diff --git a/MacOS/GetHTTPS.src/ErrorHandling.hpp b/MacOS/GetHTTPS.src/ErrorHandling.hpp index 3036df7ee0bf710c9355457827063885f6102f0c..fbfbe786b757a6bd31656f9b81e55765fd19bdd0 100644 --- a/MacOS/GetHTTPS.src/ErrorHandling.hpp +++ b/MacOS/GetHTTPS.src/ErrorHandling.hpp @@ -29,7 +29,7 @@ OSErr AppendErrorMessageToHandle(Handle inoutHandle); -// A bunch of evil macros that would be uneccessary if I were always using C++ ! +// A bunch of evil macros that would be unnecessary if I were always using C++ ! #define SetErrorMessageAndBailIfNil(theArg,theMessage) \ { \ diff --git a/crypto/asn1/a_bytes.c b/crypto/asn1/a_bytes.c index 8d13f9c93113a80c116dc8b6b0a26438c95b7861..92d630cdbaf8b1be5ad83d303d4b6a87a16b8fab 100644 --- a/crypto/asn1/a_bytes.c +++ b/crypto/asn1/a_bytes.c @@ -79,7 +79,7 @@ ASN1_STRING *d2i_ASN1_type_bytes(ASN1_STRING **a, const unsigned char **pp, if (tag >= 32) { - i=ASN1_R_TAG_VALUE_TOO_HIGH;; + i=ASN1_R_TAG_VALUE_TOO_HIGH; goto err; } if (!(ASN1_tag2bit(tag) & type)) diff --git a/crypto/bn/bntest.c b/crypto/bn/bntest.c index 565590a1f17bf58a6012dc7ebb879642467adf56..14990bc4ff10489925e76031ad8d3af6d63cc6db 100644 --- a/crypto/bn/bntest.c +++ b/crypto/bn/bntest.c @@ -928,7 +928,7 @@ int test_mod_exp(BIO *bp, BN_CTX *ctx) BN_bntest_rand(b,2+i,0,0); /**/ if (!BN_mod_exp(d,a,b,c,ctx)) - return(00); + return(0); if (bp != NULL) { @@ -1030,7 +1030,7 @@ int test_exp(BIO *bp, BN_CTX *ctx) BN_bntest_rand(b,2+i,0,0); /**/ if (!BN_exp(d,a,b,ctx)) - return(00); + return(0); if (bp != NULL) { diff --git a/crypto/des/times/usparc.cc b/crypto/des/times/usparc.cc index f6ec8e8831d8864fbbbd9b38f2e3bbcc9af2398c..0864285ef6ac89d5be354ad799579f7af083f4df 100644 --- a/crypto/des/times/usparc.cc +++ b/crypto/des/times/usparc.cc @@ -2,7 +2,7 @@ solaris 2.5.1 usparc 167mhz?? - SC4.0 cc -fast -Xa -xO5 For the ultra sparc, SunC 4.0 cc -fast -Xa -xO5, running 'des_opts' gives a speed of 475,000 des/s while 'speed' gives 417,000 des/s. -I belive the difference is tied up in optimisation that the compiler +I believe the difference is tied up in optimisation that the compiler is able to perform when the code is 'inlined'. For 'speed', the DES routines are being linked from a library. I'll record the higher speed since if performance is everything, you can always inline diff --git a/crypto/ripemd/README b/crypto/ripemd/README index 70977072649ef81250a9511281a88e033728f88b..f1ffc8b134036f150b703a59bcabb68dfc3f6ee1 100644 --- a/crypto/ripemd/README +++ b/crypto/ripemd/README @@ -4,7 +4,7 @@ http://www.esat.kuleuven.ac.be/~bosselae/ripemd160.html This is my implementation of RIPEMD-160. The pentium assember is a little off the pace since I only get 1050 cycles, while the best is 1013. I have a few ideas for how to get another 20 or so cycles, but at -this point I will not bother right now. I belive the trick will be +this point I will not bother right now. I believe the trick will be to remove my 'copy X array onto stack' until inside the RIP1() finctions the first time round. To do this I need another register and will only have one temporary one. A bit tricky.... I can also cleanup the saving of the 5 words diff --git a/crypto/x509v3/v3_utl.c b/crypto/x509v3/v3_utl.c index 706a2b4b42c048a805d25f29f7a924f2df8c3f55..4a8751722d568aa6506605eedb872476f491fc6f 100644 --- a/crypto/x509v3/v3_utl.c +++ b/crypto/x509v3/v3_utl.c @@ -84,7 +84,7 @@ int X509V3_add_value(const char *name, const char *value, CONF_VALUE *vtmp = NULL; char *tname = NULL, *tvalue = NULL; if(name && !(tname = BUF_strdup(name))) goto err; - if(value && !(tvalue = BUF_strdup(value))) goto err;; + if(value && !(tvalue = BUF_strdup(value))) goto err; if(!(vtmp = (CONF_VALUE *)OPENSSL_malloc(sizeof(CONF_VALUE)))) goto err; if(!*extlist && !(*extlist = sk_CONF_VALUE_new_null())) goto err; vtmp->section = NULL; diff --git a/doc/ssl/SSL_CIPHER_get_name.pod b/doc/ssl/SSL_CIPHER_get_name.pod index f81f692df5de85323e2668c2ad806a9e4c8021c0..f62a869a9bbac39b9a34a22e2818349201f4a249 100644 --- a/doc/ssl/SSL_CIPHER_get_name.pod +++ b/doc/ssl/SSL_CIPHER_get_name.pod @@ -28,7 +28,7 @@ SSL_CIPHER_get_version() returns the protocol version for B, currently SSL_CIPHER_description() returns a textual description of the cipher used into the buffer B of length B provided. B must be at least -128 bytes, otherwise a pointer to the the string "Buffer too small" is +128 bytes, otherwise a pointer to the string "Buffer too small" is returned. If B is NULL, a buffer of 128 bytes is allocated using OPENSSL_malloc(). If the allocation fails, a pointer to the string "OPENSSL_malloc Error" is returned. diff --git a/doc/ssl/SSL_CTX_set_verify.pod b/doc/ssl/SSL_CTX_set_verify.pod index ca8d81b82c818d08f209c73a98ebd7def83ac257..81566839d3d8a16fae91799ff0bf753059a52d92 100644 --- a/doc/ssl/SSL_CTX_set_verify.pod +++ b/doc/ssl/SSL_CTX_set_verify.pod @@ -28,7 +28,7 @@ specifies the B function to be used. If no callback function shall be specified, the NULL pointer can be used for B. In this case last B set specifically for this B remains. If no special B was set before, the default callback for the underlying -B is used, that was valid at the the time B was created with +B is used, that was valid at the time B was created with L. SSL_CTX_set_verify_depth() sets the maximum B for the certificate chain diff --git a/doc/ssl/SSL_SESSION_free.pod b/doc/ssl/SSL_SESSION_free.pod index 558de01df91d1f8f677a2691dd1b638d20012c2d..110ec73ab622cc83d3dfec01462b100dd9d03b83 100644 --- a/doc/ssl/SSL_SESSION_free.pod +++ b/doc/ssl/SSL_SESSION_free.pod @@ -14,7 +14,7 @@ SSL_SESSION_free - free an allocated SSL_SESSION structure SSL_SESSION_free() decrements the reference count of B and removes the B structure pointed to by B and frees up the allocated -memory, if the the reference count has reached 0. +memory, if the reference count has reached 0. =head1 NOTES diff --git a/doc/ssl/SSL_free.pod b/doc/ssl/SSL_free.pod index 2d4f8b6168b33f26b64b377d877589854e0a35b7..13c1abd9ecff3ab99a47ce2a7bd8606ebb6520b2 100644 --- a/doc/ssl/SSL_free.pod +++ b/doc/ssl/SSL_free.pod @@ -14,7 +14,7 @@ SSL_free - free an allocated SSL structure SSL_free() decrements the reference count of B, and removes the SSL structure pointed to by B and frees up the allocated memory if the -the reference count has reached 0. +reference count has reached 0. =head1 NOTES diff --git a/doc/ssleay.txt b/doc/ssleay.txt index c75312911f96339753fc123ee90725d08106a9ad..a8b04d7059a3b05fe5207e5e8e555d48b0c8425f 100644 --- a/doc/ssleay.txt +++ b/doc/ssleay.txt @@ -3800,9 +3800,9 @@ made public on sci.crypt in Sep 1994 (RC4) and Feb 1996 (RC2). I have copies of the origional postings if people are interested. RSA I believe claim that they were 'trade-secrets' and that some-one broke an NDA in revealing them. Other claim they reverse engineered the algorithms from -compiled binaries. If the algorithms were reverse engineered, I belive +compiled binaries. If the algorithms were reverse engineered, I believe RSA had no legal leg to stand on. If an NDA was broken, I don't know. -Regardless, RSA, I belive, is willing to go to court over the issue so +Regardless, RSA, I believe, is willing to go to court over the issue so licencing is probably the best idea, or at least talk to them. If there are people who actually know more about this, pease let me know, I don't want to vilify or spread miss-information if I can help it. diff --git a/ssl/kssl.c b/ssl/kssl.c index 56e5eeeecddb9fc6f3cdb605e97e15516d8af8da..864eb836083c8d35ad290d6a69bc63df6175958a 100644 --- a/ssl/kssl.c +++ b/ssl/kssl.c @@ -946,7 +946,7 @@ kssl_err_set(KSSL_ERR *kssl_err, int reason, char *text) if (kssl_err == NULL) return; kssl_err->reason = reason; - BIO_snprintf(kssl_err->text, KSSL_ERR_MAX, text); + BIO_snprintf(kssl_err->text, KSSL_ERR_MAX, "%s", text); return; } diff --git a/ssl/s3_clnt.c b/ssl/s3_clnt.c index 5d8908657137512f5056bd99e9f4acae48402736..f83389b54369531e03ecf207074436e36a558e4e 100644 --- a/ssl/s3_clnt.c +++ b/ssl/s3_clnt.c @@ -190,7 +190,7 @@ int ssl3_connect(SSL *s) long num1; void (*cb)(const SSL *ssl,int type,int val)=NULL; int ret= -1; - int new_state,state,skip=0;; + int new_state,state,skip=0; RAND_add(&Time,sizeof(Time),0); ERR_clear_error(); diff --git a/test/times b/test/times index 49aeebf216e8c345b25b71aed5e308f81e3ced97..738d569b8f4f1691a8b732560cd17fb8c5064f38 100644 --- a/test/times +++ b/test/times @@ -68,7 +68,7 @@ eric (adding numbers to speculation) --- Appendix --- - The time measured is user time but these number a very rough. - Remember this is the cost of both client and server sides of the protocol. -- The TCP/kernal overhead of connection establishment is normally the +- The TCP/kernel overhead of connection establishment is normally the killer in SSL. Often delays in the TCP protocol will make session-id reuse look slower that new sessions, but this would not be the case on a loaded server.