diff options
Diffstat (limited to 'ssl')
-rw-r--r-- | ssl/d1_enc.c | 2 | ||||
-rw-r--r-- | ssl/s3_cbc.c | 2 | ||||
-rw-r--r-- | ssl/s3_clnt.c | 2 | ||||
-rw-r--r-- | ssl/s3_enc.c | 2 | ||||
-rw-r--r-- | ssl/s3_pkt.c | 2 | ||||
-rw-r--r-- | ssl/t1_enc.c | 2 |
6 files changed, 6 insertions, 6 deletions
diff --git a/ssl/d1_enc.c b/ssl/d1_enc.c index 712c4647f2..d242dcad42 100644 --- a/ssl/d1_enc.c +++ b/ssl/d1_enc.c @@ -133,7 +133,7 @@ * short etc). * 1: if the record's padding is valid / the encryption was successful. * -1: if the record's padding/AEAD-authenticator is invalid or, if sending, - * an internal error occured. */ + * an internal error occurred. */ int dtls1_enc(SSL *s, int send) { SSL3_RECORD *rec; diff --git a/ssl/s3_cbc.c b/ssl/s3_cbc.c index ea46c3989e..73e12b6799 100644 --- a/ssl/s3_cbc.c +++ b/ssl/s3_cbc.c @@ -419,7 +419,7 @@ char ssl3_cbc_record_digest_supported(const EVP_MD_CTX *ctx) * md_out: the digest output. At most EVP_MAX_MD_SIZE bytes will be written. * md_out_size: if non-NULL, the number of output bytes is written here. * header: the 13-byte, TLS record header. - * data: the record data itself, less any preceeding explicit IV. + * data: the record data itself, less any preceding explicit IV. * data_plus_mac_size: the secret, reported length of the data and MAC * once the padding has been removed. * data_plus_mac_plus_padding_size: the public length of the whole diff --git a/ssl/s3_clnt.c b/ssl/s3_clnt.c index 018a9f590c..21e09b9394 100644 --- a/ssl/s3_clnt.c +++ b/ssl/s3_clnt.c @@ -1753,7 +1753,7 @@ int ssl3_get_key_exchange(SSL *s) * and the ECParameters in this case is just three bytes. */ param_len=3; - /* Check curve is one of our prefrences, if not server has + /* Check curve is one of our preferences, if not server has * sent an invalid curve. */ if (!tls1_check_curve(s, p, param_len)) diff --git a/ssl/s3_enc.c b/ssl/s3_enc.c index 0282ef4620..b334aba5d3 100644 --- a/ssl/s3_enc.c +++ b/ssl/s3_enc.c @@ -494,7 +494,7 @@ void ssl3_cleanup_key_block(SSL *s) * short etc). * 1: if the record's padding is valid / the encryption was successful. * -1: if the record's padding is invalid or, if sending, an internal error - * occured. + * occurred. */ int ssl3_enc(SSL *s, int send) { diff --git a/ssl/s3_pkt.c b/ssl/s3_pkt.c index e589409906..65b742c119 100644 --- a/ssl/s3_pkt.c +++ b/ssl/s3_pkt.c @@ -485,7 +485,7 @@ printf("\n"); /* A separate 'decryption_failed' alert was introduced with TLS 1.0, * SSL 3.0 only has 'bad_record_mac'. But unless a decryption * failure is directly visible from the ciphertext anyway, - * we should not reveal which kind of error occured -- this + * we should not reveal which kind of error occurred -- this * might become visible to an attacker (e.g. via a logfile) */ al=SSL_AD_BAD_RECORD_MAC; SSLerr(SSL_F_SSL3_GET_RECORD,SSL_R_DECRYPTION_FAILED_OR_BAD_RECORD_MAC); diff --git a/ssl/t1_enc.c b/ssl/t1_enc.c index fdd20d9009..9b707938ba 100644 --- a/ssl/t1_enc.c +++ b/ssl/t1_enc.c @@ -698,7 +698,7 @@ err: * short etc). * 1: if the record's padding is valid / the encryption was successful. * -1: if the record's padding/AEAD-authenticator is invalid or, if sending, - * an internal error occured. + * an internal error occurred. */ int tls1_enc(SSL *s, int send) { |