diff --git a/src/mux_quic.c b/src/mux_quic.c index f4b7e2f2e..4a6c1a884 100644 --- a/src/mux_quic.c +++ b/src/mux_quic.c @@ -2303,7 +2303,7 @@ static int qc_wake(struct connection *conn) /* Check if a soft-stop is in progress. * - * TODO this is revelant for frontend connections only. + * TODO this is relevant for frontend connections only. * * TODO Client should be notified with a H3 GOAWAY and then a * CONNECTION_CLOSE. However, quic-conn uses the listener socket for diff --git a/src/quic_tls.c b/src/quic_tls.c index 3114aa623..a216f8678 100644 --- a/src/quic_tls.c +++ b/src/quic_tls.c @@ -363,7 +363,7 @@ int quic_tls_enc_aes_ctx_init(EVP_CIPHER_CTX **aes_ctx, } /* Encrypt bytes from buffer into with as AES - * cipher context. This is the responsability of the caller to check there + * cipher context. This is the responsibility of the caller to check there * is at least bytes of available space in buffer. * Return 1 if succeeded, 0 if not. */ @@ -403,7 +403,7 @@ int quic_tls_dec_aes_ctx_init(EVP_CIPHER_CTX **aes_ctx, } /* Decrypt data into with as AES cipher context. - * This is the responsability of the caller to check there is at least + * This is the responsibility of the caller to check there is at least * bytes into buffer. * Return 1 if succeeded, 0 if not. */ diff --git a/src/ssl_sock.c b/src/ssl_sock.c index 84e03d33b..cf9c57634 100644 --- a/src/ssl_sock.c +++ b/src/ssl_sock.c @@ -2177,7 +2177,7 @@ static int ssl_sock_advertise_alpn_protos(SSL *s, const unsigned char **out, #ifdef SSL_CTRL_SET_TLSEXT_HOSTNAME #ifndef SSL_NO_GENERATE_CERTIFICATES -/* Configure a DNS SAN extenion on a certificate. */ +/* Configure a DNS SAN extension on a certificate. */ int ssl_sock_add_san_ext(X509V3_CTX* ctx, X509* cert, const char *servername) { int failure = 0; X509_EXTENSION *san_ext = NULL;