summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorjmc <>2022-12-26 07:31:44 +0000
committerjmc <>2022-12-26 07:31:44 +0000
commit356636e322b0470ebdc67f07aee01fd9cc942ac4 (patch)
treebd080f92299fab93a3662f75179fd0523c897c8f /src
parent8144b51086b3c46594192ccbec62762e58d61200 (diff)
downloadopenbsd-356636e322b0470ebdc67f07aee01fd9cc942ac4.tar.gz
openbsd-356636e322b0470ebdc67f07aee01fd9cc942ac4.tar.bz2
openbsd-356636e322b0470ebdc67f07aee01fd9cc942ac4.zip
spelling fixes; from paul tagliamonte
ok tb
Diffstat (limited to 'src')
-rw-r--r--src/lib/libssl/d1_both.c8
-rw-r--r--src/lib/libssl/doc/openssl.cnf6
-rw-r--r--src/lib/libssl/doc/standards.txt2
-rw-r--r--src/lib/libssl/ssl.h4
-rw-r--r--src/lib/libssl/ssl_clnt.c6
-rw-r--r--src/lib/libssl/ssl_local.h4
-rw-r--r--src/lib/libssl/ssl_srvr.c6
-rw-r--r--src/lib/libssl/test/CAss.cnf4
-rw-r--r--src/lib/libssl/test/CAtsa.cnf2
-rw-r--r--src/lib/libssl/test/pkits-test.pl4
10 files changed, 23 insertions, 23 deletions
diff --git a/src/lib/libssl/d1_both.c b/src/lib/libssl/d1_both.c
index e94761e5d3..b5c68a1735 100644
--- a/src/lib/libssl/d1_both.c
+++ b/src/lib/libssl/d1_both.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: d1_both.c,v 1.83 2022/11/26 16:08:55 tb Exp $ */ 1/* $OpenBSD: d1_both.c,v 1.84 2022/12/26 07:31:44 jmc Exp $ */
2/* 2/*
3 * DTLS implementation written by Nagendra Modadugu 3 * DTLS implementation written by Nagendra Modadugu
4 * (nagendra@cs.stanford.edu) for the OpenSSL project 2005. 4 * (nagendra@cs.stanford.edu) for the OpenSSL project 2005.
@@ -806,7 +806,7 @@ dtls1_get_message_fragment(SSL *s, int st1, int stn, long max, int *ok)
806 s->init_num = 0; 806 s->init_num = 0;
807 goto again; 807 goto again;
808 } 808 }
809 else /* Incorrectly formated Hello request */ 809 else /* Incorrectly formatted Hello request */
810 { 810 {
811 al = SSL_AD_UNEXPECTED_MESSAGE; 811 al = SSL_AD_UNEXPECTED_MESSAGE;
812 SSLerror(s, SSL_R_UNEXPECTED_MESSAGE); 812 SSLerror(s, SSL_R_UNEXPECTED_MESSAGE);
@@ -817,7 +817,7 @@ dtls1_get_message_fragment(SSL *s, int st1, int stn, long max, int *ok)
817 if ((al = dtls1_preprocess_fragment(s, &msg_hdr, max))) 817 if ((al = dtls1_preprocess_fragment(s, &msg_hdr, max)))
818 goto fatal_err; 818 goto fatal_err;
819 819
820 /* XDTLS: ressurect this when restart is in place */ 820 /* XDTLS: resurrect this when restart is in place */
821 s->s3->hs.state = stn; 821 s->s3->hs.state = stn;
822 822
823 if (frag_len > 0) { 823 if (frag_len > 0) {
@@ -942,7 +942,7 @@ dtls1_buffer_message(SSL *s, int is_ccs)
942 hm_fragment *frag; 942 hm_fragment *frag;
943 unsigned char seq64be[8]; 943 unsigned char seq64be[8];
944 944
945 /* Buffer the messsage in order to handle DTLS retransmissions. */ 945 /* Buffer the message in order to handle DTLS retransmissions. */
946 946
947 /* 947 /*
948 * This function is called immediately after a message has 948 * This function is called immediately after a message has
diff --git a/src/lib/libssl/doc/openssl.cnf b/src/lib/libssl/doc/openssl.cnf
index ed4bde52e8..db95bb5c18 100644
--- a/src/lib/libssl/doc/openssl.cnf
+++ b/src/lib/libssl/doc/openssl.cnf
@@ -43,7 +43,7 @@ certs = $dir/certs # Where the issued certs are kept
43crl_dir = $dir/crl # Where the issued crl are kept 43crl_dir = $dir/crl # Where the issued crl are kept
44database = $dir/index.txt # database index file. 44database = $dir/index.txt # database index file.
45#unique_subject = no # Set to 'no' to allow creation of 45#unique_subject = no # Set to 'no' to allow creation of
46 # several ctificates with same subject. 46 # several certificates with same subject.
47new_certs_dir = $dir/newcerts # default place for new certs. 47new_certs_dir = $dir/newcerts # default place for new certs.
48 48
49certificate = $dir/cacert.pem # The CA certificate 49certificate = $dir/cacert.pem # The CA certificate
@@ -53,7 +53,7 @@ crlnumber = $dir/crlnumber # the current crl number
53crl = $dir/crl.pem # The current CRL 53crl = $dir/crl.pem # The current CRL
54private_key = $dir/private/cakey.pem# The private key 54private_key = $dir/private/cakey.pem# The private key
55 55
56x509_extensions = usr_cert # The extentions to add to the cert 56x509_extensions = usr_cert # The extensions to add to the cert
57 57
58# Comment out the following two lines for the "traditional" 58# Comment out the following two lines for the "traditional"
59# (and highly broken) format. 59# (and highly broken) format.
@@ -105,7 +105,7 @@ default_bits = 1024
105default_keyfile = privkey.pem 105default_keyfile = privkey.pem
106distinguished_name = req_distinguished_name 106distinguished_name = req_distinguished_name
107attributes = req_attributes 107attributes = req_attributes
108x509_extensions = v3_ca # The extentions to add to the self signed cert 108x509_extensions = v3_ca # The extensions to add to the self signed cert
109 109
110# Passwords for private keys if not present they will be prompted for 110# Passwords for private keys if not present they will be prompted for
111# input_password = secret 111# input_password = secret
diff --git a/src/lib/libssl/doc/standards.txt b/src/lib/libssl/doc/standards.txt
index 7bada8d35f..6b3c5c5038 100644
--- a/src/lib/libssl/doc/standards.txt
+++ b/src/lib/libssl/doc/standards.txt
@@ -280,6 +280,6 @@ STARTTLS documents.
280To be implemented: 280To be implemented:
281------------------ 281------------------
282 282
283These are documents that describe things that are planed to be 283These are documents that describe things that are planned to be
284implemented in the hopefully short future. 284implemented in the hopefully short future.
285 285
diff --git a/src/lib/libssl/ssl.h b/src/lib/libssl/ssl.h
index 4a89bfd868..acde94c749 100644
--- a/src/lib/libssl/ssl.h
+++ b/src/lib/libssl/ssl.h
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssl.h,v 1.229 2022/09/11 17:39:46 tb Exp $ */ 1/* $OpenBSD: ssl.h,v 1.230 2022/12/26 07:31:44 jmc Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -2348,7 +2348,7 @@ void ERR_load_SSL_strings(void);
2348 */ 2348 */
2349 2349
2350/* 2350/*
2351 * These are provided for compatibiliy, but have no effect 2351 * These are provided for compatibility, but have no effect
2352 * on how LibreSSL is initialized. 2352 * on how LibreSSL is initialized.
2353 */ 2353 */
2354#define OPENSSL_INIT_LOAD_SSL_STRINGS _OPENSSL_INIT_FLAG_NOOP 2354#define OPENSSL_INIT_LOAD_SSL_STRINGS _OPENSSL_INIT_FLAG_NOOP
diff --git a/src/lib/libssl/ssl_clnt.c b/src/lib/libssl/ssl_clnt.c
index 64085b953f..c721aede4e 100644
--- a/src/lib/libssl/ssl_clnt.c
+++ b/src/lib/libssl/ssl_clnt.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssl_clnt.c,v 1.157 2022/11/26 16:08:55 tb Exp $ */ 1/* $OpenBSD: ssl_clnt.c,v 1.158 2022/12/26 07:31:44 jmc Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -1633,7 +1633,7 @@ ssl3_get_new_session_ticket(SSL *s)
1633 } 1633 }
1634 1634
1635 /* 1635 /*
1636 * There are two ways to detect a resumed ticket sesion. 1636 * There are two ways to detect a resumed ticket session.
1637 * One is to set an appropriate session ID and then the server 1637 * One is to set an appropriate session ID and then the server
1638 * must return a match in ServerHello. This allows the normal 1638 * must return a match in ServerHello. This allows the normal
1639 * client session ID matching to work and we know much 1639 * client session ID matching to work and we know much
@@ -1941,7 +1941,7 @@ ssl3_send_client_kex_gost(SSL *s, CBB *cbb)
1941 int nid; 1941 int nid;
1942 int ret = 0; 1942 int ret = 0;
1943 1943
1944 /* Get server sertificate PKEY and create ctx from it */ 1944 /* Get server certificate PKEY and create ctx from it */
1945 pkey = X509_get0_pubkey(s->session->peer_cert); 1945 pkey = X509_get0_pubkey(s->session->peer_cert);
1946 if (pkey == NULL || s->session->peer_cert_type != SSL_PKEY_GOST01) { 1946 if (pkey == NULL || s->session->peer_cert_type != SSL_PKEY_GOST01) {
1947 SSLerror(s, SSL_R_NO_GOST_CERTIFICATE_SENT_BY_PEER); 1947 SSLerror(s, SSL_R_NO_GOST_CERTIFICATE_SENT_BY_PEER);
diff --git a/src/lib/libssl/ssl_local.h b/src/lib/libssl/ssl_local.h
index 1e38d3939e..d510f80d8c 100644
--- a/src/lib/libssl/ssl_local.h
+++ b/src/lib/libssl/ssl_local.h
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssl_local.h,v 1.2 2022/11/26 17:23:18 tb Exp $ */ 1/* $OpenBSD: ssl_local.h,v 1.3 2022/12/26 07:31:44 jmc Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -1087,7 +1087,7 @@ struct ssl_st {
1087 STACK_OF(X509_NAME) *client_CA; 1087 STACK_OF(X509_NAME) *client_CA;
1088 1088
1089 /* set this flag to 1 and a sleep(1) is put into all SSL_read() 1089 /* set this flag to 1 and a sleep(1) is put into all SSL_read()
1090 * and SSL_write() calls, good for nbio debuging :-) */ 1090 * and SSL_write() calls, good for nbio debugging :-) */
1091 int debug; 1091 int debug;
1092 long max_cert_list; 1092 long max_cert_list;
1093 int first_packet; 1093 int first_packet;
diff --git a/src/lib/libssl/ssl_srvr.c b/src/lib/libssl/ssl_srvr.c
index efb71bb717..556107f5a1 100644
--- a/src/lib/libssl/ssl_srvr.c
+++ b/src/lib/libssl/ssl_srvr.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssl_srvr.c,v 1.152 2022/11/26 16:08:56 tb Exp $ */ 1/* $OpenBSD: ssl_srvr.c,v 1.153 2022/12/26 07:31:44 jmc Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -1152,8 +1152,8 @@ ssl3_get_client_hello(SSL *s)
1152 /* 1152 /*
1153 * We now have the following setup. 1153 * We now have the following setup.
1154 * client_random 1154 * client_random
1155 * cipher_list - our prefered list of ciphers 1155 * cipher_list - our preferred list of ciphers
1156 * ciphers - the clients prefered list of ciphers 1156 * ciphers - the clients preferred list of ciphers
1157 * compression - basically ignored right now 1157 * compression - basically ignored right now
1158 * ssl version is set - sslv3 1158 * ssl version is set - sslv3
1159 * s->session - The ssl session has been setup. 1159 * s->session - The ssl session has been setup.
diff --git a/src/lib/libssl/test/CAss.cnf b/src/lib/libssl/test/CAss.cnf
index 109bc8c10b..336e82fd52 100644
--- a/src/lib/libssl/test/CAss.cnf
+++ b/src/lib/libssl/test/CAss.cnf
@@ -36,7 +36,7 @@ certs = $dir/certs # Where the issued certs are kept
36crl_dir = $dir/crl # Where the issued crl are kept 36crl_dir = $dir/crl # Where the issued crl are kept
37database = $dir/index.txt # database index file. 37database = $dir/index.txt # database index file.
38#unique_subject = no # Set to 'no' to allow creation of 38#unique_subject = no # Set to 'no' to allow creation of
39 # several ctificates with same subject. 39 # several certificates with same subject.
40new_certs_dir = $dir/newcerts # default place for new certs. 40new_certs_dir = $dir/newcerts # default place for new certs.
41 41
42certificate = $dir/cacert.pem # The CA certificate 42certificate = $dir/cacert.pem # The CA certificate
@@ -45,7 +45,7 @@ crl = $dir/crl.pem # The current CRL
45private_key = $dir/private/cakey.pem# The private key 45private_key = $dir/private/cakey.pem# The private key
46RANDFILE = $dir/private/.rand # private random number file 46RANDFILE = $dir/private/.rand # private random number file
47 47
48x509_extensions = v3_ca # The extentions to add to the cert 48x509_extensions = v3_ca # The extensions to add to the cert
49 49
50name_opt = ca_default # Subject Name options 50name_opt = ca_default # Subject Name options
51cert_opt = ca_default # Certificate field options 51cert_opt = ca_default # Certificate field options
diff --git a/src/lib/libssl/test/CAtsa.cnf b/src/lib/libssl/test/CAtsa.cnf
index f5a275bfc2..b497b50452 100644
--- a/src/lib/libssl/test/CAtsa.cnf
+++ b/src/lib/libssl/test/CAtsa.cnf
@@ -57,7 +57,7 @@ distinguished_name = $ENV::TSDNSECT
57encrypt_rsa_key = no 57encrypt_rsa_key = no
58prompt = no 58prompt = no
59# attributes = req_attributes 59# attributes = req_attributes
60x509_extensions = v3_ca # The extentions to add to the self signed cert 60x509_extensions = v3_ca # The extensions to add to the self signed cert
61 61
62string_mask = nombstr 62string_mask = nombstr
63 63
diff --git a/src/lib/libssl/test/pkits-test.pl b/src/lib/libssl/test/pkits-test.pl
index 5c6b89fcdb..17186066ad 100644
--- a/src/lib/libssl/test/pkits-test.pl
+++ b/src/lib/libssl/test/pkits-test.pl
@@ -124,7 +124,7 @@ my @testlists = (
124 [ "4.4.7", "Valid Two CRLs Test7", 0 ], 124 [ "4.4.7", "Valid Two CRLs Test7", 0 ],
125 125
126 # The test document suggests these should return certificate revoked... 126 # The test document suggests these should return certificate revoked...
127 # Subsquent discussion has concluded they should not due to unhandle 127 # Subsequent discussion has concluded they should not due to unhandle
128 # critical CRL extensions. 128 # critical CRL extensions.
129 [ "4.4.8", "Invalid Unknown CRL Entry Extension Test8", 36 ], 129 [ "4.4.8", "Invalid Unknown CRL Entry Extension Test8", 36 ],
130 [ "4.4.9", "Invalid Unknown CRL Extension Test9", 36 ], 130 [ "4.4.9", "Invalid Unknown CRL Extension Test9", 36 ],
@@ -749,7 +749,7 @@ my @testlists = (
749 [ "4.14.29", "Valid cRLIssuer Test29", 0 ], 749 [ "4.14.29", "Valid cRLIssuer Test29", 0 ],
750 750
751 # Although this test is valid it has a circular dependency. As a result 751 # Although this test is valid it has a circular dependency. As a result
752 # an attempt is made to reursively checks a CRL path and rejected due to 752 # an attempt is made to recursively check a CRL path and rejected due to
753 # a CRL path validation error. PKITS notes suggest this test does not 753 # a CRL path validation error. PKITS notes suggest this test does not
754 # need to be run due to this issue. 754 # need to be run due to this issue.
755 [ "4.14.30", "Valid cRLIssuer Test30", 54 ], 755 [ "4.14.30", "Valid cRLIssuer Test30", 54 ],