From e771eea6d8ca3caa48076367ee86c3b55249dcb3 Mon Sep 17 00:00:00 2001 From: Rich Salz Date: Mon, 4 Apr 2016 16:11:43 -0400 Subject: Revert "various spelling fixes" This reverts commit 620d540bd47a96fb6905fbbdd8ea5167a8841a3e. It wasn't reviewed. Reviewed-by: Rich Salz --- include/openssl/ct.h | 8 ++++---- include/openssl/dh.h | 2 +- include/openssl/dsa.h | 2 +- include/openssl/ec.h | 12 ++++++------ include/openssl/srp.h | 2 +- include/openssl/tls1.h | 2 +- include/openssl/ui.h | 4 ++-- include/openssl/x509_vfy.h | 2 +- 8 files changed, 17 insertions(+), 17 deletions(-) (limited to 'include') diff --git a/include/openssl/ct.h b/include/openssl/ct.h index fa25c69d9b..0da3125d17 100644 --- a/include/openssl/ct.h +++ b/include/openssl/ct.h @@ -367,7 +367,7 @@ __owur int SCT_LIST_validate(const STACK_OF(SCT) *scts, * for data that caller is responsible for freeing (only if function returns * successfully). * If "pp" is NULL and "*pp" is not NULL, caller is responsible for ensuring - * that "*pp" is large enough to accept all of the serialized data. + * that "*pp" is large enough to accept all of the serializied data. * Returns < 0 on error, >= 0 indicating bytes written (or would have been) * on success. */ @@ -394,7 +394,7 @@ STACK_OF(SCT) *o2i_SCT_LIST(STACK_OF(SCT) **a, const unsigned char **pp, * for data that caller is responsible for freeing (only if function returns * successfully). * If "pp" is NULL and "*pp" is not NULL, caller is responsible for ensuring - * that "*pp" is large enough to accept all of the serialized data. + * that "*pp" is large enough to accept all of the serializied data. * Returns < 0 on error, >= 0 indicating bytes written (or would have been) * on success. */ @@ -428,7 +428,7 @@ __owur int i2o_SCT(const SCT *sct, unsigned char **out); * Parses an SCT in TLS format and returns it. * If |psct| is not null, it will end up pointing to the parsed SCT. If it * already points to a non-null pointer, the pointer will be free'd. - * |in| should be a pointer to a string containing the TLS-format SCT. + * |in| should be a pointer to a string contianing the TLS-format SCT. * |in| will be advanced to the end of the SCT if parsing succeeds. * |len| should be the length of the SCT in |in|. * Returns NULL if an error occurs. @@ -449,7 +449,7 @@ __owur int i2o_SCT_signature(const SCT *sct, unsigned char **out); /* * Parses an SCT signature in TLS format and populates the |sct| with it. -* |in| should be a pointer to a string containing the TLS-format signature. +* |in| should be a pointer to a string contianing the TLS-format signature. * |in| will be advanced to the end of the signature if parsing succeeds. * |len| should be the length of the signature in |in|. * Returns the number of bytes parsed, or a negative integer if an error occurs. diff --git a/include/openssl/dh.h b/include/openssl/dh.h index 9b3df55b0c..2e021e235b 100644 --- a/include/openssl/dh.h +++ b/include/openssl/dh.h @@ -85,7 +85,7 @@ extern "C" { /* * If this flag is set the DH method is FIPS compliant and can be used in * FIPS mode. This is set in the validated module method. If an application - * sets this flag in its own methods it is its responsibility to ensure the + * sets this flag in its own methods it is its reposibility to ensure the * result is compliant. */ diff --git a/include/openssl/dsa.h b/include/openssl/dsa.h index 29fc86f725..1b045842e0 100644 --- a/include/openssl/dsa.h +++ b/include/openssl/dsa.h @@ -96,7 +96,7 @@ extern "C" { /* * If this flag is set the DSA method is FIPS compliant and can be used in * FIPS mode. This is set in the validated module method. If an application - * sets this flag in its own methods it is its responsibility to ensure the + * sets this flag in its own methods it is its reposibility to ensure the * result is compliant. */ diff --git a/include/openssl/ec.h b/include/openssl/ec.h index 9a99091c83..892239dd87 100644 --- a/include/openssl/ec.h +++ b/include/openssl/ec.h @@ -241,7 +241,7 @@ int EC_GROUP_get_order(const EC_GROUP *group, BIGNUM *order, BN_CTX *ctx); const BIGNUM *EC_GROUP_get0_order(const EC_GROUP *group); -/** Gets the number of bits of the order of an EC_GROUP +/** Gets the number of bits of ther order of an EC_GROUP * \param group EC_GROUP object * \return number of bits of group order. */ @@ -438,7 +438,7 @@ typedef struct { /* * EC_builtin_curves(EC_builtin_curve *r, size_t size) returns number of all - * available curves or zero if a error occurred. In case r is not zero, + * available curves or zero if a error occurred. In case r ist not zero * nitems EC_builtin_curve structures are filled with the data of the first * nitems internal groups */ @@ -711,7 +711,7 @@ int EC_POINTs_make_affine(const EC_GROUP *group, size_t num, * \param group underlying EC_GROUP object * \param r EC_POINT object for the result * \param n BIGNUM with the multiplier for the group generator (optional) - * \param num number further summands + * \param num number futher summands * \param p array of size num of EC_POINT objects * \param m array of size num of BIGNUM objects * \param ctx BN_CTX object (optional) @@ -918,7 +918,7 @@ int EC_KEY_check_key(const EC_KEY *key); */ int EC_KEY_can_sign(const EC_KEY *eckey); -/** Sets a public key from affine coordinates performing +/** Sets a public key from affine coordindates performing * necessary NIST PKV tests. * \param key the EC_KEY object * \param x public key x coordinate @@ -1142,7 +1142,7 @@ ECDSA_SIG *ECDSA_do_sign(const unsigned char *dgst, int dgst_len, * \param dgst pointer to the hash value to sign * \param dgstlen length of the hash value * \param kinv BIGNUM with a pre-computed inverse k (optional) - * \param rp BIGNUM with a pre-computed rp value (optional), + * \param rp BIGNUM with a pre-computed rp value (optioanl), * see ECDSA_sign_setup * \param eckey EC_KEY object containing a private EC key * \return pointer to a ECDSA_SIG structure or NULL if an error occurred @@ -1193,7 +1193,7 @@ int ECDSA_sign(int type, const unsigned char *dgst, int dgstlen, * \param sig buffer to hold the DER encoded signature * \param siglen pointer to the length of the returned signature * \param kinv BIGNUM with a pre-computed inverse k (optional) - * \param rp BIGNUM with a pre-computed rp value (optional), + * \param rp BIGNUM with a pre-computed rp value (optioanl), * see ECDSA_sign_setup * \param eckey EC_KEY object containing a private EC key * \return 1 on success and 0 otherwise diff --git a/include/openssl/srp.h b/include/openssl/srp.h index 7a7406ffac..37e7678863 100644 --- a/include/openssl/srp.h +++ b/include/openssl/srp.h @@ -106,7 +106,7 @@ typedef struct SRP_VBASE_st { } SRP_VBASE; /* - * Internal structure storing N and g pair + * Structure interne pour retenir les couples N et g */ typedef struct SRP_gN_st { char *id; diff --git a/include/openssl/tls1.h b/include/openssl/tls1.h index ffc6eb7c5a..c3344e193f 100644 --- a/include/openssl/tls1.h +++ b/include/openssl/tls1.h @@ -156,7 +156,7 @@ extern "C" { #endif -/* Default security level if not overridden at config time */ +/* Default security level if not overriden at config time */ # ifndef OPENSSL_TLS_SECURITY_LEVEL # define OPENSSL_TLS_SECURITY_LEVEL 1 # endif diff --git a/include/openssl/ui.h b/include/openssl/ui.h index 7132ebd949..3d1507ee00 100644 --- a/include/openssl/ui.h +++ b/include/openssl/ui.h @@ -270,7 +270,7 @@ UI_METHOD *UI_OpenSSL(void); display a dialog box after it has been built. a reader This function is called to read a given prompt, maybe from the tty, maybe from a field in a - window. Note that it's called with all string + window. Note that it's called wth all string structures, not only the prompt ones, so it must check such things itself. a closer This function closes the session, maybe by closing @@ -355,7 +355,7 @@ int UI_get_input_flags(UI_STRING *uis); /* Return the actual string to output (the prompt, info or error) */ const char *UI_get0_output_string(UI_STRING *uis); /* - * Return the optional action string to output (the boolean prompt + * Return the optional action string to output (the boolean promtp * instruction) */ const char *UI_get0_action_string(UI_STRING *uis); diff --git a/include/openssl/x509_vfy.h b/include/openssl/x509_vfy.h index 33d5e455f3..093b0f3d0a 100644 --- a/include/openssl/x509_vfy.h +++ b/include/openssl/x509_vfy.h @@ -391,7 +391,7 @@ void X509_STORE_CTX_set_depth(X509_STORE_CTX *ctx, int depth); # define X509_V_FLAG_EXTENDED_CRL_SUPPORT 0x1000 /* Delta CRL support */ # define X509_V_FLAG_USE_DELTAS 0x2000 -/* Check self-signed CA signature */ +/* Check selfsigned CA signature */ # define X509_V_FLAG_CHECK_SS_SIGNATURE 0x4000 /* Use trusted store first */ # define X509_V_FLAG_TRUSTED_FIRST 0x8000 -- cgit v1.2.3