Hello Jeff,

s/limitiations/limitations/

Thanks,

Mike Rumph

On 2/3/2014 5:50 AM, traw...@apache.org wrote:
Author: trawick
Date: Mon Feb  3 13:50:14 2014
New Revision: 1563894

URL: http://svn.apache.org/r1563894
Log:
fix a few spelling errors

Modified:
     httpd/httpd/trunk/modules/ssl/ssl_engine_kernel.c
     httpd/httpd/trunk/modules/ssl/ssl_private.h

Modified: httpd/httpd/trunk/modules/ssl/ssl_engine_kernel.c
URL: 
http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/ssl/ssl_engine_kernel.c?rev=1563894&r1=1563893&r2=1563894&view=diff
==============================================================================
--- httpd/httpd/trunk/modules/ssl/ssl_engine_kernel.c (original)
+++ httpd/httpd/trunk/modules/ssl/ssl_engine_kernel.c Mon Feb  3 13:50:14 2014
@@ -176,8 +176,8 @@ int ssl_hook_ReadReq(request_rec *r)
               * cause us to end up in a different virtual host as the one that
               * was used for the handshake causing different SSL parameters to
               * be applied as SSLProtocol, SSLCACertificateFile/Path and
-             * SSLCADNRequestFile/Path cannot be renegotioated (SSLCA* due
-             * to current limitiations in Openssl, see
+             * SSLCADNRequestFile/Path cannot be renegotiated (SSLCA* due
+             * to current limitiations in OpenSSL, see
               * 
http://mail-archives.apache.org/mod_mbox/httpd-dev/200806.mbox/%3c48592955.2090...@velox.ch%3E
               * and
               * 
http://mail-archives.apache.org/mod_mbox/httpd-dev/201312.mbox/%3CCAKQ1sVNpOrdiBm-UPw1hEdSN7YQXRRjeaT-MCWbW_7mN%3DuFiOw%40mail.gmail.com%3E
@@ -207,7 +207,7 @@ int ssl_hook_ReadReq(request_rec *r)
              /*
               * We are using a name based configuration here, but no hostname 
was
               * provided via SNI. Don't allow that if are requested to do 
strict
-             * checking. Check wether this strict checking was setup either in 
the
+             * checking. Check whether this strict checking was setup either 
in the
               * server config we used for handshaking or in our current server.
               * This should avoid insecure configuration by accident.
               */
@@ -1904,7 +1904,7 @@ void ssl_callback_Info(const SSL *ssl, i
          }
      }
      /* If the first handshake is complete, change state to reject any
-     * subsequent client-initated renegotiation. */
+     * subsequent client-initiated renegotiation. */
      else if ((where & SSL_CB_HANDSHAKE_DONE) && scr->reneg_state == 
RENEG_INIT) {
          scr->reneg_state = RENEG_REJECT;
      }
@@ -2033,7 +2033,7 @@ static int ssl_find_vhost(void *serverna
           * vhost we have just switched to. Again, we have to make sure
           * that we're not overwriting a session id context which was
           * possibly set in ssl_hook_Access(), before triggering
-         * a renegotation.
+         * a renegotiation.
           */
          if (SSL_num_renegotiations(ssl) == 0) {
              unsigned char *sid_ctx =

Modified: httpd/httpd/trunk/modules/ssl/ssl_private.h
URL: 
http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/ssl/ssl_private.h?rev=1563894&r1=1563893&r2=1563894&view=diff
==============================================================================
--- httpd/httpd/trunk/modules/ssl/ssl_private.h (original)
+++ httpd/httpd/trunk/modules/ssl/ssl_private.h Mon Feb  3 13:50:14 2014
@@ -425,7 +425,7 @@ typedef struct {
          RENEG_INIT = 0, /* Before initial handshake */
          RENEG_REJECT, /* After initial handshake; any client-initiated
                         * renegotiation should be rejected */
-        RENEG_ALLOW, /* A server-initated renegotiation is taking
+        RENEG_ALLOW, /* A server-initiated renegotiation is taking
                        * place (as dictated by configuration) */
          RENEG_ABORT /* Renegotiation initiated by client, abort the
                       * connection */





Reply via email to