summaryrefslogtreecommitdiff
path: root/providers
diff options
context:
space:
mode:
authorDimitris Apostolou <dimitris.apostolou@icloud.com>2022-01-03 01:00:27 +0200
committerTomas Mraz <tomas@openssl.org>2022-01-05 12:37:20 +0100
commite304aa87b35fac5ea97c405dd3c21549faa45e78 (patch)
tree3a9330f9259ddf98984e63db297583b5ef9dcd7b /providers
parente66c41725f03dae2b295df048312fe6d28729e98 (diff)
Fix typos
Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/17392)
Diffstat (limited to 'providers')
-rw-r--r--providers/implementations/ciphers/cipher_aes_gcm_hw_armv8.inc2
-rw-r--r--providers/implementations/encode_decode/encode_key2any.c2
-rw-r--r--providers/implementations/keymgmt/kdf_legacy_kmgmt.c2
-rw-r--r--providers/implementations/keymgmt/mac_legacy_kmgmt.c2
-rw-r--r--providers/implementations/signature/sm2_sig.c6
5 files changed, 7 insertions, 7 deletions
diff --git a/providers/implementations/ciphers/cipher_aes_gcm_hw_armv8.inc b/providers/implementations/ciphers/cipher_aes_gcm_hw_armv8.inc
index 310f4470d6..db2678714e 100644
--- a/providers/implementations/ciphers/cipher_aes_gcm_hw_armv8.inc
+++ b/providers/implementations/ciphers/cipher_aes_gcm_hw_armv8.inc
@@ -8,7 +8,7 @@
*/
/*
- * Crypto extention support for AES GCM.
+ * Crypto extension support for AES GCM.
* This file is included by cipher_aes_gcm_hw.c
*/
diff --git a/providers/implementations/encode_decode/encode_key2any.c b/providers/implementations/encode_decode/encode_key2any.c
index ae15a5db46..949dc2bd8b 100644
--- a/providers/implementations/encode_decode/encode_key2any.c
+++ b/providers/implementations/encode_decode/encode_key2any.c
@@ -168,7 +168,7 @@ static X509_PUBKEY *key_to_pubkey(const void *key, int key_nid,
* EncryptedPrivateKeyInfo structure (defined by PKCS#8). They require
* that there's an intent to encrypt, anything else is an error.
*
- * key_to_pki_* primarly produce encoded output with the private key data
+ * key_to_pki_* primarily produce encoded output with the private key data
* in a PrivateKeyInfo structure (also defined by PKCS#8). However, if
* there is an intent to encrypt the data, the corresponding key_to_epki_*
* function is used instead.
diff --git a/providers/implementations/keymgmt/kdf_legacy_kmgmt.c b/providers/implementations/keymgmt/kdf_legacy_kmgmt.c
index 0b301c333b..73e6974208 100644
--- a/providers/implementations/keymgmt/kdf_legacy_kmgmt.c
+++ b/providers/implementations/keymgmt/kdf_legacy_kmgmt.c
@@ -69,7 +69,7 @@ int ossl_kdf_data_up_ref(KDF_DATA *kdfdata)
/* This is effectively doing a new operation on the KDF_DATA and should be
* adequately guarded again modules' error states. However, both current
- * calls here are guarded propery in exchange/kdf_exch.c. Thus, it
+ * calls here are guarded properly in exchange/kdf_exch.c. Thus, it
* could be removed here. The concern is that something in the future
* might call this function without adequate guards. It's a cheap call,
* it seems best to leave it even though it is currently redundant.
diff --git a/providers/implementations/keymgmt/mac_legacy_kmgmt.c b/providers/implementations/keymgmt/mac_legacy_kmgmt.c
index ec34a3ee71..b1c3880277 100644
--- a/providers/implementations/keymgmt/mac_legacy_kmgmt.c
+++ b/providers/implementations/keymgmt/mac_legacy_kmgmt.c
@@ -109,7 +109,7 @@ int ossl_mac_key_up_ref(MAC_KEY *mackey)
/* This is effectively doing a new operation on the MAC_KEY and should be
* adequately guarded again modules' error states. However, both current
- * calls here are guarded propery in signature/mac_legacy.c. Thus, it
+ * calls here are guarded properly in signature/mac_legacy.c. Thus, it
* could be removed here. The concern is that something in the future
* might call this function without adequate guards. It's a cheap call,
* it seems best to leave it even though it is currently redundant.
diff --git a/providers/implementations/signature/sm2_sig.c b/providers/implementations/signature/sm2_sig.c
index 3c700ac887..99460edfce 100644
--- a/providers/implementations/signature/sm2_sig.c
+++ b/providers/implementations/signature/sm2_sig.c
@@ -9,7 +9,7 @@
/*
* ECDSA low level APIs are deprecated for public use, but still ok for
- * internal use - SM2 implemetation uses ECDSA_size() function.
+ * internal use - SM2 implementation uses ECDSA_size() function.
*/
#include "internal/deprecated.h"
@@ -66,9 +66,9 @@ typedef struct {
EC_KEY *ec;
/*
- * Flag to termine if the 'z' digest needs to be computed and fed to the
+ * Flag to determine if the 'z' digest needs to be computed and fed to the
* hash function.
- * This flag should be set on initialization and the compuation should
+ * This flag should be set on initialization and the computation should
* be performed only once, on first update.
*/
unsigned int flag_compute_z_digest : 1;