提交 ceab33e2 编写于 作者: F FdaSilvaYY 提交者: Rich Salz

Typo and comment fix

Reviewed-by: NMatt Caswell <matt@openssl.org>
Reviewed-by: NRich Salz <rsalz@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/1301)
上级 fefa4d55
...@@ -480,7 +480,7 @@ int cms_main(int argc, char **argv) ...@@ -480,7 +480,7 @@ int cms_main(int argc, char **argv)
signerfile = opt_arg(); signerfile = opt_arg();
break; break;
case OPT_INKEY: case OPT_INKEY:
/* If previous -inkey arument add signer to list */ /* If previous -inkey argument add signer to list */
if (keyfile) { if (keyfile) {
if (signerfile == NULL) { if (signerfile == NULL) {
BIO_puts(bio_err, "Illegal -inkey without -signer\n"); BIO_puts(bio_err, "Illegal -inkey without -signer\n");
......
...@@ -105,7 +105,7 @@ OPTIONS ocsp_options[] = { ...@@ -105,7 +105,7 @@ OPTIONS ocsp_options[] = {
{"timeout", OPT_TIMEOUT, 'p', {"timeout", OPT_TIMEOUT, 'p',
"Connection timeout (in seconds) to the OCSP responder"}, "Connection timeout (in seconds) to the OCSP responder"},
{"url", OPT_URL, 's', "Responder URL"}, {"url", OPT_URL, 's', "Responder URL"},
{"host", OPT_HOST, 's', "host:prot top to connect to"}, {"host", OPT_HOST, 's', "TCP/IP hostname:port to connect to"},
{"port", OPT_PORT, 'p', "Port to run responder on"}, {"port", OPT_PORT, 'p', "Port to run responder on"},
{"ignore_err", OPT_IGNORE_ERR, '-'}, {"ignore_err", OPT_IGNORE_ERR, '-'},
{"noverify", OPT_NOVERIFY, '-', "Don't verify response at all"}, {"noverify", OPT_NOVERIFY, '-', "Don't verify response at all"},
...@@ -114,7 +114,7 @@ OPTIONS ocsp_options[] = { ...@@ -114,7 +114,7 @@ OPTIONS ocsp_options[] = {
{"resp_no_certs", OPT_RESP_NO_CERTS, '-', {"resp_no_certs", OPT_RESP_NO_CERTS, '-',
"Don't include any certificates in response"}, "Don't include any certificates in response"},
{"resp_key_id", OPT_RESP_KEY_ID, '-', {"resp_key_id", OPT_RESP_KEY_ID, '-',
"Identify reponse by signing certificate key ID"}, "Identify response by signing certificate key ID"},
{"no_certs", OPT_NO_CERTS, '-', {"no_certs", OPT_NO_CERTS, '-',
"Don't include any certificates in signed request"}, "Don't include any certificates in signed request"},
{"no_signature_verify", OPT_NO_SIGNATURE_VERIFY, '-', {"no_signature_verify", OPT_NO_SIGNATURE_VERIFY, '-',
......
...@@ -740,7 +740,7 @@ OPTIONS s_server_options[] = { ...@@ -740,7 +740,7 @@ OPTIONS s_server_options[] = {
{"Verify", OPT_UPPER_V_VERIFY, 'n', {"Verify", OPT_UPPER_V_VERIFY, 'n',
"Turn on peer certificate verification, must have a cert"}, "Turn on peer certificate verification, must have a cert"},
{"cert", OPT_CERT, '<', "Certificate file to use; default is " TEST_CERT}, {"cert", OPT_CERT, '<', "Certificate file to use; default is " TEST_CERT},
{"naccept", OPT_NACCEPT, 'p', "Terminate after pnum connections"}, {"naccept", OPT_NACCEPT, 'p', "Terminate after #num connections"},
{"serverinfo", OPT_SERVERINFO, 's', {"serverinfo", OPT_SERVERINFO, 's',
"PEM serverinfo file for certificate"}, "PEM serverinfo file for certificate"},
{"certform", OPT_CERTFORM, 'F', {"certform", OPT_CERTFORM, 'F',
...@@ -788,7 +788,7 @@ OPTIONS s_server_options[] = { ...@@ -788,7 +788,7 @@ OPTIONS s_server_options[] = {
"-Private Key file to use for servername if not in -cert2"}, "-Private Key file to use for servername if not in -cert2"},
{"tlsextdebug", OPT_TLSEXTDEBUG, '-', {"tlsextdebug", OPT_TLSEXTDEBUG, '-',
"Hex dump of all TLS extensions received"}, "Hex dump of all TLS extensions received"},
{"HTTP", OPT_HTTP, '-', "Like -WWW but ./path incluedes HTTP headers"}, {"HTTP", OPT_HTTP, '-', "Like -WWW but ./path includes HTTP headers"},
{"id_prefix", OPT_ID_PREFIX, 's', {"id_prefix", OPT_ID_PREFIX, 's',
"Generate SSL/TLS session IDs prefixed by arg"}, "Generate SSL/TLS session IDs prefixed by arg"},
{"rand", OPT_RAND, 's', {"rand", OPT_RAND, 's',
......
...@@ -275,7 +275,7 @@ int smime_main(int argc, char **argv) ...@@ -275,7 +275,7 @@ int smime_main(int argc, char **argv)
goto opthelp; goto opthelp;
break; break;
case OPT_INKEY: case OPT_INKEY:
/* If previous -inkey arument add signer to list */ /* If previous -inkey argument add signer to list */
if (keyfile) { if (keyfile) {
if (signerfile == NULL) { if (signerfile == NULL) {
BIO_printf(bio_err, BIO_printf(bio_err,
......
...@@ -116,9 +116,10 @@ SCT *SCT_new_from_base64(unsigned char version, const char *logid_base64, ...@@ -116,9 +116,10 @@ SCT *SCT_new_from_base64(unsigned char version, const char *logid_base64,
} }
/* /*
* This methods returns: 1 on Success, * Allocate, build and returns a new |ct_log| from input |pkey_base64|
* 0 on decoding failure, * It returns 1 on success,
* -1 on internal (malloc) failure, or invalid parameter if any. * 0 on decoding failure, or invalid parameter if any
* -1 on internal (malloc) failure
*/ */
int CTLOG_new_from_base64(CTLOG **ct_log, const char *pkey_base64, const char *name) int CTLOG_new_from_base64(CTLOG **ct_log, const char *pkey_base64, const char *name)
{ {
......
...@@ -319,7 +319,7 @@ typedef int (*custom_ext_parse_cb) (SSL *s, unsigned int ext_type, ...@@ -319,7 +319,7 @@ typedef int (*custom_ext_parse_cb) (SSL *s, unsigned int ext_type,
# define SSL_OP_SINGLE_ECDH_USE 0x0 # define SSL_OP_SINGLE_ECDH_USE 0x0
/* Does nothing: retained for compatibility */ /* Does nothing: retained for compatibility */
# define SSL_OP_SINGLE_DH_USE 0x0 # define SSL_OP_SINGLE_DH_USE 0x0
/* Does nothing: retained for compatibiity */ /* Does nothing: retained for compatibility */
# define SSL_OP_EPHEMERAL_RSA 0x0 # define SSL_OP_EPHEMERAL_RSA 0x0
/* /*
* Set on servers to choose the cipher according to the server's preferences * Set on servers to choose the cipher according to the server's preferences
...@@ -407,7 +407,7 @@ typedef int (*custom_ext_parse_cb) (SSL *s, unsigned int ext_type, ...@@ -407,7 +407,7 @@ typedef int (*custom_ext_parse_cb) (SSL *s, unsigned int ext_type,
/* Cert related flags */ /* Cert related flags */
/* /*
* Many implementations ignore some aspects of the TLS standards such as * Many implementations ignore some aspects of the TLS standards such as
* enforcing certifcate chain algorithms. When this is set we enforce them. * enforcing certificate chain algorithms. When this is set we enforce them.
*/ */
# define SSL_CERT_FLAG_TLS_STRICT 0x00000001U # define SSL_CERT_FLAG_TLS_STRICT 0x00000001U
...@@ -1541,7 +1541,7 @@ void SSL_certs_clear(SSL *s); ...@@ -1541,7 +1541,7 @@ void SSL_certs_clear(SSL *s);
void SSL_free(SSL *ssl); void SSL_free(SSL *ssl);
# ifdef OSSL_ASYNC_FD # ifdef OSSL_ASYNC_FD
/* /*
* Windows applcation developer has to include windows.h to use these. * Windows application developer has to include windows.h to use these.
*/ */
__owur int SSL_waiting_for_async(SSL *s); __owur int SSL_waiting_for_async(SSL *s);
__owur int SSL_get_all_async_fds(SSL *s, OSSL_ASYNC_FD *fds, size_t *numfds); __owur int SSL_get_all_async_fds(SSL *s, OSSL_ASYNC_FD *fds, size_t *numfds);
...@@ -1752,8 +1752,8 @@ __owur int SSL_get_ex_data_X509_STORE_CTX_idx(void); ...@@ -1752,8 +1752,8 @@ __owur int SSL_get_ex_data_X509_STORE_CTX_idx(void);
void SSL_CTX_set_default_read_buffer_len(SSL_CTX *ctx, size_t len); void SSL_CTX_set_default_read_buffer_len(SSL_CTX *ctx, size_t len);
void SSL_set_default_read_buffer_len(SSL *s, size_t len); void SSL_set_default_read_buffer_len(SSL *s, size_t len);
/* NB: the keylength is only applicable when is_export is true */
# ifndef OPENSSL_NO_DH # ifndef OPENSSL_NO_DH
/* NB: the |keylength| is only applicable when is_export is true */
void SSL_CTX_set_tmp_dh_callback(SSL_CTX *ctx, void SSL_CTX_set_tmp_dh_callback(SSL_CTX *ctx,
DH *(*dh) (SSL *ssl, int is_export, DH *(*dh) (SSL *ssl, int is_export,
int keylength)); int keylength));
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册