X-Git-Url: http://www.privoxy.org/gitweb/?p=privoxy.git;a=blobdiff_plain;f=ssl.c;h=ce8151682cb077e2c20d0c3a2c6abdc573f36380;hp=194092b2ae40a227878d38a62362b37e2120dfbc;hb=453c71553cdfdbf0030bfd5198c3a84fb479b2a6;hpb=d6f2d069a7d978d9f27f9f2d82a64cd48a4d96d8 diff --git a/ssl.c b/ssl.c index 194092b2..ce815168 100644 --- a/ssl.c +++ b/ssl.c @@ -66,10 +66,9 @@ #define RSA_KEY_PUBLIC_EXPONENT 65537 /* Public exponent for RSA private key generating */ #define RSA_KEYSIZE 2048 /* Size of generated RSA keys */ #define GENERATED_CERT_VALID_FROM "20100101000000" /* Date and time, which will be set in generated certificates as parameter valid from */ -#define GENERATED_CERT_VALID_TO "20401231235959" /* Date and time, which will be setted in generated certificates as parameter valid to */ +#define GENERATED_CERT_VALID_TO "20401231235959" /* Date and time, which will be set in generated certificates as parameter valid to */ #define CERT_SIGNATURE_ALGORITHM MBEDTLS_MD_SHA256 /* The MD algorithm to use for the signature */ #define CERT_SERIAL_NUM_LENGTH 4 /* Bytes of hash to be used for creating serial number of certificate. Min=2 and max=16 */ -#define LIMIT_MUTEX_NUMBER /* If this macro is defined, mutexes count for generating private keys is changed from 65536 to 32 */ #define INVALID_CERT_INFO_BUF_SIZE 2048 /* Size of buffer for message with information about reason of certificate invalidity. Data after the end of buffer will not be saved */ #define CERT_PARAM_COMMON_NAME "CN=" #define CERT_PARAM_ORGANIZATION ",O=" @@ -164,7 +163,7 @@ extern int server_use_ssl(const struct client_state *csp) * * Function : is_ssl_pending * -* Description : Tests if there are some waitting data on ssl connection +* Description : Tests if there are some waiting data on ssl connection * * Parameters : * 1 : ssl = SSL context to test @@ -966,7 +965,7 @@ static int write_certificate(mbedtls_x509write_cert *crt, const char *output_fil memset(cert_buf, 0, sizeof(cert_buf)); /* - * Writing certificate into PEM string. If buffer is too small, fuction + * Writing certificate into PEM string. If buffer is too small, function * returns specific error and no buffer overflow can happen. */ if ((ret = mbedtls_x509write_crt_pem(crt, cert_buf, @@ -1804,7 +1803,7 @@ extern void ssl_send_certificate_error(struct client_state *csp) ssl_send_data(&(csp->mbedtls_client_attr.ssl), (const unsigned char *)message, strlen(message)); /* - * Waiting before closing connection. Some browsers doesn't show received + * Waiting before closing connection. Some browsers don't show received * message if there isn't this delay. */ sleep(1);