diff options
Diffstat (limited to 'lib')
-rw-r--r-- | lib/algorithms/ecc.c | 2 | ||||
-rw-r--r-- | lib/auth/ecdhe.c | 2 | ||||
-rw-r--r-- | lib/dtls.c | 2 | ||||
-rw-r--r-- | lib/ext/session_ticket.c | 4 | ||||
-rw-r--r-- | lib/ext/supported_versions.c | 2 | ||||
-rw-r--r-- | lib/gnutls_int.h | 2 | ||||
-rw-r--r-- | lib/handshake.c | 2 | ||||
-rw-r--r-- | lib/session.c | 2 | ||||
-rw-r--r-- | lib/x509/key_encode.c | 2 | ||||
-rw-r--r-- | lib/x509/name_constraints.c | 2 | ||||
-rw-r--r-- | lib/x509/pkcs7-crypt.c | 4 |
11 files changed, 13 insertions, 13 deletions
diff --git a/lib/algorithms/ecc.c b/lib/algorithms/ecc.c index 14351b87ad..917f83a624 100644 --- a/lib/algorithms/ecc.c +++ b/lib/algorithms/ecc.c @@ -123,7 +123,7 @@ gnutls_ecc_curve_entry_st ecc_curves[] = { * exchange (CryptoPro-XchA = CryptoPro-A and CryptoPro-XchB = * CryptoPro-C). * - * Then TC26 (Standard comitee working on cryptographic standards) has + * Then TC26 (Standard comittee working on cryptographic standards) has * defined one 256-bit curve (TC26-256-A) and three 512-bit curves * (TC26-512-A, -B, -C). * diff --git a/lib/auth/ecdhe.c b/lib/auth/ecdhe.c index 883f6cd046..9f53b1b053 100644 --- a/lib/auth/ecdhe.c +++ b/lib/auth/ecdhe.c @@ -23,7 +23,7 @@ /* This file contains common stuff in Ephemeral Diffie-Hellman (DHE) * and Anonymous DH key exchange(DHA). These are used in the handshake - * procedure of the certificate and anoymous authentication. + * procedure of the certificate and anonymous authentication. */ #include "gnutls_int.h" diff --git a/lib/dtls.c b/lib/dtls.c index f0ded635c0..002c7145ef 100644 --- a/lib/dtls.c +++ b/lib/dtls.c @@ -553,7 +553,7 @@ unsigned _gnutls_record_overhead(const version_entry_st *ver, * This function will return the set size in bytes of the overhead * due to TLS (or DTLS) per record. * - * Note that this function may provide inacurate values when TLS + * Note that this function may provide inaccurate values when TLS * extensions that modify the record format are negotiated. In these * cases a more accurate value can be obtained using gnutls_record_overhead_size() * after a completed handshake. diff --git a/lib/ext/session_ticket.c b/lib/ext/session_ticket.c index 8d4595821a..8f22462fae 100644 --- a/lib/ext/session_ticket.c +++ b/lib/ext/session_ticket.c @@ -441,11 +441,11 @@ session_ticket_send_params(gnutls_session_t session, if (ret >= 0) priv = epriv; - /* no previous data. Just advertize it */ + /* no previous data. Just advertise it */ if (ret < 0) return GNUTLS_E_INT_RET_0; - /* previous data had session tickets disabled. Don't advertize. Ignore. */ + /* previous data had session tickets disabled. Don't advertise. Ignore. */ if (session->internals.flags & GNUTLS_NO_TICKETS) return 0; diff --git a/lib/ext/supported_versions.c b/lib/ext/supported_versions.c index 69193b60a3..157a0a77ee 100644 --- a/lib/ext/supported_versions.c +++ b/lib/ext/supported_versions.c @@ -71,7 +71,7 @@ supported_versions_recv_params(gnutls_session_t session, /* do not parse this extension when we haven't TLS1.3 * enabled. That is because we cannot handle earlier protocol - * negotiotation (such as SSL3.0) with this */ + * negotiation (such as SSL3.0) with this */ if (vers && !vers->tls13_sem) return 0; diff --git a/lib/gnutls_int.h b/lib/gnutls_int.h index 4db7a2534d..bb6c197138 100644 --- a/lib/gnutls_int.h +++ b/lib/gnutls_int.h @@ -533,7 +533,7 @@ struct gnutls_key_st { uint8_t ap_rms[MAX_HASH_SIZE]; /* resumption_master_secret */ } tls13; /* tls1.3 */ - /* Folow the SSL3.0 and TLS1.2 key exchanges */ + /* Follow the SSL3.0 and TLS1.2 key exchanges */ struct { /* For ECDH KX */ struct { diff --git a/lib/handshake.c b/lib/handshake.c index 8d58fa48e7..cb215b223c 100644 --- a/lib/handshake.c +++ b/lib/handshake.c @@ -2164,7 +2164,7 @@ static int send_client_hello(gnutls_session_t session, int again) } if (session->internals.priorities->min_record_version != 0) { - /* Advertize the lowest supported (SSL 3.0) record packet + /* Advertise the lowest supported (SSL 3.0) record packet * version in record packets during the handshake. * That is to avoid confusing implementations * that do not support TLS 1.2 and don't know diff --git a/lib/session.c b/lib/session.c index 71bcb40515..b9a23e8d02 100644 --- a/lib/session.c +++ b/lib/session.c @@ -100,7 +100,7 @@ gnutls_session_get_data(gnutls_session_t session, * is received by the client. To ensure that such a ticket has been received use * gnutls_session_get_flags() and check for flag %GNUTLS_SFLAGS_SESSION_TICKET; * if this flag is not set, this function will wait for a new ticket within - * an estimated rountrip, and if not received will return dummy data which + * an estimated roundtrip, and if not received will return dummy data which * cannot lead to resumption. * * To get notified when new tickets are received by the server diff --git a/lib/x509/key_encode.c b/lib/x509/key_encode.c index 18668c8ad2..3e9e0466bc 100644 --- a/lib/x509/key_encode.c +++ b/lib/x509/key_encode.c @@ -562,7 +562,7 @@ _gnutls_x509_write_gost_params(const gnutls_pk_params_st * params, /* For compatibility per R 1323565.1.023—2018 provide digest OID only * for GOST-2001 keys or GOST-2012 keys with CryptoPro curves. Do not - * set this optional paramter for TC26 curves */ + * set this optional parameter for TC26 curves */ if (params->algo == GNUTLS_PK_GOST_01) oid = HASH_OID_GOST_R_3411_94_CRYPTOPRO_PARAMS; else if (params->algo == GNUTLS_PK_GOST_12_256 && diff --git a/lib/x509/name_constraints.c b/lib/x509/name_constraints.c index dba2fd4b9f..b93527ee54 100644 --- a/lib/x509/name_constraints.c +++ b/lib/x509/name_constraints.c @@ -178,7 +178,7 @@ int _gnutls_extract_name_constraints(ASN1_TYPE c2, const char *vstr, /*- * _gnutls_name_constraints_node_free: - * @node: name constriants node + * @node: name constraints node * * Deallocate a list of name constraints nodes starting at the given node. -*/ diff --git a/lib/x509/pkcs7-crypt.c b/lib/x509/pkcs7-crypt.c index 274ac14248..d64862df43 100644 --- a/lib/x509/pkcs7-crypt.c +++ b/lib/x509/pkcs7-crypt.c @@ -237,7 +237,7 @@ int _gnutls_pkcs_flags_to_schema(unsigned int flags) * This function will return a human readable description of the * PKCS12 or PBES2 schema. * - * Returns: a constrant string or %NULL on error. + * Returns: a constraint string or %NULL on error. * * Since: 3.4.0 */ @@ -255,7 +255,7 @@ const char *gnutls_pkcs_schema_get_name(unsigned int schema) * This function will return the object identifier of the * PKCS12 or PBES2 schema. * - * Returns: a constrant string or %NULL on error. + * Returns: a constraint string or %NULL on error. * * Since: 3.4.0 */ |