
[Steve Henson]
- *) In order to ensure interoperabilty SSL_OP_NO_protocolX does not
+ *) In order to ensure interoperability SSL_OP_NO_protocolX does not
disable just protocol X, but all protocols above X *if* there are
protocols *below* X still enabled. In more practical terms it means
that if application wants to disable TLS1.0 in favor of TLS1.1 and
@@ -3630,7 +3630,7 @@
SSL_set_tlsext_opaque_prf_input(ssl, src, len) is used to set the
opaque PRF input value to use in the handshake. This will create
- an interal copy of the length-'len' string at 'src', and will
+ an internal copy of the length-'len' string at 'src', and will
return non-zero for success.
To get more control and flexibility, provide a callback function
@@ -3740,8 +3740,8 @@
most recently disabled ciphersuites when "HIGH" is parsed).
Also, change ssl_create_cipher_list() (using this new
- funcionality) such that between otherwise identical
- cihpersuites, ephemeral ECDH is preferred over ephemeral DH in
+ functionality) such that between otherwise identical
+ ciphersuites, ephemeral ECDH is preferred over ephemeral DH in
the default order.
[Bodo Moeller]
@@ -3920,7 +3920,7 @@
functional reference processing.
[Steve Henson]
- *) New functions EVP_Digest{Sign,Verify)*. These are enchance versions of
+ *) New functions EVP_Digest{Sign,Verify)*. These are enhanced versions of
EVP_{Sign,Verify}* which allow an application to customise the signature
process.
[Steve Henson]
@@ -4133,7 +4133,7 @@
*) New option SSL_OP_NO_COMP to disable use of compression selectively
in SSL structures. New SSL ctrl to set maximum send fragment size.
- Save memory by seeting the I/O buffer sizes dynamically instead of
+ Save memory by setting the I/O buffer sizes dynamically instead of
using the maximum available value.
[Steve Henson]
@@ -4192,7 +4192,7 @@
Changes between 0.9.8l and 0.9.8m [25 Feb 2010]
- *) Always check bn_wexpend() return values for failure. (CVE-2009-3245)
+ *) Always check bn_wexpand() return values for failure. (CVE-2009-3245)
[Martin Olsson, Neel Mehta]
*) Fix X509_STORE locking: Every 'objs' access requires a lock (to
@@ -4325,7 +4325,7 @@
is already buffered was missing. For every new message was memory
allocated, allowing an attacker to perform an denial of service attack
with sending out of seq handshake messages until there is no memory
- left. Additionally every future messege was buffered, even if the
+ left. Additionally every future message was buffered, even if the
sequence number made no sense and would be part of another handshake.
So only messages with sequence numbers less than 10 in advance will be
buffered. (CVE-2009-1378)
@@ -4509,7 +4509,7 @@
Changes between 0.9.8g and 0.9.8h [28 May 2008]
*) Fix flaw if 'Server Key exchange message' is omitted from a TLS
- handshake which could lead to a cilent crash as found using the
+ handshake which could lead to a client crash as found using the
Codenomicon TLS test suite (CVE-2008-1672)
[Steve Henson, Mark Cox]
@@ -4943,7 +4943,7 @@
*) Disable the padding bug check when compression is in use. The padding
bug check assumes the first packet is of even length, this is not
- necessarily true if compresssion is enabled and can result in false
+ necessarily true if compression is enabled and can result in false
positives causing handshake failure. The actual bug test is ancient
code so it is hoped that implementations will either have fixed it by
now or any which still have the bug do not support compression.
@@ -5172,7 +5172,7 @@
we can fix the problem directly in the 'ca' utility.)
[Steve Henson]
- *) Reduced header interdepencies by declaring more opaque objects in
+ *) Reduced header interdependencies by declaring more opaque objects in
ossl_typ.h. As a consequence, including some headers (eg. engine.h) will
give fewer recursive includes, which could break lazy source code - so
this change is covered by the OPENSSL_NO_DEPRECATED symbol. As always,
@@ -5396,7 +5396,7 @@
named like the index file with '.attr' appended to the name.
[Richard Levitte]
- *) Generate muti valued AVAs using '+' notation in config files for
+ *) Generate multi-valued AVAs using '+' notation in config files for
req and dirName.
[Steve Henson]
@@ -5937,7 +5937,7 @@
draft-ietf-tls-56-bit-ciphersuites-0[01].txt, but do not really
appear there.
- Also deactive the remaining ciphersuites from
+ Also deactivate the remaining ciphersuites from
draft-ietf-tls-56-bit-ciphersuites-01.txt. These are just as
unofficial, and the ID has long expired.
[Bodo Moeller]
@@ -6580,9 +6580,9 @@
*) Add an "init" command to the ENGINE config module and auto initialize
ENGINEs. Without any "init" command the ENGINE will be initialized
after all ctrl commands have been executed on it. If init=1 the
- ENGINE is initailized at that point (ctrls before that point are run
+ ENGINE is initialized at that point (ctrls before that point are run
on the uninitialized ENGINE and after on the initialized one). If
- init=0 then the ENGINE will not be iniatialized at all.
+ init=0 then the ENGINE will not be initialized at all.
[Steve Henson]
*) Fix the 'app_verify_callback' interface so that the user-defined
@@ -6839,7 +6839,7 @@
*) Major restructuring to the underlying ENGINE code. This includes
reduction of linker bloat, separation of pure "ENGINE" manipulation
(initialisation, etc) from functionality dealing with implementations
- of specific crypto iterfaces. This change also introduces integrated
+ of specific crypto interfaces. This change also introduces integrated
support for symmetric ciphers and digest implementations - so ENGINEs
can now accelerate these by providing EVP_CIPHER and EVP_MD
implementations of their own. This is detailed in crypto/engine/README
@@ -7843,7 +7843,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
[Steve Henson]
*) Enhance mkdef.pl to be more accepting about spacing in C preprocessor
- lines, recognice more "algorithms" that can be deselected, and make
+ lines, recognize more "algorithms" that can be deselected, and make
it complain about algorithm deselection that isn't recognised.
[Richard Levitte]
@@ -8241,7 +8241,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
Changes between 0.9.6h and 0.9.6i [19 Feb 2003]
*) In ssl3_get_record (ssl/s3_pkt.c), minimize information leaked
- via timing by performing a MAC computation even if incorrrect
+ via timing by performing a MAC computation even if incorrect
block cipher padding has been found. This is a countermeasure
against active attacks where the attacker has to distinguish
between bad padding and a MAC verification error. (CVE-2003-0078)
@@ -9879,7 +9879,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
ssl_cert_dup, which is used by SSL_new, now copies DH keys in addition
to parameters -- in previous versions (since OpenSSL 0.9.3) the
'default key' from SSL_CTX_set_tmp_dh would always be lost, meaning
- you effectivly got SSL_OP_SINGLE_DH_USE when using this macro.
+ you effectively got SSL_OP_SINGLE_DH_USE when using this macro.
[Bodo Moeller]
*) New s_client option -ign_eof: EOF at stdin is ignored, and
@@ -1