summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rwxr-xr-xConfigure4
-rw-r--r--INSTALL.md2
-rw-r--r--README-ENGINES.md2
-rw-r--r--apps/cmp.c2
-rw-r--r--apps/include/http_server.h2
-rw-r--r--configdata.pm.in4
-rwxr-xr-xcrypto/aes/asm/aesv8-armx.pl6
-rw-r--r--crypto/bn/asm/rsaz-2k-avx512.pl2
-rw-r--r--crypto/bn/asm/rsaz-3k-avx512.pl2
-rw-r--r--crypto/bn/asm/rsaz-4k-avx512.pl2
-rw-r--r--crypto/cmp/cmp_vfy.c6
-rw-r--r--crypto/context.c2
-rw-r--r--crypto/ec/ec2_oct.c2
-rw-r--r--crypto/encode_decode/encoder_lib.c2
-rw-r--r--crypto/evp/ctrl_params_translate.c2
-rw-r--r--crypto/evp/m_sigver.c2
-rw-r--r--crypto/ffc/ffc_params_generate.c2
-rw-r--r--crypto/rand/rand_egd.c2
-rw-r--r--crypto/rsa/rsa_lib.c2
-rw-r--r--crypto/x509/v3_ist.c2
-rw-r--r--crypto/x509/v3_utf8.c2
-rw-r--r--crypto/x509/v3_utl.c2
-rw-r--r--crypto/x509/x_pubkey.c2
-rw-r--r--demos/mac/gmac.c2
-rw-r--r--dev/release-aux/README.md2
-rwxr-xr-xdev/release.sh4
-rw-r--r--doc/internal/man3/OPTIONS.pod2
-rw-r--r--doc/internal/man3/ossl_random_add_conf_module.pod2
-rw-r--r--doc/internal/man7/EVP_PKEY.pod2
-rw-r--r--doc/man1/openssl-genpkey.pod.in4
-rw-r--r--doc/man1/openssl-s_client.pod.in2
-rw-r--r--doc/man1/openssl-verification-options.pod2
-rw-r--r--doc/man3/ASN1_aux_cb.pod4
-rw-r--r--doc/man3/ASN1_item_sign.pod4
-rw-r--r--doc/man3/BIO_s_core.pod2
-rw-r--r--doc/man3/BN_rand.pod2
-rw-r--r--doc/man3/CONF_modules_load_file.pod2
-rw-r--r--doc/man3/DH_get0_pqg.pod2
-rw-r--r--doc/man3/EVP_EncryptInit.pod2
-rw-r--r--doc/man3/EVP_KEYMGMT.pod2
-rw-r--r--doc/man3/EVP_PKEY2PKCS8.pod2
-rw-r--r--doc/man3/EVP_PKEY_derive.pod2
-rw-r--r--doc/man3/EVP_PKEY_gettable_params.pod2
-rw-r--r--doc/man3/EVP_PKEY_new.pod2
-rw-r--r--doc/man3/EVP_PKEY_todata.pod2
-rw-r--r--doc/man3/OCSP_resp_find_status.pod2
-rw-r--r--doc/man3/OCSP_sendreq_new.pod2
-rw-r--r--doc/man3/OSSL_CMP_log_open.pod2
-rw-r--r--doc/man3/OSSL_DECODER.pod2
-rw-r--r--doc/man3/OSSL_DECODER_CTX_new_for_pkey.pod4
-rw-r--r--doc/man3/OSSL_ENCODER.pod2
-rw-r--r--doc/man3/OSSL_ENCODER_CTX.pod4
-rw-r--r--doc/man3/OSSL_ENCODER_CTX_new_for_pkey.pod2
-rw-r--r--doc/man3/OSSL_ESS_check_signing_certs.pod2
-rw-r--r--doc/man3/OSSL_HTTP_REQ_CTX.pod2
-rw-r--r--doc/man3/OSSL_HTTP_parse_url.pod2
-rw-r--r--doc/man3/OSSL_PARAM.pod2
-rw-r--r--doc/man3/OSSL_PARAM_int.pod6
-rw-r--r--doc/man3/OSSL_STORE_LOADER.pod2
-rw-r--r--doc/man3/OSSL_trace_set_channel.pod2
-rw-r--r--doc/man3/PKCS12_decrypt_skey.pod2
-rw-r--r--doc/man3/PKCS12_gen_mac.pod2
-rw-r--r--doc/man3/RAND_bytes.pod2
-rw-r--r--doc/man3/RSA_get0_key.pod2
-rw-r--r--doc/man3/SSL_CTX_set_tmp_dh_callback.pod4
-rw-r--r--doc/man3/X509_VERIFY_PARAM_set_flags.pod2
-rw-r--r--doc/man3/X509_add_cert.pod2
-rw-r--r--doc/man3/X509_digest.pod4
-rw-r--r--doc/man3/X509_dup.pod2
-rw-r--r--doc/man5/config.pod2
-rw-r--r--doc/man7/EVP_PKEY-EC.pod6
-rw-r--r--doc/man7/crypto.pod2
-rw-r--r--doc/man7/fips_module.pod2
-rw-r--r--doc/man7/life_cycle-pkey.pod4
-rw-r--r--doc/man7/migration_guide.pod10
-rw-r--r--doc/man7/openssl-glossary.pod6
-rw-r--r--doc/man7/provider-kdf.pod2
-rw-r--r--doc/man7/provider-object.pod2
-rw-r--r--include/openssl/core_dispatch.h2
-rw-r--r--providers/implementations/ciphers/cipher_aes_gcm_hw_armv8.inc2
-rw-r--r--providers/implementations/encode_decode/encode_key2any.c2
-rw-r--r--providers/implementations/keymgmt/kdf_legacy_kmgmt.c2
-rw-r--r--providers/implementations/keymgmt/mac_legacy_kmgmt.c2
-rw-r--r--providers/implementations/signature/sm2_sig.c6
-rw-r--r--ssl/statem/statem_srvr.c2
-rw-r--r--test/cmp_vfy_test.c2
-rw-r--r--test/evp_extra_test.c4
-rw-r--r--test/param_build_test.c4
-rw-r--r--test/params_api_test.c2
-rw-r--r--test/params_test.c2
-rw-r--r--test/recipes/70-test_sslrecords.t2
-rw-r--r--test/recipes/90-test_threads.t2
-rw-r--r--test/ssl-tests/28-seclevel.cnf.in4
-rw-r--r--test/sslapitest.c2
-rw-r--r--test/tls-provider.c6
-rw-r--r--util/add-depends.pl2
-rwxr-xr-xutil/check-format.pl8
97 files changed, 132 insertions, 132 deletions
diff --git a/Configure b/Configure
index bf6c568a4c..34a487a0a2 100755
--- a/Configure
+++ b/Configure
@@ -603,7 +603,7 @@ my @disable_cascades = (
# Without shared libraries, dynamic engines aren't possible.
# This is due to them having to link with libcrypto and register features
# using the ENGINE functionality, and since that relies on global tables,
- # those *have* to be exacty the same as the ones accessed from the app,
+ # those *have* to be exactly the same as the ones accessed from the app,
# which cannot be guaranteed if shared libraries aren't present.
# (note that even with shared libraries, both the app and dynamic engines
# must be linked with the same library)
@@ -1800,7 +1800,7 @@ my %skipdir = ();
my %disabled_info = (); # For configdata.pm
foreach my $what (sort keys %disabled) {
# There are deprecated disablables that translate to themselves.
- # They cause disabling cascades, but should otherwise not regiter.
+ # They cause disabling cascades, but should otherwise not register.
next if $deprecated_disablables{$what};
# The generated $disabled{"deprecated-x.y"} entries are special
# and treated properly elsewhere
diff --git a/INSTALL.md b/INSTALL.md
index 40ca7090b5..09ea2d678f 100644
--- a/INSTALL.md
+++ b/INSTALL.md
@@ -1597,7 +1597,7 @@ working incorrectly. If you think you encountered a bug, please
Along with a short description of the bug, please provide the complete
configure command line and the relevant output including the error message.
-Note: To make the output readable, pleace add a 'code fence' (three backquotes
+Note: To make the output readable, please add a 'code fence' (three backquotes
` ``` ` on a separate line) before and after your output:
```
diff --git a/README-ENGINES.md b/README-ENGINES.md
index b05ddaa1b6..9992cebe22 100644
--- a/README-ENGINES.md
+++ b/README-ENGINES.md
@@ -8,7 +8,7 @@ The ENGINE API was introduced in OpenSSL version 0.9.6 as a low level
interface for adding alternative implementations of cryptographic
primitives, most notably for integrating hardware crypto devices.
-The ENGINE interface has its limitations and it has been superseeded
+The ENGINE interface has its limitations and it has been superseded
by the [PROVIDER API](README-PROVIDERS.md), it is deprecated in OpenSSL
version 3.0. The following documentation is retained as an aid for
users who need to maintain or support existing ENGINE implementations.
diff --git a/apps/cmp.c b/apps/cmp.c
index 2e4867b0db..830e4cb9c8 100644
--- a/apps/cmp.c
+++ b/apps/cmp.c
@@ -1115,7 +1115,7 @@ static OSSL_CMP_SRV_CTX *setup_srv_ctx(ENGINE *engine)
if (opt_grant_implicitconf)
(void)OSSL_CMP_SRV_CTX_set_grant_implicit_confirm(srv_ctx, 1);
- if (opt_failure != INT_MIN) { /* option has been set explicity */
+ if (opt_failure != INT_MIN) { /* option has been set explicitly */
if (opt_failure < 0 || OSSL_CMP_PKIFAILUREINFO_MAX < opt_failure) {
CMP_err1("-failure out of range, should be >= 0 and <= %d",
OSSL_CMP_PKIFAILUREINFO_MAX);
diff --git a/apps/include/http_server.h b/apps/include/http_server.h
index 3a81cbb140..29a0b3d26f 100644
--- a/apps/include/http_server.h
+++ b/apps/include/http_server.h
@@ -94,7 +94,7 @@ int http_server_get_asn1_req(const ASN1_ITEM *it, ASN1_VALUE **preq,
* Send an ASN.1-formatted HTTP response
* cbio: destination BIO (typically as returned by http_server_get_asn1_req())
* note: cbio should not do an encoding that changes the output length
- * keep_alive: grant persistent connnection
+ * keep_alive: grant persistent connection
* content_type: string identifying the type of the response
* it: the response ASN.1 type
* resp: the response to send
diff --git a/configdata.pm.in b/configdata.pm.in
index 14da489cd3..2dfb7d8d70 100644
--- a/configdata.pm.in
+++ b/configdata.pm.in
@@ -20,7 +20,7 @@
# Unix form /VOLUME/DIR1/DIR2/FILE, which is what VMS perl supports
# for 'use lib'.
- # Start with spliting the native path
+ # Start with splitting the native path
(my $vol, my $dirs, my $file) = File::Spec->splitpath($path);
my @dirs = File::Spec->splitdir($dirs);
@@ -88,7 +88,7 @@ unless (caller) {
if (scalar @ARGV == 0) {
# With no arguments, re-create the build file
# We do that in two steps, where the first step emits perl
- # snipets.
+ # snippets.
my $buildfile = $target{build_file};
my $buildfile_template = "$buildfile.in";
diff --git a/crypto/aes/asm/aesv8-armx.pl b/crypto/aes/asm/aesv8-armx.pl
index 3ae327b49a..c323179b2b 100755
--- a/crypto/aes/asm/aesv8-armx.pl
+++ b/crypto/aes/asm/aesv8-armx.pl
@@ -417,7 +417,7 @@ ___
# If lsize < 3*16 bytes, treat them as the tail, interleave the
# two blocks AES instructions.
# There is one special case, if the original input data size dsize
-# = 16 bytes, we will treat it seperately to improve the
+# = 16 bytes, we will treat it separately to improve the
# performance: one independent code block without LR, FP load and
# store, just looks like what the original ECB implementation does.
@@ -2162,7 +2162,7 @@ ___
# will be processed specially, which be integrated into the 5*16 bytes
# loop to improve the efficiency.
# There is one special case, if the original input data size dsize
-# = 16 bytes, we will treat it seperately to improve the
+# = 16 bytes, we will treat it separately to improve the
# performance: one independent code block without LR, FP load and
# store.
# Encryption will process the (length -tailcnt) bytes as mentioned
@@ -3495,7 +3495,7 @@ $code.=<<___ if ($flavour =~ /64/);
cbnz x2,.Lxts_dec_1st_done
vld1.32 {$dat0},[$inp],#16
- // Decrypt the last secod block to get the last plain text block
+ // Decrypt the last second block to get the last plain text block
.Lxts_dec_1st_done:
eor $tmpin,$dat0,$iv1
ldr $rounds,[$key1,#240]
diff --git a/crypto/bn/asm/rsaz-2k-avx512.pl b/crypto/bn/asm/rsaz-2k-avx512.pl
index aec5470387..46302e890e 100644
--- a/crypto/bn/asm/rsaz-2k-avx512.pl
+++ b/crypto/bn/asm/rsaz-2k-avx512.pl
@@ -88,7 +88,7 @@ ___
# specified in the original algorithm as according to the Lemma 1 from the paper
# [2], the result will be always < 2*m and can be used as a direct input to
# the next AMM iteration. This post-condition is true, provided the correct
-# parameter |s| (notion of the Lemma 1 from [2]) is choosen, i.e. s >= n + 2 * k,
+# parameter |s| (notion of the Lemma 1 from [2]) is chosen, i.e. s >= n + 2 * k,
# which matches our case: 1040 > 1024 + 2 * 1.
#
# [1] Gueron, S. Efficient software implementations of modular exponentiation.
diff --git a/crypto/bn/asm/rsaz-3k-avx512.pl b/crypto/bn/asm/rsaz-3k-avx512.pl
index e294afd294..5e8fa4b35b 100644
--- a/crypto/bn/asm/rsaz-3k-avx512.pl
+++ b/crypto/bn/asm/rsaz-3k-avx512.pl
@@ -75,7 +75,7 @@ if ($avx512ifma>0) {{{
# specified in the original algorithm as according to the Lemma 1 from the paper
# [2], the result will be always < 2*m and can be used as a direct input to
# the next AMM iteration. This post-condition is true, provided the correct
-# parameter |s| (notion of the Lemma 1 from [2]) is choosen, i.e. s >= n + 2 * k,
+# parameter |s| (notion of the Lemma 1 from [2]) is chosen, i.e. s >= n + 2 * k,
# which matches our case: 1560 > 1536 + 2 * 1.
#
# [1] Gueron, S. Efficient software implementations of modular exponentiation.
diff --git a/crypto/bn/asm/rsaz-4k-avx512.pl b/crypto/bn/asm/rsaz-4k-avx512.pl
index fb5bf10198..417e6dc809 100644
--- a/crypto/bn/asm/rsaz-4k-avx512.pl
+++ b/crypto/bn/asm/rsaz-4k-avx512.pl
@@ -72,7 +72,7 @@ if ($avx512ifma>0) {{{
# specified in the original algorithm as according to the Lemma 1 from the paper
# [2], the result will be always < 2*m and can be used as a direct input to
# the next AMM iteration. This post-condition is true, provided the correct
-# parameter |s| (notion of the Lemma 1 from [2]) is choosen, i.e. s >= n + 2 * k,
+# parameter |s| (notion of the Lemma 1 from [2]) is chosen, i.e. s >= n + 2 * k,
# which matches our case: 2080 > 2048 + 2 * 1.
#
# [1] Gueron, S. Efficient software implementations of modular exponentiation.
diff --git a/crypto/cmp/cmp_vfy.c b/crypto/cmp/cmp_vfy.c
index e5ca1083d7..00f526229f 100644
--- a/crypto/cmp/cmp_vfy.c
+++ b/crypto/cmp/cmp_vfy.c
@@ -598,7 +598,7 @@ int OSSL_CMP_validate_msg(OSSL_CMP_CTX *ctx, const OSSL_CMP_MSG *msg)
break;
}
ossl_cmp_debug(ctx,
- "sucessfully validated PBM-based CMP message protection");
+ "successfully validated PBM-based CMP message protection");
return 1;
}
ossl_cmp_warn(ctx, "verifying PBM-based CMP message protection failed");
@@ -628,7 +628,7 @@ int OSSL_CMP_validate_msg(OSSL_CMP_CTX *ctx, const OSSL_CMP_MSG *msg)
/* use ctx->srvCert for signature check even if not acceptable */
if (verify_signature(ctx, msg, scrt)) {
ossl_cmp_debug(ctx,
- "sucessfully validated signature-based CMP message protection");
+ "successfully validated signature-based CMP message protection");
return 1;
}
@@ -668,7 +668,7 @@ static int check_transactionID_or_nonce(ASN1_OCTET_STRING *expected,
* Any msg->extraCerts are prepended to ctx->untrusted.
*
* Ensures that:
- * its sender is of appropriate type (curently only X509_NAME) and
+ * its sender is of appropriate type (currently only X509_NAME) and
* matches any expected sender or srvCert subject given in the ctx
* it has a valid body type
* its protection is valid (or invalid/absent, but only if a callback function
diff --git a/crypto/context.c b/crypto/context.c
index a05009a3ef..cc48c92604 100644
--- a/crypto/context.c
+++ b/crypto/context.c
@@ -402,7 +402,7 @@ void *ossl_lib_ctx_get_data(OSSL_LIB_CTX *ctx, int index,
* The alloc call ensures there's a value there. We release the ctx->lock
* for this, because the allocation itself may recursively call
* ossl_lib_ctx_get_data for other indexes (never this one). The allocation
- * will itself aquire the ctx->lock when it actually comes to store the
+ * will itself acquire the ctx->lock when it actually comes to store the
* allocated data (see ossl_lib_ctx_generic_new() above). We call
* ossl_crypto_alloc_ex_data_intern() here instead of CRYPTO_alloc_ex_data().
* They do the same thing except that the latter calls CRYPTO_get_ex_data()
diff --git a/crypto/ec/ec2_oct.c b/crypto/ec/ec2_oct.c
index 10a4932591..0b37c4f802 100644
--- a/crypto/ec/ec2_oct.c
+++ b/crypto/ec/ec2_oct.c
@@ -272,7 +272,7 @@ int ossl_ec_GF2m_simple_oct2point(const EC_GROUP *group, EC_POINT *point,
}
/*
- * The first octet is the point converison octet PC, see X9.62, page 4
+ * The first octet is the point conversion octet PC, see X9.62, page 4
* and section 4.4.2. It must be:
* 0x00 for the point at infinity
* 0x02 or 0x03 for compressed form
diff --git a/crypto/encode_decode/encoder_lib.c b/crypto/encode_decode/encoder_lib.c
index cfd9275172..8d083bd6a6 100644
--- a/crypto/encode_decode/encoder_lib.c
+++ b/crypto/encode_decode/encoder_lib.c
@@ -523,7 +523,7 @@ static int encoder_process(struct encoder_process_data_st *data)
OSSL_TRACE_BEGIN(ENCODER) {
BIO_printf(trc_out,
- "[%d] Skipping because recusion level %d failed\n",
+ "[%d] Skipping because recursion level %d failed\n",
data->level, new_data.level);
} OSSL_TRACE_END(ENCODER);
}
diff --git a/crypto/evp/ctrl_params_translate.c b/crypto/evp/ctrl_params_translate.c
index f6a2d1d0f8..c4589f1416 100644
--- a/