fix typos in README, ssl.c

This commit is contained in:
Chris Conlon 2015-09-22 15:40:46 -06:00
parent 2c87cfa983
commit 207859cde8
2 changed files with 11 additions and 11 deletions

12
README
View File

@ -14,7 +14,7 @@ key cipher suites with
though static key cipher suites are deprecated and will be removed from future
versions of TLS. They also lower your security by removing PFS.
When compiling ssl.c wolfSSL will now issue a comipler error if no cipher suites
When compiling ssl.c wolfSSL will now issue a compiler error if no cipher suites
are available. You can remove this error by defining WOLFSSL_ALLOW_NO_SUITES
in the event that you desire that, i.e., you're not using TLS cipher suites.
@ -41,16 +41,16 @@ includes bug fixes and new features including:
a) If using wolfSSL for DTLS on the server side of a publicly accessible
machine you MUST update.
b) If using wolfSSL for TLS on the server side with private RSA keys allowing
ephemeral key exchange without low memory optimziations you MUST update and
ephemeral key exchange without low memory optimizations you MUST update and
regenerate the private RSA keys.
Please see https://www.wolfssl.com/wolfSSL/Blog/Blog.html for more details
- No filesystem build fixes for various configurations
- Certificate generation now supports several extensions including KeyUsage,
SKID, AKID, and Ceritifcate Policies
SKID, AKID, and Certificate Policies
- CRLs can be loaded from buffers as well as files now
- SHA-512 Ceritifcate Signing generation
- SHA-512 Certificate Signing generation
- Fixes for sniffer reassembly processing
See INSTALL file for build instructions.
@ -74,7 +74,7 @@ Release 3.6.6 of wolfSSL has bug fixes and new features including:
size is smaller than the total message size, no user action required.
- DTLS duplicate message fixes
- Visual Studio project files now support DLL and static builds for 32/64bit.
- Support for new Freesacle I/O
- Support for new Freescale I/O
- FreeRTOS FIPS support
- No high level security fixes that requires an update though we always
@ -186,7 +186,7 @@ Release 3.4.0 wolfSSL has bug fixes and new features including:
the Prosecco team at INRIA Paris-Rocquencourt for the report.
- FIPS version submitted
- Removes SSLv2 Client Hello processing, can be enabled with OLD_HELLO_ALLOWED
- User can set mimimum downgrade version with CyaSSL_SetMinVersion()
- User can set minimum downgrade version with CyaSSL_SetMinVersion()
- Small stack improvements at TLS/SSL layer
- TLS Master Secret generation and Key Expansion are now exposed
- Adds client side Secure Renegotiation, * not recommended *

View File

@ -44,7 +44,7 @@
#ifndef WOLFSSL_ALLOW_NO_SUITES
#if defined(NO_DH) && !defined(HAVE_ECC) && !defined(WOLFSSL_STATIC_RSA) \
&& !defined(WOLFSSL_STATIC_DH) && !defined(WOLFSSL_STATIC_PSK)
#error "No cipher suites defined becuase DH disabled, ECC disabled, and no static suites defined. Please see top of README"
#error "No cipher suites defined because DH disabled, ECC disabled, and no static suites defined. Please see top of README"
#endif
#endif
@ -373,7 +373,7 @@ int wolfSSL_dtls_get_peer(WOLFSSL* ssl, void* peer, unsigned int* peerSz)
#endif /* WOLFSSL_LEANPSK */
/* return underlyig connect or accept, SSL_SUCCESS on ok */
/* return underlying connect or accept, SSL_SUCCESS on ok */
int wolfSSL_negotiate(WOLFSSL* ssl)
{
int err = SSL_FATAL_ERROR;
@ -1732,7 +1732,7 @@ int wolfSSL_pending(WOLFSSL* ssl)
#ifndef WOLFSSL_LEANPSK
/* trun on handshake group messages for context */
/* turn on handshake group messages for context */
int wolfSSL_CTX_set_group_messages(WOLFSSL_CTX* ctx)
{
if (ctx == NULL)
@ -1764,7 +1764,7 @@ int wolfSSL_connect_cert(WOLFSSL* ssl)
#ifndef WOLFSSL_LEANPSK
/* trun on handshake group messages for ssl object */
/* turn on handshake group messages for ssl object */
int wolfSSL_set_group_messages(WOLFSSL* ssl)
{
if (ssl == NULL)
@ -1776,7 +1776,7 @@ int wolfSSL_set_group_messages(WOLFSSL* ssl)
}
/* make minVersion the internal equivilant SSL version */
/* make minVersion the internal equivalent SSL version */
static int SetMinVersionHelper(byte* minVersion, int version)
{
switch (version) {