Index: crypto/bn/bn_x931p.c
===================================================================
RCS file: /v/openssl/cvs/openssl/crypto/bn/bn_x931p.c,v
retrieving revision 1.2
diff -u -8 -p -r1.2 bn_x931p.c
--- crypto/bn/bn_x931p.c	9 Jan 2011 13:02:14 -0000	1.2
+++ crypto/bn/bn_x931p.c	9 May 2011 10:21:37 -0000
@@ -184,18 +184,18 @@ int BN_X931_derive_prime_ex(BIGNUM *p, B
 
 	err:
 
 	BN_CTX_end(ctx);
 
 	return ret;
 	}
 
-/* Generate pair of paramters Xp, Xq for X9.31 prime generation.
- * Note: nbits paramter is sum of number of bits in both.
+/* Generate pair of parameters Xp, Xq for X9.31 prime generation.
+ * Note: nbits parameter is sum of number of bits in both.
  */
 
 int BN_X931_generate_Xpq(BIGNUM *Xp, BIGNUM *Xq, int nbits, BN_CTX *ctx)
 	{
 	BIGNUM *t;
 	int i;
 	/* Number of bits for each prime is of the form
 	 * 512+128s for s = 0, 1, ...
Index: crypto/ec/ec.h
===================================================================
RCS file: /v/openssl/cvs/openssl/crypto/ec/ec.h,v
retrieving revision 1.100
diff -u -8 -p -r1.100 ec.h
--- crypto/ec/ec.h	23 Apr 2011 19:55:54 -0000	1.100
+++ crypto/ec/ec.h	9 May 2011 10:21:37 -0000
@@ -863,17 +863,17 @@ int i2d_ECPrivateKey(EC_KEY *key, unsign
  *  \param  in   pointer to memory with the DER encoded ec parameters
  *  \param  len  length of the DER encoded ec parameters
  *  \return a EC_KEY object with the decoded parameters or NULL if an error
  *          occurred.
  */
 EC_KEY *d2i_ECParameters(EC_KEY **key, const unsigned char **in, long len);
 
 /** Encodes ec parameter and stores the result in a buffer.
- *  \param  key  the EC_KEY object with ec paramters to encode
+ *  \param  key  the EC_KEY object with ec parameters to encode
  *  \param  out  the buffer for the result (if NULL the function returns number
  *               of bytes needed).
  *  \return 1 on success and 0 if an error occurred.
  */
 int i2d_ECParameters(EC_KEY *key, unsigned char **out);
 
 
 /********************************************************************/
Index: doc/crypto/EVP_BytesToKey.pod
===================================================================
RCS file: /v/openssl/cvs/openssl/doc/crypto/EVP_BytesToKey.pod,v
retrieving revision 1.3
diff -u -8 -p -r1.3 EVP_BytesToKey.pod
--- doc/crypto/EVP_BytesToKey.pod	25 Nov 2004 17:47:30 -0000	1.3
+++ doc/crypto/EVP_BytesToKey.pod	9 May 2011 10:21:37 -0000
@@ -12,17 +12,17 @@ EVP_BytesToKey - password based encrypti
                        const unsigned char *salt,
                        const unsigned char *data, int datal, int count,
                        unsigned char *key,unsigned char *iv);
 
 =head1 DESCRIPTION
 
 EVP_BytesToKey() derives a key and IV from various parameters. B<type> is
 the cipher to derive the key and IV for. B<md> is the message digest to use.
-The B<salt> paramter is used as a salt in the derivation: it should point to
+The B<salt> parameter is used as a salt in the derivation: it should point to
 an 8 byte buffer or NULL if no salt is used. B<data> is a buffer containing
 B<datal> bytes which is used to derive the keying data. B<count> is the
 iteration count to use. The derived key and IV will be written to B<key>
 and B<iv> respectively.
 
 =head1 NOTES
 
 A typical application of this function is to derive keying material for an
Index: doc/crypto/EVP_EncryptInit.pod
===================================================================
RCS file: /v/openssl/cvs/openssl/doc/crypto/EVP_EncryptInit.pod,v
retrieving revision 1.15
diff -u -8 -p -r1.15 EVP_EncryptInit.pod
--- doc/crypto/EVP_EncryptInit.pod	15 Apr 2005 16:01:35 -0000	1.15
+++ doc/crypto/EVP_EncryptInit.pod	9 May 2011 10:21:37 -0000
@@ -147,17 +147,17 @@ to 1 for encryption, 0 for decryption an
 
 EVP_CIPHER_CTX_cleanup() clears all information from a cipher context
 and free up any allocated memory associate with it. It should be called
 after all operations using a cipher are complete so sensitive information
 does not remain in memory.
 
 EVP_EncryptInit(), EVP_DecryptInit() and EVP_CipherInit() behave in a
 similar way to EVP_EncryptInit_ex(), EVP_DecryptInit_ex and
-EVP_CipherInit_ex() except the B<ctx> paramter does not need to be
+EVP_CipherInit_ex() except the B<ctx> parameter does not need to be
 initialized and they always use the default cipher implementation.
 
 EVP_EncryptFinal(), EVP_DecryptFinal() and EVP_CipherFinal() behave in a
 similar way to EVP_EncryptFinal_ex(), EVP_DecryptFinal_ex() and
 EVP_CipherFinal_ex() except B<ctx> is automatically cleaned up 
 after the call.
 
 EVP_get_cipherbyname(), EVP_get_cipherbynid() and EVP_get_cipherbyobj()
Index: doc/crypto/EVP_PKEY_cmp.pod
===================================================================
RCS file: /v/openssl/cvs/openssl/doc/crypto/EVP_PKEY_cmp.pod,v
retrieving revision 1.1
diff -u -8 -p -r1.1 EVP_PKEY_cmp.pod
--- doc/crypto/EVP_PKEY_cmp.pod	9 Jul 2006 11:26:13 -0000	1.1
+++ doc/crypto/EVP_PKEY_cmp.pod	9 May 2011 10:21:37 -0000
@@ -21,17 +21,17 @@ parameters of B<pkey> are missing and 0 
 doesn't use parameters.
 
 The function EVP_PKEY_copy_parameters() copies the parameters from key
 B<from> to key B<to>.
 
 The funcion EVP_PKEY_cmp_parameters() compares the parameters of keys
 B<a> and B<b>.
 
-The funcion EVP_PKEY_cmp() compares the public key components and paramters
+The funcion EVP_PKEY_cmp() compares the public key components and parameters
 (if present) of keys B<a> and B<b>.
 
 =head1 NOTES
 
 The main purpose of the functions EVP_PKEY_missing_parameters() and
 EVP_PKEY_copy_parameters() is to handle public keys in certificates where the
 parameters are sometimes omitted from a public key if they are inherited from
 the CA that signed it.
