=item B<-text>
-Provide human-readable text ouput.
+Provide human-readable text output.
=item B<-public_name> I<name>
memset(outers, -1, sizeof(outers)); /* fill with known values for debug */
# endif
- /* 1. check for outers and make inital checks of those */
+ /* 1. check for outers and make initial checks of those */
if (ech_find_outers(s, &ei, outers, &n_outers) != 1)
goto err; /* SSLfatal called already */
* won't affect the outer CH size, due to padding, but might for some
* larger extensions.
*
- * Note there is a co-dependency with test/recipies/75-test_quicapi.t:
+ * Note there is a co-dependency with test/recipes/75-test_quicapi.t:
* If you change an |ech_handling| value, that may well affect the order
* of extensions in a ClientHello, which is reflected in the test data
- * in test/recipies/75-test_quicapi_data/\*.txt files. To fix, you need
+ * in test/recipes/75-test_quicapi_data/\*.txt files. To fix, you need
* to look in test-runs/test_quicapi for the "new" files and then edit
* (replacing actual octets with "?" in relevant places), and copy the
- * result back over to test/recipies/75-test_quicapi_data/. The reason
+ * result back over to test/recipes/75-test_quicapi_data/. The reason
* this happens is the ECH COMPRESS'd extensions need to be contiguous
* in the ClientHello, so changes to/from COMPRESS affect extension
* order, in inner and outer CH. There doesn't seem to be an easy,
* If you want to demonstrate/exercise duplicate, then
* this does that and has no effect on sizes, but it
* will break the quicapi test (see above). Probably
- * best done in local tests and not comitted to any
+ * best done in local tests and not committed to any
* upstream.
* OSSL_ECH_HANDLING_DUPLICATE,
*/
}
return EXT_RETURN_SENT;
}
- /* if nobody set a type, use the defaulf */
+ /* if nobody set a type, use the default */
if (s->ext.ech.attempted_type == OSSL_ECH_type_unknown)
s->ext.ech.attempted_type = TLSEXT_TYPE_ech;
if (ossl_ech_send_grease(s, pkt) != 1) {
OSSL_ECH_SIGNAL_LEN);
return 1;
}
- /* othewise we expect retry-configs */
+ /* otherwise we expect retry-configs */
if (!PACKET_get_length_prefixed_2(pkt, &rcfgs_pkt)) {
SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_R_LENGTH_MISMATCH);
return 0;
}
/* yay - we're ok with this */
OSSL_TRACE_BEGIN(TLS) {
- BIO_printf(trc_out, "ECH seen in inner as exptected.\n");
+ BIO_printf(trc_out, "ECH seen in inner as expected.\n");
} OSSL_TRACE_END(TLS);
return 1;
}
/* check the ECH accept signal */
if (ossl_ech_calc_confirm(s, hrr, c_signal, shlen) != 1) {
/* SSLfatal() already called */
- OSSL_TRACE(TLS, "ECH calc confim failed\n");
+ OSSL_TRACE(TLS, "ECH calc confirm failed\n");
goto err;
}
if (ossl_ech_find_confirm(s, hrr, s_signal) != 1