X-Git-Url: https://git.openssl.org/gitweb/?p=openssl.git;a=blobdiff_plain;f=ssl%2Fs2_clnt.c;h=47dd09c286f398922daf505534394f67b0f66395;hp=e4e9660cb4b1f66ad956ac7e86f93bfd27682348;hb=ccd86b68ef7f9a5cfaaed4089bce29fdc5fe4219;hpb=2557eaeac81c93f9e12534ac64a7634ab2bdb0fc diff --git a/ssl/s2_clnt.c b/ssl/s2_clnt.c index e4e9660cb4..47dd09c286 100644 --- a/ssl/s2_clnt.c +++ b/ssl/s2_clnt.c @@ -245,7 +245,7 @@ int ssl2_connect(SSL *s) /* ERR_clear_error();*/ /* If we want to cache session-ids in the client - * and we sucessfully add the session-id to the + * and we successfully add the session-id to the * cache, and there is a callback, then pass it out. * 26/11/96 - eay - only add if not a re-used session. */ @@ -368,7 +368,7 @@ static int get_server_hello(SSL *s) */ #endif - /* we need to do this incase we were trying to reuse a + /* we need to do this in case we were trying to reuse a * client session but others are already reusing it. * If this was a new 'blank' session ID, the session-id * length will still be 0 */ @@ -418,7 +418,7 @@ static int get_server_hello(SSL *s) /* In theory we could have ciphers sent back that we * don't want to use but that does not matter since we - * will check against the list we origionally sent and + * will check against the list we originally sent and * for performance reasons we should not bother to match * the two lists up just to check. */ for (i=0; iverify_result */ /* server's cert for this session */ sc=ssl_sess_cert_new();