diff options
| author | jmc <> | 2022-12-26 07:31:44 +0000 |
|---|---|---|
| committer | jmc <> | 2022-12-26 07:31:44 +0000 |
| commit | 356636e322b0470ebdc67f07aee01fd9cc942ac4 (patch) | |
| tree | bd080f92299fab93a3662f75179fd0523c897c8f /src/lib | |
| parent | 8144b51086b3c46594192ccbec62762e58d61200 (diff) | |
| download | openbsd-356636e322b0470ebdc67f07aee01fd9cc942ac4.tar.gz openbsd-356636e322b0470ebdc67f07aee01fd9cc942ac4.tar.bz2 openbsd-356636e322b0470ebdc67f07aee01fd9cc942ac4.zip | |
spelling fixes; from paul tagliamonte
ok tb
Diffstat (limited to 'src/lib')
| -rw-r--r-- | src/lib/libssl/d1_both.c | 8 | ||||
| -rw-r--r-- | src/lib/libssl/doc/openssl.cnf | 6 | ||||
| -rw-r--r-- | src/lib/libssl/doc/standards.txt | 2 | ||||
| -rw-r--r-- | src/lib/libssl/ssl.h | 4 | ||||
| -rw-r--r-- | src/lib/libssl/ssl_clnt.c | 6 | ||||
| -rw-r--r-- | src/lib/libssl/ssl_local.h | 4 | ||||
| -rw-r--r-- | src/lib/libssl/ssl_srvr.c | 6 | ||||
| -rw-r--r-- | src/lib/libssl/test/CAss.cnf | 4 | ||||
| -rw-r--r-- | src/lib/libssl/test/CAtsa.cnf | 2 | ||||
| -rw-r--r-- | src/lib/libssl/test/pkits-test.pl | 4 |
10 files changed, 23 insertions, 23 deletions
diff --git a/src/lib/libssl/d1_both.c b/src/lib/libssl/d1_both.c index e94761e5d3..b5c68a1735 100644 --- a/src/lib/libssl/d1_both.c +++ b/src/lib/libssl/d1_both.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: d1_both.c,v 1.83 2022/11/26 16:08:55 tb Exp $ */ | 1 | /* $OpenBSD: d1_both.c,v 1.84 2022/12/26 07:31:44 jmc Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * DTLS implementation written by Nagendra Modadugu | 3 | * DTLS implementation written by Nagendra Modadugu |
| 4 | * (nagendra@cs.stanford.edu) for the OpenSSL project 2005. | 4 | * (nagendra@cs.stanford.edu) for the OpenSSL project 2005. |
| @@ -806,7 +806,7 @@ dtls1_get_message_fragment(SSL *s, int st1, int stn, long max, int *ok) | |||
| 806 | s->init_num = 0; | 806 | s->init_num = 0; |
| 807 | goto again; | 807 | goto again; |
| 808 | } | 808 | } |
| 809 | else /* Incorrectly formated Hello request */ | 809 | else /* Incorrectly formatted Hello request */ |
| 810 | { | 810 | { |
| 811 | al = SSL_AD_UNEXPECTED_MESSAGE; | 811 | al = SSL_AD_UNEXPECTED_MESSAGE; |
| 812 | SSLerror(s, SSL_R_UNEXPECTED_MESSAGE); | 812 | SSLerror(s, SSL_R_UNEXPECTED_MESSAGE); |
| @@ -817,7 +817,7 @@ dtls1_get_message_fragment(SSL *s, int st1, int stn, long max, int *ok) | |||
| 817 | if ((al = dtls1_preprocess_fragment(s, &msg_hdr, max))) | 817 | if ((al = dtls1_preprocess_fragment(s, &msg_hdr, max))) |
| 818 | goto fatal_err; | 818 | goto fatal_err; |
| 819 | 819 | ||
| 820 | /* XDTLS: ressurect this when restart is in place */ | 820 | /* XDTLS: resurrect this when restart is in place */ |
| 821 | s->s3->hs.state = stn; | 821 | s->s3->hs.state = stn; |
| 822 | 822 | ||
| 823 | if (frag_len > 0) { | 823 | if (frag_len > 0) { |
| @@ -942,7 +942,7 @@ dtls1_buffer_message(SSL *s, int is_ccs) | |||
| 942 | hm_fragment *frag; | 942 | hm_fragment *frag; |
| 943 | unsigned char seq64be[8]; | 943 | unsigned char seq64be[8]; |
| 944 | 944 | ||
| 945 | /* Buffer the messsage in order to handle DTLS retransmissions. */ | 945 | /* Buffer the message in order to handle DTLS retransmissions. */ |
| 946 | 946 | ||
| 947 | /* | 947 | /* |
| 948 | * This function is called immediately after a message has | 948 | * This function is called immediately after a message has |
diff --git a/src/lib/libssl/doc/openssl.cnf b/src/lib/libssl/doc/openssl.cnf index ed4bde52e8..db95bb5c18 100644 --- a/src/lib/libssl/doc/openssl.cnf +++ b/src/lib/libssl/doc/openssl.cnf | |||
| @@ -43,7 +43,7 @@ certs = $dir/certs # Where the issued certs are kept | |||
| 43 | crl_dir = $dir/crl # Where the issued crl are kept | 43 | crl_dir = $dir/crl # Where the issued crl are kept |
| 44 | database = $dir/index.txt # database index file. | 44 | database = $dir/index.txt # database index file. |
| 45 | #unique_subject = no # Set to 'no' to allow creation of | 45 | #unique_subject = no # Set to 'no' to allow creation of |
| 46 | # several ctificates with same subject. | 46 | # several certificates with same subject. |
| 47 | new_certs_dir = $dir/newcerts # default place for new certs. | 47 | new_certs_dir = $dir/newcerts # default place for new certs. |
| 48 | 48 | ||
| 49 | certificate = $dir/cacert.pem # The CA certificate | 49 | certificate = $dir/cacert.pem # The CA certificate |
| @@ -53,7 +53,7 @@ crlnumber = $dir/crlnumber # the current crl number | |||
| 53 | crl = $dir/crl.pem # The current CRL | 53 | crl = $dir/crl.pem # The current CRL |
| 54 | private_key = $dir/private/cakey.pem# The private key | 54 | private_key = $dir/private/cakey.pem# The private key |
| 55 | 55 | ||
| 56 | x509_extensions = usr_cert # The extentions to add to the cert | 56 | x509_extensions = usr_cert # The extensions to add to the cert |
| 57 | 57 | ||
| 58 | # Comment out the following two lines for the "traditional" | 58 | # Comment out the following two lines for the "traditional" |
| 59 | # (and highly broken) format. | 59 | # (and highly broken) format. |
| @@ -105,7 +105,7 @@ default_bits = 1024 | |||
| 105 | default_keyfile = privkey.pem | 105 | default_keyfile = privkey.pem |
| 106 | distinguished_name = req_distinguished_name | 106 | distinguished_name = req_distinguished_name |
| 107 | attributes = req_attributes | 107 | attributes = req_attributes |
| 108 | x509_extensions = v3_ca # The extentions to add to the self signed cert | 108 | x509_extensions = v3_ca # The extensions to add to the self signed cert |
| 109 | 109 | ||
| 110 | # Passwords for private keys if not present they will be prompted for | 110 | # Passwords for private keys if not present they will be prompted for |
| 111 | # input_password = secret | 111 | # input_password = secret |
diff --git a/src/lib/libssl/doc/standards.txt b/src/lib/libssl/doc/standards.txt index 7bada8d35f..6b3c5c5038 100644 --- a/src/lib/libssl/doc/standards.txt +++ b/src/lib/libssl/doc/standards.txt | |||
| @@ -280,6 +280,6 @@ STARTTLS documents. | |||
| 280 | To be implemented: | 280 | To be implemented: |
| 281 | ------------------ | 281 | ------------------ |
| 282 | 282 | ||
| 283 | These are documents that describe things that are planed to be | 283 | These are documents that describe things that are planned to be |
| 284 | implemented in the hopefully short future. | 284 | implemented in the hopefully short future. |
| 285 | 285 | ||
diff --git a/src/lib/libssl/ssl.h b/src/lib/libssl/ssl.h index 4a89bfd868..acde94c749 100644 --- a/src/lib/libssl/ssl.h +++ b/src/lib/libssl/ssl.h | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl.h,v 1.229 2022/09/11 17:39:46 tb Exp $ */ | 1 | /* $OpenBSD: ssl.h,v 1.230 2022/12/26 07:31:44 jmc Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -2348,7 +2348,7 @@ void ERR_load_SSL_strings(void); | |||
| 2348 | */ | 2348 | */ |
| 2349 | 2349 | ||
| 2350 | /* | 2350 | /* |
| 2351 | * These are provided for compatibiliy, but have no effect | 2351 | * These are provided for compatibility, but have no effect |
| 2352 | * on how LibreSSL is initialized. | 2352 | * on how LibreSSL is initialized. |
| 2353 | */ | 2353 | */ |
| 2354 | #define OPENSSL_INIT_LOAD_SSL_STRINGS _OPENSSL_INIT_FLAG_NOOP | 2354 | #define OPENSSL_INIT_LOAD_SSL_STRINGS _OPENSSL_INIT_FLAG_NOOP |
diff --git a/src/lib/libssl/ssl_clnt.c b/src/lib/libssl/ssl_clnt.c index 64085b953f..c721aede4e 100644 --- a/src/lib/libssl/ssl_clnt.c +++ b/src/lib/libssl/ssl_clnt.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl_clnt.c,v 1.157 2022/11/26 16:08:55 tb Exp $ */ | 1 | /* $OpenBSD: ssl_clnt.c,v 1.158 2022/12/26 07:31:44 jmc Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -1633,7 +1633,7 @@ ssl3_get_new_session_ticket(SSL *s) | |||
| 1633 | } | 1633 | } |
| 1634 | 1634 | ||
| 1635 | /* | 1635 | /* |
| 1636 | * There are two ways to detect a resumed ticket sesion. | 1636 | * There are two ways to detect a resumed ticket session. |
| 1637 | * One is to set an appropriate session ID and then the server | 1637 | * One is to set an appropriate session ID and then the server |
| 1638 | * must return a match in ServerHello. This allows the normal | 1638 | * must return a match in ServerHello. This allows the normal |
| 1639 | * client session ID matching to work and we know much | 1639 | * client session ID matching to work and we know much |
| @@ -1941,7 +1941,7 @@ ssl3_send_client_kex_gost(SSL *s, CBB *cbb) | |||
| 1941 | int nid; | 1941 | int nid; |
| 1942 | int ret = 0; | 1942 | int ret = 0; |
| 1943 | 1943 | ||
| 1944 | /* Get server sertificate PKEY and create ctx from it */ | 1944 | /* Get server certificate PKEY and create ctx from it */ |
| 1945 | pkey = X509_get0_pubkey(s->session->peer_cert); | 1945 | pkey = X509_get0_pubkey(s->session->peer_cert); |
| 1946 | if (pkey == NULL || s->session->peer_cert_type != SSL_PKEY_GOST01) { | 1946 | if (pkey == NULL || s->session->peer_cert_type != SSL_PKEY_GOST01) { |
| 1947 | SSLerror(s, SSL_R_NO_GOST_CERTIFICATE_SENT_BY_PEER); | 1947 | SSLerror(s, SSL_R_NO_GOST_CERTIFICATE_SENT_BY_PEER); |
diff --git a/src/lib/libssl/ssl_local.h b/src/lib/libssl/ssl_local.h index 1e38d3939e..d510f80d8c 100644 --- a/src/lib/libssl/ssl_local.h +++ b/src/lib/libssl/ssl_local.h | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl_local.h,v 1.2 2022/11/26 17:23:18 tb Exp $ */ | 1 | /* $OpenBSD: ssl_local.h,v 1.3 2022/12/26 07:31:44 jmc Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -1087,7 +1087,7 @@ struct ssl_st { | |||
| 1087 | STACK_OF(X509_NAME) *client_CA; | 1087 | STACK_OF(X509_NAME) *client_CA; |
| 1088 | 1088 | ||
| 1089 | /* set this flag to 1 and a sleep(1) is put into all SSL_read() | 1089 | /* set this flag to 1 and a sleep(1) is put into all SSL_read() |
| 1090 | * and SSL_write() calls, good for nbio debuging :-) */ | 1090 | * and SSL_write() calls, good for nbio debugging :-) */ |
| 1091 | int debug; | 1091 | int debug; |
| 1092 | long max_cert_list; | 1092 | long max_cert_list; |
| 1093 | int first_packet; | 1093 | int first_packet; |
diff --git a/src/lib/libssl/ssl_srvr.c b/src/lib/libssl/ssl_srvr.c index efb71bb717..556107f5a1 100644 --- a/src/lib/libssl/ssl_srvr.c +++ b/src/lib/libssl/ssl_srvr.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl_srvr.c,v 1.152 2022/11/26 16:08:56 tb Exp $ */ | 1 | /* $OpenBSD: ssl_srvr.c,v 1.153 2022/12/26 07:31:44 jmc Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -1152,8 +1152,8 @@ ssl3_get_client_hello(SSL *s) | |||
| 1152 | /* | 1152 | /* |
| 1153 | * We now have the following setup. | 1153 | * We now have the following setup. |
| 1154 | * client_random | 1154 | * client_random |
| 1155 | * cipher_list - our prefered list of ciphers | 1155 | * cipher_list - our preferred list of ciphers |
| 1156 | * ciphers - the clients prefered list of ciphers | 1156 | * ciphers - the clients preferred list of ciphers |
| 1157 | * compression - basically ignored right now | 1157 | * compression - basically ignored right now |
| 1158 | * ssl version is set - sslv3 | 1158 | * ssl version is set - sslv3 |
| 1159 | * s->session - The ssl session has been setup. | 1159 | * s->session - The ssl session has been setup. |
diff --git a/src/lib/libssl/test/CAss.cnf b/src/lib/libssl/test/CAss.cnf index 109bc8c10b..336e82fd52 100644 --- a/src/lib/libssl/test/CAss.cnf +++ b/src/lib/libssl/test/CAss.cnf | |||
| @@ -36,7 +36,7 @@ certs = $dir/certs # Where the issued certs are kept | |||
| 36 | crl_dir = $dir/crl # Where the issued crl are kept | 36 | crl_dir = $dir/crl # Where the issued crl are kept |
| 37 | database = $dir/index.txt # database index file. | 37 | database = $dir/index.txt # database index file. |
| 38 | #unique_subject = no # Set to 'no' to allow creation of | 38 | #unique_subject = no # Set to 'no' to allow creation of |
| 39 | # several ctificates with same subject. | 39 | # several certificates with same subject. |
| 40 | new_certs_dir = $dir/newcerts # default place for new certs. | 40 | new_certs_dir = $dir/newcerts # default place for new certs. |
| 41 | 41 | ||
| 42 | certificate = $dir/cacert.pem # The CA certificate | 42 | certificate = $dir/cacert.pem # The CA certificate |
| @@ -45,7 +45,7 @@ crl = $dir/crl.pem # The current CRL | |||
| 45 | private_key = $dir/private/cakey.pem# The private key | 45 | private_key = $dir/private/cakey.pem# The private key |
| 46 | RANDFILE = $dir/private/.rand # private random number file | 46 | RANDFILE = $dir/private/.rand # private random number file |
| 47 | 47 | ||
| 48 | x509_extensions = v3_ca # The extentions to add to the cert | 48 | x509_extensions = v3_ca # The extensions to add to the cert |
| 49 | 49 | ||
| 50 | name_opt = ca_default # Subject Name options | 50 | name_opt = ca_default # Subject Name options |
| 51 | cert_opt = ca_default # Certificate field options | 51 | cert_opt = ca_default # Certificate field options |
diff --git a/src/lib/libssl/test/CAtsa.cnf b/src/lib/libssl/test/CAtsa.cnf index f5a275bfc2..b497b50452 100644 --- a/src/lib/libssl/test/CAtsa.cnf +++ b/src/lib/libssl/test/CAtsa.cnf | |||
| @@ -57,7 +57,7 @@ distinguished_name = $ENV::TSDNSECT | |||
| 57 | encrypt_rsa_key = no | 57 | encrypt_rsa_key = no |
| 58 | prompt = no | 58 | prompt = no |
| 59 | # attributes = req_attributes | 59 | # attributes = req_attributes |
| 60 | x509_extensions = v3_ca # The extentions to add to the self signed cert | 60 | x509_extensions = v3_ca # The extensions to add to the self signed cert |
| 61 | 61 | ||
| 62 | string_mask = nombstr | 62 | string_mask = nombstr |
| 63 | 63 | ||
diff --git a/src/lib/libssl/test/pkits-test.pl b/src/lib/libssl/test/pkits-test.pl index 5c6b89fcdb..17186066ad 100644 --- a/src/lib/libssl/test/pkits-test.pl +++ b/src/lib/libssl/test/pkits-test.pl | |||
| @@ -124,7 +124,7 @@ my @testlists = ( | |||
| 124 | [ "4.4.7", "Valid Two CRLs Test7", 0 ], | 124 | [ "4.4.7", "Valid Two CRLs Test7", 0 ], |
| 125 | 125 | ||
| 126 | # The test document suggests these should return certificate revoked... | 126 | # The test document suggests these should return certificate revoked... |
| 127 | # Subsquent discussion has concluded they should not due to unhandle | 127 | # Subsequent discussion has concluded they should not due to unhandle |
| 128 | # critical CRL extensions. | 128 | # critical CRL extensions. |
| 129 | [ "4.4.8", "Invalid Unknown CRL Entry Extension Test8", 36 ], | 129 | [ "4.4.8", "Invalid Unknown CRL Entry Extension Test8", 36 ], |
| 130 | [ "4.4.9", "Invalid Unknown CRL Extension Test9", 36 ], | 130 | [ "4.4.9", "Invalid Unknown CRL Extension Test9", 36 ], |
| @@ -749,7 +749,7 @@ my @testlists = ( | |||
| 749 | [ "4.14.29", "Valid cRLIssuer Test29", 0 ], | 749 | [ "4.14.29", "Valid cRLIssuer Test29", 0 ], |
| 750 | 750 | ||
| 751 | # Although this test is valid it has a circular dependency. As a result | 751 | # Although this test is valid it has a circular dependency. As a result |
| 752 | # an attempt is made to reursively checks a CRL path and rejected due to | 752 | # an attempt is made to recursively check a CRL path and rejected due to |
| 753 | # a CRL path validation error. PKITS notes suggest this test does not | 753 | # a CRL path validation error. PKITS notes suggest this test does not |
| 754 | # need to be run due to this issue. | 754 | # need to be run due to this issue. |
| 755 | [ "4.14.30", "Valid cRLIssuer Test30", 54 ], | 755 | [ "4.14.30", "Valid cRLIssuer Test30", 54 ], |
