[openssl-commits] [openssl] master update

matthias.st.pierre at ncp-e.com matthias.st.pierre at ncp-e.com
Sat Mar 17 17:24:15 UTC 2018


The branch master has been updated
       via  dd07e68b2066745caa7f0d9f866cfb6fdf0fc89f (commit)
      from  d597208c034722d09612c805e4894b0019bdd710 (commit)


- Log -----------------------------------------------------------------
commit dd07e68b2066745caa7f0d9f866cfb6fdf0fc89f
Author: Dr. Matthias St. Pierre <Matthias.St.Pierre at ncp-e.com>
Date:   Fri Feb 16 15:45:32 2018 +0100

    Fix miscellaneous typos in docs and source
    
    - d2i_PKC8PrivateKey -> d2i_PKCS8PrivateKey
    - bechmark -> benchmark
    - ciperhsuite -> ciphersuite
    - EncyptedPreMasterSecret -> EncryptedPreMasterSecret
    
    Reviewed-by: Richard Levitte <levitte at openssl.org>
    (Merged from https://github.com/openssl/openssl/pull/5570)

-----------------------------------------------------------------------

Summary of changes:
 crypto/bn/asm/ppc.pl            | 2 +-
 doc/man1/speed.pod              | 4 ++--
 doc/man3/d2i_PrivateKey.pod     | 2 +-
 ssl/t1_trce.c                   | 4 ++--
 test/recipes/70-test_tls13psk.t | 2 +-
 5 files changed, 7 insertions(+), 7 deletions(-)

diff --git a/crypto/bn/asm/ppc.pl b/crypto/bn/asm/ppc.pl
index 39349ae..d197f96 100644
--- a/crypto/bn/asm/ppc.pl
+++ b/crypto/bn/asm/ppc.pl
@@ -40,7 +40,7 @@
 #dsa  512 bits   0.0087s   0.0106s    114.3     94.5
 #dsa 1024 bits   0.0256s   0.0313s     39.0     32.0
 #
-#	Same bechmark with this assembler code:
+#	Same benchmark with this assembler code:
 #
 #rsa  512 bits   0.0056s   0.0005s    178.6   2049.2
 #rsa 1024 bits   0.0283s   0.0015s     35.3    674.1
diff --git a/doc/man1/speed.pod b/doc/man1/speed.pod
index f57f55a..b20af84 100644
--- a/doc/man1/speed.pod
+++ b/doc/man1/speed.pod
@@ -73,11 +73,11 @@ is only effective if RSA algorithm is specified to test.
 
 =item B<-seconds num>
 
-Run bechmarks for B<num> seconds.
+Run benchmarks for B<num> seconds.
 
 =item B<-bytes num>
 
-Run bechmarks on B<num>-byte buffers. Affects ciphers, digests and the CSPRNG.
+Run benchmarks on B<num>-byte buffers. Affects ciphers, digests and the CSPRNG.
 
 =item B<[zero or more test algorithms]>
 
diff --git a/doc/man3/d2i_PrivateKey.pod b/doc/man3/d2i_PrivateKey.pod
index f5b4667..813c8a6 100644
--- a/doc/man3/d2i_PrivateKey.pod
+++ b/doc/man3/d2i_PrivateKey.pod
@@ -44,7 +44,7 @@ These functions are similar to the d2i_X509() functions; see L<d2i_X509(3)>.
 
 All these functions use DER format and unencrypted keys. Applications wishing
 to encrypt or decrypt private keys should use other functions such as
-d2i_PKC8PrivateKey() instead.
+d2i_PKCS8PrivateKey() instead.
 
 If the B<*a> is not NULL when calling d2i_PrivateKey() or d2i_AutoPrivateKey()
 (i.e. an existing structure is being reused) and the key format is PKCS#8
diff --git a/ssl/t1_trce.c b/ssl/t1_trce.c
index 3186b98..55f1824 100644
--- a/ssl/t1_trce.c
+++ b/ssl/t1_trce.c
@@ -1086,10 +1086,10 @@ static int ssl_print_client_keyex(BIO *bio, int indent, const SSL *ssl,
     case SSL_kRSAPSK:
         if (TLS1_get_version(ssl) == SSL3_VERSION) {
             ssl_print_hex(bio, indent + 2,
-                          "EncyptedPreMasterSecret", msg, msglen);
+                          "EncryptedPreMasterSecret", msg, msglen);
         } else {
             if (!ssl_print_hexbuf(bio, indent + 2,
-                                  "EncyptedPreMasterSecret", 2, &msg, &msglen))
+                                  "EncryptedPreMasterSecret", 2, &msg, &msglen))
                 return 0;
         }
         break;
diff --git a/test/recipes/70-test_tls13psk.t b/test/recipes/70-test_tls13psk.t
index fa30dd1..fedc527 100644
--- a/test/recipes/70-test_tls13psk.t
+++ b/test/recipes/70-test_tls13psk.t
@@ -63,7 +63,7 @@ $proxy->start();
 ok(TLSProxy::Message->fail(), "PSK not last");
 
 #Test 3: Attempt a resume after an HRR where PSK hash matches selected
-#        ciperhsuite. Should see PSK on second ClientHello
+#        ciphersuite. Should see PSK on second ClientHello
 $proxy->clear();
 $proxy->clientflags("-sess_in ".$session);
 $proxy->serverflags("-curves P-256");


More information about the openssl-commits mailing list