From: Dr. Matthias St. Pierre Date: Fri, 16 Feb 2018 14:45:32 +0000 (+0100) Subject: Fix miscellaneous typos in docs and source X-Git-Tag: OpenSSL_1_1_1-pre3~45 X-Git-Url: https://git.openssl.org/?p=openssl.git;a=commitdiff_plain;h=dd07e68b2066745caa7f0d9f866cfb6fdf0fc89f Fix miscellaneous typos in docs and source - d2i_PKC8PrivateKey -> d2i_PKCS8PrivateKey - bechmark -> benchmark - ciperhsuite -> ciphersuite - EncyptedPreMasterSecret -> EncryptedPreMasterSecret Reviewed-by: Richard Levitte (Merged from https://github.com/openssl/openssl/pull/5570) --- diff --git a/crypto/bn/asm/ppc.pl b/crypto/bn/asm/ppc.pl index 39349ae887..d197f96531 100644 --- a/crypto/bn/asm/ppc.pl +++ b/crypto/bn/asm/ppc.pl @@ -40,7 +40,7 @@ #dsa 512 bits 0.0087s 0.0106s 114.3 94.5 #dsa 1024 bits 0.0256s 0.0313s 39.0 32.0 # -# Same bechmark with this assembler code: +# Same benchmark with this assembler code: # #rsa 512 bits 0.0056s 0.0005s 178.6 2049.2 #rsa 1024 bits 0.0283s 0.0015s 35.3 674.1 diff --git a/doc/man1/speed.pod b/doc/man1/speed.pod index f57f55a534..b20af847d6 100644 --- a/doc/man1/speed.pod +++ b/doc/man1/speed.pod @@ -73,11 +73,11 @@ is only effective if RSA algorithm is specified to test. =item B<-seconds num> -Run bechmarks for B seconds. +Run benchmarks for B seconds. =item B<-bytes num> -Run bechmarks on B-byte buffers. Affects ciphers, digests and the CSPRNG. +Run benchmarks on B-byte buffers. Affects ciphers, digests and the CSPRNG. =item B<[zero or more test algorithms]> diff --git a/doc/man3/d2i_PrivateKey.pod b/doc/man3/d2i_PrivateKey.pod index f5b4667acd..813c8a6677 100644 --- a/doc/man3/d2i_PrivateKey.pod +++ b/doc/man3/d2i_PrivateKey.pod @@ -44,7 +44,7 @@ These functions are similar to the d2i_X509() functions; see L. All these functions use DER format and unencrypted keys. Applications wishing to encrypt or decrypt private keys should use other functions such as -d2i_PKC8PrivateKey() instead. +d2i_PKCS8PrivateKey() instead. If the B<*a> is not NULL when calling d2i_PrivateKey() or d2i_AutoPrivateKey() (i.e. an existing structure is being reused) and the key format is PKCS#8 diff --git a/ssl/t1_trce.c b/ssl/t1_trce.c index 3186b98755..55f1824183 100644 --- a/ssl/t1_trce.c +++ b/ssl/t1_trce.c @@ -1086,10 +1086,10 @@ static int ssl_print_client_keyex(BIO *bio, int indent, const SSL *ssl, case SSL_kRSAPSK: if (TLS1_get_version(ssl) == SSL3_VERSION) { ssl_print_hex(bio, indent + 2, - "EncyptedPreMasterSecret", msg, msglen); + "EncryptedPreMasterSecret", msg, msglen); } else { if (!ssl_print_hexbuf(bio, indent + 2, - "EncyptedPreMasterSecret", 2, &msg, &msglen)) + "EncryptedPreMasterSecret", 2, &msg, &msglen)) return 0; } break; diff --git a/test/recipes/70-test_tls13psk.t b/test/recipes/70-test_tls13psk.t index fa30dd10bb..fedc527892 100644 --- a/test/recipes/70-test_tls13psk.t +++ b/test/recipes/70-test_tls13psk.t @@ -63,7 +63,7 @@ $proxy->start(); ok(TLSProxy::Message->fail(), "PSK not last"); #Test 3: Attempt a resume after an HRR where PSK hash matches selected -# ciperhsuite. Should see PSK on second ClientHello +# ciphersuite. Should see PSK on second ClientHello $proxy->clear(); $proxy->clientflags("-sess_in ".$session); $proxy->serverflags("-curves P-256");