summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorFdaSilvaYY <fdasilvayy@gmail.com>2021-02-20 23:39:30 +0100
committerHugo Landau <hlandau@openssl.org>2023-01-24 11:03:20 +0000
commit91b968bc8e4125a1202e7955961f8e7dfcd17513 (patch)
tree35410b2a73a933dbbbeb2cc09fb154e1e1d96946
parent4a6e5a11c72a4f3ec082cc065b44906409ad8fae (diff)
downloadopenssl-new-91b968bc8e4125a1202e7955961f8e7dfcd17513.tar.gz
Typos fixing
Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20109)
-rw-r--r--apps/s_client.c6
-rw-r--r--doc/man3/EVP_PKEY_decapsulate.pod2
-rw-r--r--doc/man3/EVP_PKEY_encapsulate.pod2
-rw-r--r--doc/man7/EVP_KDF-HMAC-DRBG.pod2
-rw-r--r--doc/man7/EVP_PKEY-RSA.pod2
-rw-r--r--doc/man7/provider-kem.pod4
-rw-r--r--providers/implementations/kdfs/x942kdf.c2
7 files changed, 10 insertions, 10 deletions
diff --git a/apps/s_client.c b/apps/s_client.c
index 5324f50fcc..9942893bd3 100644
--- a/apps/s_client.c
+++ b/apps/s_client.c
@@ -1963,7 +1963,7 @@ int s_client_main(int argc, char **argv)
/*
* In TLSv1.3 NewSessionTicket messages arrive after the handshake and can
- * come at any time. Therefore we use a callback to write out the session
+ * come at any time. Therefore, we use a callback to write out the session
* when we know about it. This approach works for < TLSv1.3 as well.
*/
SSL_CTX_set_session_cache_mode(ctx, SSL_SESS_CACHE_CLIENT
@@ -2849,7 +2849,7 @@ int s_client_main(int argc, char **argv)
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS)
/*
* Under Windows/DOS we make the assumption that we can always
- * write to the tty: therefore if we need to write to the tty we
+ * write to the tty: therefore, if we need to write to the tty we
* just fall through. Otherwise we timeout the select every
* second and see if there are any keypresses. Note: this is a
* hack, in a proper Windows application we wouldn't do this.
@@ -3394,7 +3394,7 @@ static void print_stuff(BIO *bio, SSL *s, int full)
/*
* We also print the verify results when we dump session information,
* but in TLSv1.3 we may not get that right away (or at all) depending
- * on when we get a NewSessionTicket. Therefore we print it now as well.
+ * on when we get a NewSessionTicket. Therefore, we print it now as well.
*/
verify_result = SSL_get_verify_result(s);
BIO_printf(bio, "Verify return code: %ld (%s)\n", verify_result,
diff --git a/doc/man3/EVP_PKEY_decapsulate.pod b/doc/man3/EVP_PKEY_decapsulate.pod
index 9ae87ddcec..27532b4abb 100644
--- a/doc/man3/EVP_PKEY_decapsulate.pod
+++ b/doc/man3/EVP_PKEY_decapsulate.pod
@@ -22,7 +22,7 @@ The EVP_PKEY_decapsulate_init() function initializes a private key algorithm
context I<ctx> for a decapsulation operation and then sets the I<params>
on the context in the same way as calling L<EVP_PKEY_CTX_set_params(3)>.
-The EVP_PKEY_auth_decapsulate_init() function is similiar to
+The EVP_PKEY_auth_decapsulate_init() function is similar to
EVP_PKEY_decapsulate_init() but also passes an I<authpub> authentication public
key that is used during decapsulation.
diff --git a/doc/man3/EVP_PKEY_encapsulate.pod b/doc/man3/EVP_PKEY_encapsulate.pod
index 1a6f998f5a..5da5a656b8 100644
--- a/doc/man3/EVP_PKEY_encapsulate.pod
+++ b/doc/man3/EVP_PKEY_encapsulate.pod
@@ -22,7 +22,7 @@ The EVP_PKEY_encapsulate_init() function initializes a public key algorithm
context I<ctx> for an encapsulation operation and then sets the I<params>
on the context in the same way as calling L<EVP_PKEY_CTX_set_params(3)>.
-The EVP_PKEY_auth_encapsulate_init() function is similiar to
+The EVP_PKEY_auth_encapsulate_init() function is similar to
EVP_PKEY_encapsulate_init() but also passes an I<authpriv> authentication private
key that is used during encapsulation.
diff --git a/doc/man7/EVP_KDF-HMAC-DRBG.pod b/doc/man7/EVP_KDF-HMAC-DRBG.pod
index eb240da333..63a2070e01 100644
--- a/doc/man7/EVP_KDF-HMAC-DRBG.pod
+++ b/doc/man7/EVP_KDF-HMAC-DRBG.pod
@@ -7,7 +7,7 @@ EVP_KDF-HMAC-DRBG
=head1 DESCRIPTION
-Support for a deterministic HMAC DRBG using the B<EVP_KDF> API. This is similiar
+Support for a deterministic HMAC DRBG using the B<EVP_KDF> API. This is similar
to L<EVP_RAND-HMAC-DRBG(7)>, but uses fixed values for its entropy and nonce
values. This is used to generate deterministic nonce value required by ECDSA
and DSA (as defined in RFC 6979).
diff --git a/doc/man7/EVP_PKEY-RSA.pod b/doc/man7/EVP_PKEY-RSA.pod
index 51103b8b29..3123813e9c 100644
--- a/doc/man7/EVP_PKEY-RSA.pod
+++ b/doc/man7/EVP_PKEY-RSA.pod
@@ -186,7 +186,7 @@ both return 1 unconditionally.
For RSA keys, L<EVP_PKEY_public_check(3)> conforms to the SP800-56Br1 I<public key
check> when the OpenSSL FIPS provider is used. The OpenSSL default provider
-performs similiar tests but relaxes the keysize restrictions for backwards
+performs similar tests but relaxes the keysize restrictions for backwards
compatibility.
For RSA keys, L<EVP_PKEY_public_check_quick(3)> is the same as
diff --git a/doc/man7/provider-kem.pod b/doc/man7/provider-kem.pod
index a76466ada9..fbbf5a5fee 100644
--- a/doc/man7/provider-kem.pod
+++ b/doc/man7/provider-kem.pod
@@ -137,7 +137,7 @@ The key object should have been previously generated, loaded or imported into
the provider using the key management (OSSL_OP_KEYMGMT) operation (see
provider-keymgmt(7)>.
-OSSL_FUNC_kem_auth_encapsulate_init() is similiar to
+OSSL_FUNC_kem_auth_encapsulate_init() is similar to
OSSL_FUNC_kem_encapsulate_init(), but also passes an additional authentication
key I<provauthkey> which cannot be NULL.
@@ -165,7 +165,7 @@ The key object should have been previously generated, loaded or imported into
the provider using the key management (OSSL_OP_KEYMGMT) operation (see
provider-keymgmt(7)>.
-OSSL_FUNC_kem_auth_decapsulate_init() is similiar to
+OSSL_FUNC_kem_auth_decapsulate_init() is similar to
OSSL_FUNC_kem_decapsulate_init(), but also passes an additional authentication
key I<provauthkey> which cannot be NULL.
diff --git a/providers/implementations/kdfs/x942kdf.c b/providers/implementations/kdfs/x942kdf.c
index 78bd8d235e..d52c990e86 100644
--- a/providers/implementations/kdfs/x942kdf.c
+++ b/providers/implementations/kdfs/x942kdf.c
@@ -239,7 +239,7 @@ x942_encode_otherinfo(size_t keylen,
goto err;
/*
* Since we allocated the exact size required, the buffer should point to the
- * start of the alllocated buffer at this point.
+ * start of the allocated buffer at this point.
*/
if (WPACKET_get_curr(&pkt) != der_buf)
goto err;