|
@@ -447,7 +447,7 @@ static int test_keylog_no_master_key(void) {
|
|
|
|
|
|
/*
|
|
|
* Now we want to test that our output data was vaguely sensible. For this
|
|
|
- * test, we expect no CLIENT_RANDOM entry becuase it doesn't make sense for
|
|
|
+ * test, we expect no CLIENT_RANDOM entry because it doesn't make sense for
|
|
|
* TLSv1.3, but we do expect both client and server to emit keys.
|
|
|
*/
|
|
|
expected.client_handshake_secret_count = 1;
|
|
@@ -503,7 +503,7 @@ static int full_early_callback(SSL *s, int *al, void *arg)
|
|
|
}
|
|
|
len = SSL_early_get0_compression_methods(s, &p);
|
|
|
if (len != 1 || *p != 0) {
|
|
|
- printf("Early callback expected comperssion methods mismatch\n");
|
|
|
+ printf("Early callback expected compression methods mismatch\n");
|
|
|
return 0;
|
|
|
}
|
|
|
return 1;
|
|
@@ -574,7 +574,7 @@ static int execute_test_large_message(const SSL_METHOD *smeth,
|
|
|
int certlen;
|
|
|
|
|
|
if (certbio == NULL) {
|
|
|
- printf("Can't load the certficate file\n");
|
|
|
+ printf("Can't load the certificate file\n");
|
|
|
goto end;
|
|
|
}
|
|
|
chaincert = PEM_read_bio_X509(certbio, NULL, NULL, NULL);
|
|
@@ -603,7 +603,7 @@ static int execute_test_large_message(const SSL_METHOD *smeth,
|
|
|
* We assume the supplied certificate is big enough so that if we add
|
|
|
* NUM_EXTRA_CERTS it will make the overall message large enough. The
|
|
|
* default buffer size is requested to be 16k, but due to the way BUF_MEM
|
|
|
- * works, it ends up allocing a little over 21k (16 * 4/3). So, in this test
|
|
|
+ * works, it ends up allocating a little over 21k (16 * 4/3). So, in this test
|
|
|
* we need to have a message larger than that.
|
|
|
*/
|
|
|
certlen = i2d_X509(chaincert, NULL);
|
|
@@ -860,11 +860,11 @@ static int test_tlsext_status_type(void)
|
|
|
|
|
|
/*
|
|
|
* We'll just use any old cert for this test - it doesn't have to be an OCSP
|
|
|
- * specifc one. We'll use the server cert.
|
|
|
+ * specific one. We'll use the server cert.
|
|
|
*/
|
|
|
certbio = BIO_new_file(cert, "r");
|
|
|
if (certbio == NULL) {
|
|
|
- printf("Can't load the certficate file\n");
|
|
|
+ printf("Can't load the certificate file\n");
|
|
|
goto end;
|
|
|
}
|
|
|
id = OCSP_RESPID_new();
|
|
@@ -1246,7 +1246,7 @@ static int test_ssl_set_bio(int idx)
|
|
|
|
|
|
/*
|
|
|
* We want to maintain our own refs to these BIO, so do an up ref for each
|
|
|
- * BIO that will have ownersip transferred in the SSL_set_bio() call
|
|
|
+ * BIO that will have ownership transferred in the SSL_set_bio() call
|
|
|
*/
|
|
|
if (irbio != NULL)
|
|
|
BIO_up_ref(irbio);
|
|
@@ -1342,7 +1342,7 @@ static int execute_test_ssl_bio(SSL_BIO_TEST_FIXTURE fix)
|
|
|
*/
|
|
|
BIO_push(sslbio, membio1);
|
|
|
|
|
|
- /* Verify chaning the rbio/wbio directly does not cause leaks */
|
|
|
+ /* Verify changing the rbio/wbio directly does not cause leaks */
|
|
|
if (fix.change_bio != NO_BIO_CHANGE) {
|
|
|
membio2 = BIO_new(BIO_s_mem());
|
|
|
if (membio2 == NULL) {
|