aboutsummaryrefslogtreecommitdiff
path: root/crypto/ocsp
diff options
context:
space:
mode:
authorDr. Stephen Henson <steve@openssl.org>2001-02-26 23:34:14 +0000
committerDr. Stephen Henson <steve@openssl.org>2001-02-26 23:34:14 +0000
commitd7bbd31efe0545161b9c82bcfc904a03f7eb4621 (patch)
tree18b88492e82642bc7ddaf495a5bd369df89cca7f /crypto/ocsp
parentfafc7f987563ee2ea199ef27608f5a25a7cbe253 (diff)
downloadopenssl-d7bbd31efe0545161b9c82bcfc904a03f7eb4621.zip
openssl-d7bbd31efe0545161b9c82bcfc904a03f7eb4621.tar.gz
openssl-d7bbd31efe0545161b9c82bcfc904a03f7eb4621.tar.bz2
Typo in comment.
Diffstat (limited to 'crypto/ocsp')
-rw-r--r--crypto/ocsp/ocsp_vfy.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/crypto/ocsp/ocsp_vfy.c b/crypto/ocsp/ocsp_vfy.c
index da4c5b2..be399a3 100644
--- a/crypto/ocsp/ocsp_vfy.c
+++ b/crypto/ocsp/ocsp_vfy.c
@@ -144,7 +144,7 @@ int OCSP_basic_verify(OCSP_BASICRESP *bs, STACK_OF(X509) *certs,
}
ret = 1;
}
-
+
end:
@@ -344,7 +344,7 @@ static int ocsp_check_delegated(X509 *x, int flags)
}
/* Verify an OCSP request. This is fortunately much easier than OCSP
- * request verify. Just find the signers certificate and verify it
+ * response verify. Just find the signers certificate and verify it
* against a given trust value.
*/