Fix miscellaneous typos in docs and source

- d2i_PKC8PrivateKey -> d2i_PKCS8PrivateKey
- bechmark -> benchmark
- ciperhsuite -> ciphersuite
- EncyptedPreMasterSecret -> EncryptedPreMasterSecret

Reviewed-by: Richard Levitte <levitte@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/5570)
This commit is contained in:
Dr. Matthias St. Pierre 2018-02-16 15:45:32 +01:00
parent d597208c03
commit dd07e68b20
5 changed files with 7 additions and 7 deletions

View File

@ -40,7 +40,7 @@
#dsa 512 bits 0.0087s 0.0106s 114.3 94.5 #dsa 512 bits 0.0087s 0.0106s 114.3 94.5
#dsa 1024 bits 0.0256s 0.0313s 39.0 32.0 #dsa 1024 bits 0.0256s 0.0313s 39.0 32.0
# #
# Same bechmark with this assembler code: # Same benchmark with this assembler code:
# #
#rsa 512 bits 0.0056s 0.0005s 178.6 2049.2 #rsa 512 bits 0.0056s 0.0005s 178.6 2049.2
#rsa 1024 bits 0.0283s 0.0015s 35.3 674.1 #rsa 1024 bits 0.0283s 0.0015s 35.3 674.1

View File

@ -73,11 +73,11 @@ is only effective if RSA algorithm is specified to test.
=item B<-seconds num> =item B<-seconds num>
Run bechmarks for B<num> seconds. Run benchmarks for B<num> seconds.
=item B<-bytes num> =item B<-bytes num>
Run bechmarks on B<num>-byte buffers. Affects ciphers, digests and the CSPRNG. Run benchmarks on B<num>-byte buffers. Affects ciphers, digests and the CSPRNG.
=item B<[zero or more test algorithms]> =item B<[zero or more test algorithms]>

View File

@ -44,7 +44,7 @@ These functions are similar to the d2i_X509() functions; see L<d2i_X509(3)>.
All these functions use DER format and unencrypted keys. Applications wishing All these functions use DER format and unencrypted keys. Applications wishing
to encrypt or decrypt private keys should use other functions such as to encrypt or decrypt private keys should use other functions such as
d2i_PKC8PrivateKey() instead. d2i_PKCS8PrivateKey() instead.
If the B<*a> is not NULL when calling d2i_PrivateKey() or d2i_AutoPrivateKey() If the B<*a> is not NULL when calling d2i_PrivateKey() or d2i_AutoPrivateKey()
(i.e. an existing structure is being reused) and the key format is PKCS#8 (i.e. an existing structure is being reused) and the key format is PKCS#8

View File

@ -1086,10 +1086,10 @@ static int ssl_print_client_keyex(BIO *bio, int indent, const SSL *ssl,
case SSL_kRSAPSK: case SSL_kRSAPSK:
if (TLS1_get_version(ssl) == SSL3_VERSION) { if (TLS1_get_version(ssl) == SSL3_VERSION) {
ssl_print_hex(bio, indent + 2, ssl_print_hex(bio, indent + 2,
"EncyptedPreMasterSecret", msg, msglen); "EncryptedPreMasterSecret", msg, msglen);
} else { } else {
if (!ssl_print_hexbuf(bio, indent + 2, if (!ssl_print_hexbuf(bio, indent + 2,
"EncyptedPreMasterSecret", 2, &msg, &msglen)) "EncryptedPreMasterSecret", 2, &msg, &msglen))
return 0; return 0;
} }
break; break;

View File

@ -63,7 +63,7 @@ $proxy->start();
ok(TLSProxy::Message->fail(), "PSK not last"); ok(TLSProxy::Message->fail(), "PSK not last");
#Test 3: Attempt a resume after an HRR where PSK hash matches selected #Test 3: Attempt a resume after an HRR where PSK hash matches selected
# ciperhsuite. Should see PSK on second ClientHello # ciphersuite. Should see PSK on second ClientHello
$proxy->clear(); $proxy->clear();
$proxy->clientflags("-sess_in ".$session); $proxy->clientflags("-sess_in ".$session);
$proxy->serverflags("-curves P-256"); $proxy->serverflags("-curves P-256");