diff --git a/CHANGES.md b/CHANGES.md index 9eed55ab76..0f3701c6d5 100644 --- a/CHANGES.md +++ b/CHANGES.md @@ -318,7 +318,7 @@ OpenSSL 3.3 *Fisher Yu* - * Enable AES and SHA3 optimisations on Applie Silicon M3-based MacOS systems + * Enable AES and SHA3 optimisations on Apple Silicon M3-based MacOS systems similar to M1/M2. *Tom Cosgrove* @@ -3092,7 +3092,7 @@ breaking changes, and mappings for the large list of deprecated functions. this switch breaks interoperability with correct implementations. * Fix a use after free bug in d2i_X509_PUBKEY when overwriting a - re-used X509_PUBKEY object if the second PUBKEY is malformed. + reused X509_PUBKEY object if the second PUBKEY is malformed. *Bernd Edlinger* @@ -4426,7 +4426,7 @@ OpenSSL 1.1.0 *Billy Bob Brumley, Nicola Tuveri* * Fix a use after free bug in d2i_X509_PUBKEY when overwriting a - re-used X509_PUBKEY object if the second PUBKEY is malformed. + reused X509_PUBKEY object if the second PUBKEY is malformed. *Bernd Edlinger* @@ -16546,7 +16546,7 @@ s-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k *Bodo Moeller* * Store verify_result within SSL_SESSION also for client side to - avoid potential security hole. (Re-used sessions on the client side + avoid potential security hole. (Reused sessions on the client side always resulted in verify_result==X509_V_OK, not using the original result of the server certificate verification.) diff --git a/NEWS.md b/NEWS.md index bc8b40ee73..11e1057b87 100644 --- a/NEWS.md +++ b/NEWS.md @@ -116,7 +116,7 @@ changes: * Optimized AES-CTR for ARM Neoverse V1 and V2 - * Enable AES and SHA3 optimisations on Applie Silicon M3-based MacOS systems + * Enable AES and SHA3 optimisations on Apple Silicon M3-based MacOS systems similar to M1/M2. * Various optimizations for cryptographic routines using RISC-V vector crypto diff --git a/apps/include/platform.h b/apps/include/platform.h index 491559df31..6ba26a7d69 100644 --- a/apps/include/platform.h +++ b/apps/include/platform.h @@ -16,7 +16,7 @@ /* * VMS C only for now, implemented in vms_decc_init.c * If other C compilers forget to terminate argv with NULL, this function - * can be re-used. + * can be reused. */ char **copy_argv(int *argc, char *argv[]); # endif diff --git a/crypto/hashtable/hashtable.c b/crypto/hashtable/hashtable.c index dace86e13f..67c9b190cf 100644 --- a/crypto/hashtable/hashtable.c +++ b/crypto/hashtable/hashtable.c @@ -68,7 +68,7 @@ #include "internal/numbers.h" /* - * When we do a lookup/insert/delete, there is a high likelyhood + * When we do a lookup/insert/delete, there is a high likelihood * that we will iterate over at least part of the neighborhood list * As such, because we design a neighborhood entry to fit into a single * cache line it is advantageous, when supported to fetch the entire diff --git a/doc/man3/OPENSSL_riscvcap.pod b/doc/man3/OPENSSL_riscvcap.pod index e1a2aa5337..1ebf20826a 100644 --- a/doc/man3/OPENSSL_riscvcap.pod +++ b/doc/man3/OPENSSL_riscvcap.pod @@ -120,7 +120,7 @@ Could be detected using hwprobe for Linux kernel >= 6.8 =item V -Vector Extention for Application Processors +Vector Extension for Application Processors Could be detected using hwprobe for Linux kernel >= 6.5 diff --git a/fuzz/hashtable.c b/fuzz/hashtable.c index 35cf9c8f3b..b58d48b225 100644 --- a/fuzz/hashtable.c +++ b/fuzz/hashtable.c @@ -130,7 +130,7 @@ int FuzzerTestOneInput(const uint8_t *buf, size_t len) /* * We need at least 11 bytes to be able to do anything here - * 1 byte to detect the operation to preform, 2 bytes + * 1 byte to detect the operation to perform, 2 bytes * for the lookup key, and 8 bytes of value */ if (len < 11) { diff --git a/ssl/ssl_lib.c b/ssl/ssl_lib.c index 05047e9163..37a307b992 100644 --- a/ssl/ssl_lib.c +++ b/ssl/ssl_lib.c @@ -6395,7 +6395,7 @@ int ssl_validate_ct(SSL_CONNECTION *s) end: CT_POLICY_EVAL_CTX_free(ctx); /* - * With SSL_VERIFY_NONE the session may be cached and re-used despite a + * With SSL_VERIFY_NONE the session may be cached and reused despite a * failure return code here. Also the application may wish the complete * the handshake, and then disconnect cleanly at a higher layer, after * checking the verification status of the completed connection. diff --git a/test/evp_kdf_test.c b/test/evp_kdf_test.c index 858c796602..67de1cc7a7 100644 --- a/test/evp_kdf_test.c +++ b/test/evp_kdf_test.c @@ -1771,7 +1771,7 @@ static int test_kdf_get_kdf(void) || !TEST_ptr(kdf2 = EVP_KDF_fetch(NULL, LN_tls1_prf, NULL)) || !test_kdfs_same(kdf1, kdf2)) ok = 0; - /* kdf1 is re-used below, so don't free it here */ + /* kdf1 is reused below, so don't free it here */ EVP_KDF_free(kdf2); kdf2 = NULL; diff --git a/test/recipes/25-test_x509.t b/test/recipes/25-test_x509.t index 52ba7d1821..f5e5919eab 100644 --- a/test/recipes/25-test_x509.t +++ b/test/recipes/25-test_x509.t @@ -305,7 +305,7 @@ ok(run(app(["openssl", "x509", "-req", "-text", "-CAcreateserial", "-in", $b_csr]))); ok(-e $ca_serial_dot_in_dir); -# Tests for explict start and end dates of certificates +# Tests for explicit start and end dates of certificates my %today = (strftime("%Y-%m-%d", gmtime) => 1); my $enddate; ok(run(app(["openssl", "x509", "-req", "-text", diff --git a/test/tls-provider.c b/test/tls-provider.c index d8ec7c2dc2..967a2495e1 100644 --- a/test/tls-provider.c +++ b/test/tls-provider.c @@ -1115,7 +1115,7 @@ static const OSSL_DISPATCH xor_keymgmt_functions[] = { OSSL_DISPATCH_END }; -/* We're re-using most XOR keymgmt functions also for signature operations: */ +/* We're reusing most XOR keymgmt functions also for signature operations: */ static void *xor_xorhmacsig_gen(void *genctx, OSSL_CALLBACK *osslcb, void *cbarg) { XORKEY *k = xor_gen(genctx, osslcb, cbarg);