diff --git a/README b/README index 79de40216..ea646a390 100644 --- a/README +++ b/README @@ -14,7 +14,7 @@ key cipher suites with though static key cipher suites are deprecated and will be removed from future versions of TLS. They also lower your security by removing PFS. -When compiling ssl.c wolfSSL will now issue a comipler error if no cipher suites +When compiling ssl.c wolfSSL will now issue a compiler error if no cipher suites are available. You can remove this error by defining WOLFSSL_ALLOW_NO_SUITES in the event that you desire that, i.e., you're not using TLS cipher suites. @@ -41,16 +41,16 @@ includes bug fixes and new features including: a) If using wolfSSL for DTLS on the server side of a publicly accessible machine you MUST update. b) If using wolfSSL for TLS on the server side with private RSA keys allowing - ephemeral key exchange without low memory optimziations you MUST update and + ephemeral key exchange without low memory optimizations you MUST update and regenerate the private RSA keys. Please see https://www.wolfssl.com/wolfSSL/Blog/Blog.html for more details - No filesystem build fixes for various configurations - Certificate generation now supports several extensions including KeyUsage, - SKID, AKID, and Ceritifcate Policies + SKID, AKID, and Certificate Policies - CRLs can be loaded from buffers as well as files now -- SHA-512 Ceritifcate Signing generation +- SHA-512 Certificate Signing generation - Fixes for sniffer reassembly processing See INSTALL file for build instructions. @@ -74,7 +74,7 @@ Release 3.6.6 of wolfSSL has bug fixes and new features including: size is smaller than the total message size, no user action required. - DTLS duplicate message fixes - Visual Studio project files now support DLL and static builds for 32/64bit. -- Support for new Freesacle I/O +- Support for new Freescale I/O - FreeRTOS FIPS support - No high level security fixes that requires an update though we always @@ -186,7 +186,7 @@ Release 3.4.0 wolfSSL has bug fixes and new features including: the Prosecco team at INRIA Paris-Rocquencourt for the report. - FIPS version submitted - Removes SSLv2 Client Hello processing, can be enabled with OLD_HELLO_ALLOWED -- User can set mimimum downgrade version with CyaSSL_SetMinVersion() +- User can set minimum downgrade version with CyaSSL_SetMinVersion() - Small stack improvements at TLS/SSL layer - TLS Master Secret generation and Key Expansion are now exposed - Adds client side Secure Renegotiation, * not recommended * diff --git a/src/ssl.c b/src/ssl.c index 7ad1ba83d..f01a97528 100644 --- a/src/ssl.c +++ b/src/ssl.c @@ -44,7 +44,7 @@ #ifndef WOLFSSL_ALLOW_NO_SUITES #if defined(NO_DH) && !defined(HAVE_ECC) && !defined(WOLFSSL_STATIC_RSA) \ && !defined(WOLFSSL_STATIC_DH) && !defined(WOLFSSL_STATIC_PSK) - #error "No cipher suites defined becuase DH disabled, ECC disabled, and no static suites defined. Please see top of README" + #error "No cipher suites defined because DH disabled, ECC disabled, and no static suites defined. Please see top of README" #endif #endif @@ -373,7 +373,7 @@ int wolfSSL_dtls_get_peer(WOLFSSL* ssl, void* peer, unsigned int* peerSz) #endif /* WOLFSSL_LEANPSK */ -/* return underlyig connect or accept, SSL_SUCCESS on ok */ +/* return underlying connect or accept, SSL_SUCCESS on ok */ int wolfSSL_negotiate(WOLFSSL* ssl) { int err = SSL_FATAL_ERROR; @@ -1732,7 +1732,7 @@ int wolfSSL_pending(WOLFSSL* ssl) #ifndef WOLFSSL_LEANPSK -/* trun on handshake group messages for context */ +/* turn on handshake group messages for context */ int wolfSSL_CTX_set_group_messages(WOLFSSL_CTX* ctx) { if (ctx == NULL) @@ -1764,7 +1764,7 @@ int wolfSSL_connect_cert(WOLFSSL* ssl) #ifndef WOLFSSL_LEANPSK -/* trun on handshake group messages for ssl object */ +/* turn on handshake group messages for ssl object */ int wolfSSL_set_group_messages(WOLFSSL* ssl) { if (ssl == NULL) @@ -1776,7 +1776,7 @@ int wolfSSL_set_group_messages(WOLFSSL* ssl) } -/* make minVersion the internal equivilant SSL version */ +/* make minVersion the internal equivalent SSL version */ static int SetMinVersionHelper(byte* minVersion, int version) { switch (version) {