diff options
author | jmc <> | 2022-12-26 07:31:44 +0000 |
---|---|---|
committer | jmc <> | 2022-12-26 07:31:44 +0000 |
commit | 356636e322b0470ebdc67f07aee01fd9cc942ac4 (patch) | |
tree | bd080f92299fab93a3662f75179fd0523c897c8f /src | |
parent | 8144b51086b3c46594192ccbec62762e58d61200 (diff) | |
download | openbsd-356636e322b0470ebdc67f07aee01fd9cc942ac4.tar.gz openbsd-356636e322b0470ebdc67f07aee01fd9cc942ac4.tar.bz2 openbsd-356636e322b0470ebdc67f07aee01fd9cc942ac4.zip |
spelling fixes; from paul tagliamonte
ok tb
Diffstat (limited to 'src')
-rw-r--r-- | src/lib/libssl/d1_both.c | 8 | ||||
-rw-r--r-- | src/lib/libssl/doc/openssl.cnf | 6 | ||||
-rw-r--r-- | src/lib/libssl/doc/standards.txt | 2 | ||||
-rw-r--r-- | src/lib/libssl/ssl.h | 4 | ||||
-rw-r--r-- | src/lib/libssl/ssl_clnt.c | 6 | ||||
-rw-r--r-- | src/lib/libssl/ssl_local.h | 4 | ||||
-rw-r--r-- | src/lib/libssl/ssl_srvr.c | 6 | ||||
-rw-r--r-- | src/lib/libssl/test/CAss.cnf | 4 | ||||
-rw-r--r-- | src/lib/libssl/test/CAtsa.cnf | 2 | ||||
-rw-r--r-- | src/lib/libssl/test/pkits-test.pl | 4 |
10 files changed, 23 insertions, 23 deletions
diff --git a/src/lib/libssl/d1_both.c b/src/lib/libssl/d1_both.c index e94761e5d3..b5c68a1735 100644 --- a/src/lib/libssl/d1_both.c +++ b/src/lib/libssl/d1_both.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: d1_both.c,v 1.83 2022/11/26 16:08:55 tb Exp $ */ | 1 | /* $OpenBSD: d1_both.c,v 1.84 2022/12/26 07:31:44 jmc Exp $ */ |
2 | /* | 2 | /* |
3 | * DTLS implementation written by Nagendra Modadugu | 3 | * DTLS implementation written by Nagendra Modadugu |
4 | * (nagendra@cs.stanford.edu) for the OpenSSL project 2005. | 4 | * (nagendra@cs.stanford.edu) for the OpenSSL project 2005. |
@@ -806,7 +806,7 @@ dtls1_get_message_fragment(SSL *s, int st1, int stn, long max, int *ok) | |||
806 | s->init_num = 0; | 806 | s->init_num = 0; |
807 | goto again; | 807 | goto again; |
808 | } | 808 | } |
809 | else /* Incorrectly formated Hello request */ | 809 | else /* Incorrectly formatted Hello request */ |
810 | { | 810 | { |
811 | al = SSL_AD_UNEXPECTED_MESSAGE; | 811 | al = SSL_AD_UNEXPECTED_MESSAGE; |
812 | SSLerror(s, SSL_R_UNEXPECTED_MESSAGE); | 812 | SSLerror(s, SSL_R_UNEXPECTED_MESSAGE); |
@@ -817,7 +817,7 @@ dtls1_get_message_fragment(SSL *s, int st1, int stn, long max, int *ok) | |||
817 | if ((al = dtls1_preprocess_fragment(s, &msg_hdr, max))) | 817 | if ((al = dtls1_preprocess_fragment(s, &msg_hdr, max))) |
818 | goto fatal_err; | 818 | goto fatal_err; |
819 | 819 | ||
820 | /* XDTLS: ressurect this when restart is in place */ | 820 | /* XDTLS: resurrect this when restart is in place */ |
821 | s->s3->hs.state = stn; | 821 | s->s3->hs.state = stn; |
822 | 822 | ||
823 | if (frag_len > 0) { | 823 | if (frag_len > 0) { |
@@ -942,7 +942,7 @@ dtls1_buffer_message(SSL *s, int is_ccs) | |||
942 | hm_fragment *frag; | 942 | hm_fragment *frag; |
943 | unsigned char seq64be[8]; | 943 | unsigned char seq64be[8]; |
944 | 944 | ||
945 | /* Buffer the messsage in order to handle DTLS retransmissions. */ | 945 | /* Buffer the message in order to handle DTLS retransmissions. */ |
946 | 946 | ||
947 | /* | 947 | /* |
948 | * This function is called immediately after a message has | 948 | * This function is called immediately after a message has |
diff --git a/src/lib/libssl/doc/openssl.cnf b/src/lib/libssl/doc/openssl.cnf index ed4bde52e8..db95bb5c18 100644 --- a/src/lib/libssl/doc/openssl.cnf +++ b/src/lib/libssl/doc/openssl.cnf | |||
@@ -43,7 +43,7 @@ certs = $dir/certs # Where the issued certs are kept | |||
43 | crl_dir = $dir/crl # Where the issued crl are kept | 43 | crl_dir = $dir/crl # Where the issued crl are kept |
44 | database = $dir/index.txt # database index file. | 44 | database = $dir/index.txt # database index file. |
45 | #unique_subject = no # Set to 'no' to allow creation of | 45 | #unique_subject = no # Set to 'no' to allow creation of |
46 | # several ctificates with same subject. | 46 | # several certificates with same subject. |
47 | new_certs_dir = $dir/newcerts # default place for new certs. | 47 | new_certs_dir = $dir/newcerts # default place for new certs. |
48 | 48 | ||
49 | certificate = $dir/cacert.pem # The CA certificate | 49 | certificate = $dir/cacert.pem # The CA certificate |
@@ -53,7 +53,7 @@ crlnumber = $dir/crlnumber # the current crl number | |||
53 | crl = $dir/crl.pem # The current CRL | 53 | crl = $dir/crl.pem # The current CRL |
54 | private_key = $dir/private/cakey.pem# The private key | 54 | private_key = $dir/private/cakey.pem# The private key |
55 | 55 | ||
56 | x509_extensions = usr_cert # The extentions to add to the cert | 56 | x509_extensions = usr_cert # The extensions to add to the cert |
57 | 57 | ||
58 | # Comment out the following two lines for the "traditional" | 58 | # Comment out the following two lines for the "traditional" |
59 | # (and highly broken) format. | 59 | # (and highly broken) format. |
@@ -105,7 +105,7 @@ default_bits = 1024 | |||
105 | default_keyfile = privkey.pem | 105 | default_keyfile = privkey.pem |
106 | distinguished_name = req_distinguished_name | 106 | distinguished_name = req_distinguished_name |
107 | attributes = req_attributes | 107 | attributes = req_attributes |
108 | x509_extensions = v3_ca # The extentions to add to the self signed cert | 108 | x509_extensions = v3_ca # The extensions to add to the self signed cert |
109 | 109 | ||
110 | # Passwords for private keys if not present they will be prompted for | 110 | # Passwords for private keys if not present they will be prompted for |
111 | # input_password = secret | 111 | # input_password = secret |
diff --git a/src/lib/libssl/doc/standards.txt b/src/lib/libssl/doc/standards.txt index 7bada8d35f..6b3c5c5038 100644 --- a/src/lib/libssl/doc/standards.txt +++ b/src/lib/libssl/doc/standards.txt | |||
@@ -280,6 +280,6 @@ STARTTLS documents. | |||
280 | To be implemented: | 280 | To be implemented: |
281 | ------------------ | 281 | ------------------ |
282 | 282 | ||
283 | These are documents that describe things that are planed to be | 283 | These are documents that describe things that are planned to be |
284 | implemented in the hopefully short future. | 284 | implemented in the hopefully short future. |
285 | 285 | ||
diff --git a/src/lib/libssl/ssl.h b/src/lib/libssl/ssl.h index 4a89bfd868..acde94c749 100644 --- a/src/lib/libssl/ssl.h +++ b/src/lib/libssl/ssl.h | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssl.h,v 1.229 2022/09/11 17:39:46 tb Exp $ */ | 1 | /* $OpenBSD: ssl.h,v 1.230 2022/12/26 07:31:44 jmc Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -2348,7 +2348,7 @@ void ERR_load_SSL_strings(void); | |||
2348 | */ | 2348 | */ |
2349 | 2349 | ||
2350 | /* | 2350 | /* |
2351 | * These are provided for compatibiliy, but have no effect | 2351 | * These are provided for compatibility, but have no effect |
2352 | * on how LibreSSL is initialized. | 2352 | * on how LibreSSL is initialized. |
2353 | */ | 2353 | */ |
2354 | #define OPENSSL_INIT_LOAD_SSL_STRINGS _OPENSSL_INIT_FLAG_NOOP | 2354 | #define OPENSSL_INIT_LOAD_SSL_STRINGS _OPENSSL_INIT_FLAG_NOOP |
diff --git a/src/lib/libssl/ssl_clnt.c b/src/lib/libssl/ssl_clnt.c index 64085b953f..c721aede4e 100644 --- a/src/lib/libssl/ssl_clnt.c +++ b/src/lib/libssl/ssl_clnt.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssl_clnt.c,v 1.157 2022/11/26 16:08:55 tb Exp $ */ | 1 | /* $OpenBSD: ssl_clnt.c,v 1.158 2022/12/26 07:31:44 jmc Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -1633,7 +1633,7 @@ ssl3_get_new_session_ticket(SSL *s) | |||
1633 | } | 1633 | } |
1634 | 1634 | ||
1635 | /* | 1635 | /* |
1636 | * There are two ways to detect a resumed ticket sesion. | 1636 | * There are two ways to detect a resumed ticket session. |
1637 | * One is to set an appropriate session ID and then the server | 1637 | * One is to set an appropriate session ID and then the server |
1638 | * must return a match in ServerHello. This allows the normal | 1638 | * must return a match in ServerHello. This allows the normal |
1639 | * client session ID matching to work and we know much | 1639 | * client session ID matching to work and we know much |
@@ -1941,7 +1941,7 @@ ssl3_send_client_kex_gost(SSL *s, CBB *cbb) | |||
1941 | int nid; | 1941 | int nid; |
1942 | int ret = 0; | 1942 | int ret = 0; |
1943 | 1943 | ||
1944 | /* Get server sertificate PKEY and create ctx from it */ | 1944 | /* Get server certificate PKEY and create ctx from it */ |
1945 | pkey = X509_get0_pubkey(s->session->peer_cert); | 1945 | pkey = X509_get0_pubkey(s->session->peer_cert); |
1946 | if (pkey == NULL || s->session->peer_cert_type != SSL_PKEY_GOST01) { | 1946 | if (pkey == NULL || s->session->peer_cert_type != SSL_PKEY_GOST01) { |
1947 | SSLerror(s, SSL_R_NO_GOST_CERTIFICATE_SENT_BY_PEER); | 1947 | SSLerror(s, SSL_R_NO_GOST_CERTIFICATE_SENT_BY_PEER); |
diff --git a/src/lib/libssl/ssl_local.h b/src/lib/libssl/ssl_local.h index 1e38d3939e..d510f80d8c 100644 --- a/src/lib/libssl/ssl_local.h +++ b/src/lib/libssl/ssl_local.h | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssl_local.h,v 1.2 2022/11/26 17:23:18 tb Exp $ */ | 1 | /* $OpenBSD: ssl_local.h,v 1.3 2022/12/26 07:31:44 jmc Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -1087,7 +1087,7 @@ struct ssl_st { | |||
1087 | STACK_OF(X509_NAME) *client_CA; | 1087 | STACK_OF(X509_NAME) *client_CA; |
1088 | 1088 | ||
1089 | /* set this flag to 1 and a sleep(1) is put into all SSL_read() | 1089 | /* set this flag to 1 and a sleep(1) is put into all SSL_read() |
1090 | * and SSL_write() calls, good for nbio debuging :-) */ | 1090 | * and SSL_write() calls, good for nbio debugging :-) */ |
1091 | int debug; | 1091 | int debug; |
1092 | long max_cert_list; | 1092 | long max_cert_list; |
1093 | int first_packet; | 1093 | int first_packet; |
diff --git a/src/lib/libssl/ssl_srvr.c b/src/lib/libssl/ssl_srvr.c index efb71bb717..556107f5a1 100644 --- a/src/lib/libssl/ssl_srvr.c +++ b/src/lib/libssl/ssl_srvr.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssl_srvr.c,v 1.152 2022/11/26 16:08:56 tb Exp $ */ | 1 | /* $OpenBSD: ssl_srvr.c,v 1.153 2022/12/26 07:31:44 jmc Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -1152,8 +1152,8 @@ ssl3_get_client_hello(SSL *s) | |||
1152 | /* | 1152 | /* |
1153 | * We now have the following setup. | 1153 | * We now have the following setup. |
1154 | * client_random | 1154 | * client_random |
1155 | * cipher_list - our prefered list of ciphers | 1155 | * cipher_list - our preferred list of ciphers |
1156 | * ciphers - the clients prefered list of ciphers | 1156 | * ciphers - the clients preferred list of ciphers |
1157 | * compression - basically ignored right now | 1157 | * compression - basically ignored right now |
1158 | * ssl version is set - sslv3 | 1158 | * ssl version is set - sslv3 |
1159 | * s->session - The ssl session has been setup. | 1159 | * s->session - The ssl session has been setup. |
diff --git a/src/lib/libssl/test/CAss.cnf b/src/lib/libssl/test/CAss.cnf index 109bc8c10b..336e82fd52 100644 --- a/src/lib/libssl/test/CAss.cnf +++ b/src/lib/libssl/test/CAss.cnf | |||
@@ -36,7 +36,7 @@ certs = $dir/certs # Where the issued certs are kept | |||
36 | crl_dir = $dir/crl # Where the issued crl are kept | 36 | crl_dir = $dir/crl # Where the issued crl are kept |
37 | database = $dir/index.txt # database index file. | 37 | database = $dir/index.txt # database index file. |
38 | #unique_subject = no # Set to 'no' to allow creation of | 38 | #unique_subject = no # Set to 'no' to allow creation of |
39 | # several ctificates with same subject. | 39 | # several certificates with same subject. |
40 | new_certs_dir = $dir/newcerts # default place for new certs. | 40 | new_certs_dir = $dir/newcerts # default place for new certs. |
41 | 41 | ||
42 | certificate = $dir/cacert.pem # The CA certificate | 42 | certificate = $dir/cacert.pem # The CA certificate |
@@ -45,7 +45,7 @@ crl = $dir/crl.pem # The current CRL | |||
45 | private_key = $dir/private/cakey.pem# The private key | 45 | private_key = $dir/private/cakey.pem# The private key |
46 | RANDFILE = $dir/private/.rand # private random number file | 46 | RANDFILE = $dir/private/.rand # private random number file |
47 | 47 | ||
48 | x509_extensions = v3_ca # The extentions to add to the cert | 48 | x509_extensions = v3_ca # The extensions to add to the cert |
49 | 49 | ||
50 | name_opt = ca_default # Subject Name options | 50 | name_opt = ca_default # Subject Name options |
51 | cert_opt = ca_default # Certificate field options | 51 | cert_opt = ca_default # Certificate field options |
diff --git a/src/lib/libssl/test/CAtsa.cnf b/src/lib/libssl/test/CAtsa.cnf index f5a275bfc2..b497b50452 100644 --- a/src/lib/libssl/test/CAtsa.cnf +++ b/src/lib/libssl/test/CAtsa.cnf | |||
@@ -57,7 +57,7 @@ distinguished_name = $ENV::TSDNSECT | |||
57 | encrypt_rsa_key = no | 57 | encrypt_rsa_key = no |
58 | prompt = no | 58 | prompt = no |
59 | # attributes = req_attributes | 59 | # attributes = req_attributes |
60 | x509_extensions = v3_ca # The extentions to add to the self signed cert | 60 | x509_extensions = v3_ca # The extensions to add to the self signed cert |
61 | 61 | ||
62 | string_mask = nombstr | 62 | string_mask = nombstr |
63 | 63 | ||
diff --git a/src/lib/libssl/test/pkits-test.pl b/src/lib/libssl/test/pkits-test.pl index 5c6b89fcdb..17186066ad 100644 --- a/src/lib/libssl/test/pkits-test.pl +++ b/src/lib/libssl/test/pkits-test.pl | |||
@@ -124,7 +124,7 @@ my @testlists = ( | |||
124 | [ "4.4.7", "Valid Two CRLs Test7", 0 ], | 124 | [ "4.4.7", "Valid Two CRLs Test7", 0 ], |
125 | 125 | ||
126 | # The test document suggests these should return certificate revoked... | 126 | # The test document suggests these should return certificate revoked... |
127 | # Subsquent discussion has concluded they should not due to unhandle | 127 | # Subsequent discussion has concluded they should not due to unhandle |
128 | # critical CRL extensions. | 128 | # critical CRL extensions. |
129 | [ "4.4.8", "Invalid Unknown CRL Entry Extension Test8", 36 ], | 129 | [ "4.4.8", "Invalid Unknown CRL Entry Extension Test8", 36 ], |
130 | [ "4.4.9", "Invalid Unknown CRL Extension Test9", 36 ], | 130 | [ "4.4.9", "Invalid Unknown CRL Extension Test9", 36 ], |
@@ -749,7 +749,7 @@ my @testlists = ( | |||
749 | [ "4.14.29", "Valid cRLIssuer Test29", 0 ], | 749 | [ "4.14.29", "Valid cRLIssuer Test29", 0 ], |
750 | 750 | ||
751 | # Although this test is valid it has a circular dependency. As a result | 751 | # Although this test is valid it has a circular dependency. As a result |
752 | # an attempt is made to reursively checks a CRL path and rejected due to | 752 | # an attempt is made to recursively check a CRL path and rejected due to |
753 | # a CRL path validation error. PKITS notes suggest this test does not | 753 | # a CRL path validation error. PKITS notes suggest this test does not |
754 | # need to be run due to this issue. | 754 | # need to be run due to this issue. |
755 | [ "4.14.30", "Valid cRLIssuer Test30", 54 ], | 755 | [ "4.14.30", "Valid cRLIssuer Test30", 54 ], |