diff options
Diffstat (limited to 'ssl')
-rw-r--r-- | ssl/d1_lib.c | 4 | ||||
-rw-r--r-- | ssl/ssl_conf.c | 2 | ||||
-rw-r--r-- | ssl/ssl_err.c | 4 | ||||
-rw-r--r-- | ssl/ssl_lib.c | 4 | ||||
-rw-r--r-- | ssl/t1_enc.c | 2 | ||||
-rw-r--r-- | ssl/t1_lib.c | 2 |
6 files changed, 9 insertions, 9 deletions
diff --git a/ssl/d1_lib.c b/ssl/d1_lib.c index 42a02780c5..ea1e3d5ae9 100644 --- a/ssl/d1_lib.c +++ b/ssl/d1_lib.c @@ -278,7 +278,7 @@ struct timeval *dtls1_get_timeout(SSL *s, struct timeval *timeleft) /* * If remaining time is less than 15 ms, set it to 0 to prevent issues - * because of small devergences with socket timeouts. + * because of small divergences with socket timeouts. */ if (timeleft->tv_sec == 0 && timeleft->tv_usec < 15000) { memset(timeleft, 0, sizeof(*timeleft)); @@ -952,7 +952,7 @@ int dtls1_heartbeat(SSL *s) /*- * Create HeartBeat message, we just use a sequence number - * as payload to distuingish different messages and add + * as payload to distinguish different messages and add * some random stuff. */ size = HEARTBEAT_SIZE(payload, padding); diff --git a/ssl/ssl_conf.c b/ssl/ssl_conf.c index 7b462aade2..890b0af795 100644 --- a/ssl/ssl_conf.c +++ b/ssl/ssl_conf.c @@ -14,7 +14,7 @@ #include <openssl/dh.h> /* - * structure holding name tables. This is used for pemitted elements in lists + * structure holding name tables. This is used for permitted elements in lists * such as TLSv1. */ diff --git a/ssl/ssl_err.c b/ssl/ssl_err.c index 5741bb8255..1b1f4bcc1d 100644 --- a/ssl/ssl_err.c +++ b/ssl/ssl_err.c @@ -443,8 +443,8 @@ static ERR_STRING_DATA SSL_str_reasons[] = { {ERR_REASON(SSL_R_NO_RENEGOTIATION), "no renegotiation"}, {ERR_REASON(SSL_R_NO_REQUIRED_DIGEST), "no required digest"}, {ERR_REASON(SSL_R_NO_SHARED_CIPHER), "no shared cipher"}, - {ERR_REASON(SSL_R_NO_SHARED_SIGATURE_ALGORITHMS), - "no shared sigature algorithms"}, + {ERR_REASON(SSL_R_NO_SHARED_SIGNATURE_ALGORITHMS), + "no shared signature algorithms"}, {ERR_REASON(SSL_R_NO_SRTP_PROFILES), "no srtp profiles"}, {ERR_REASON(SSL_R_NO_VALID_SCTS), "no valid scts"}, {ERR_REASON(SSL_R_NO_VERIFY_COOKIE_CALLBACK), diff --git a/ssl/ssl_lib.c b/ssl/ssl_lib.c index 359260e1f5..08e36733fc 100644 --- a/ssl/ssl_lib.c +++ b/ssl/ssl_lib.c @@ -2041,7 +2041,7 @@ int SSL_get_servername_type(const SSL *s) * is indicated to the callback. In this case, the client application has to * abort the connection or have a default application level protocol. 2) If * the server supports NPN, but advertises an empty list then the client - * selects the first protcol in its list, but indicates via the API that this + * selects the first protocol in its list, but indicates via the API that this * fallback case was enacted. 3) Otherwise, the client finds the first * protocol in the server's list that it supports and selects this protocol. * This is because it's assumed that the server has better information about @@ -4116,7 +4116,7 @@ int ssl_validate_ct(SSL *s) * value is negative. * * XXX: One might well argue that the return value of this function is an - * unforunate design choice. Its job is only to determine the validation + * unfortunate design choice. Its job is only to determine the validation * status of each of the provided SCTs. So long as it correctly separates * the wheat from the chaff it should return success. Failure in this case * ought to correspond to an inability to carry out its duties. diff --git a/ssl/t1_enc.c b/ssl/t1_enc.c index 920a178513..124a53c5a8 100644 --- a/ssl/t1_enc.c +++ b/ssl/t1_enc.c @@ -141,7 +141,7 @@ int tls1_change_cipher_state(SSL *s, int which) goto err; else /* - * make sure it's intialized in case we exit later with an error + * make sure it's initialised in case we exit later with an error */ EVP_CIPHER_CTX_reset(s->enc_read_ctx); dd = s->enc_read_ctx; diff --git a/ssl/t1_lib.c b/ssl/t1_lib.c index 3e5e9fbda6..3e27d65039 100644 --- a/ssl/t1_lib.c +++ b/ssl/t1_lib.c @@ -2648,7 +2648,7 @@ int tls1_set_server_sigalgs(SSL *s) /* Fatal error is no shared signature algorithms */ if (!s->cert->shared_sigalgs) { SSLerr(SSL_F_TLS1_SET_SERVER_SIGALGS, - SSL_R_NO_SHARED_SIGATURE_ALGORITHMS); + SSL_R_NO_SHARED_SIGNATURE_ALGORITHMS); al = SSL_AD_ILLEGAL_PARAMETER; goto err; } |