@@ -2090,7 +2090,7 @@ static X509_CRL *x509_crl_get(FILE_FORMAT_CTX *ctx, char *url)
20902090 ctx -> options -> noverifypeer ? NULL : ctx -> options -> https_crlfile );
20912091#endif /* OPENSSL_VERSION_NUMBER<0x30000000L */
20922092 if (!bio ) {
2093- fprintf (stderr , "Faild to get CRL from %s\n\n" , url );
2093+ fprintf (stderr , "Failed to get CRL from %s\n\n" , url );
20942094 return NULL ; /* FAILED */
20952095 }
20962096 crl = d2i_X509_CRL_bio (bio , NULL ); /* DER format */
@@ -2100,7 +2100,7 @@ static X509_CRL *x509_crl_get(FILE_FORMAT_CTX *ctx, char *url)
21002100 }
21012101 BIO_free_all (bio );
21022102 if (!crl ) {
2103- fprintf (stderr , "Faild to decode CRL from %s\n\n" , url );
2103+ fprintf (stderr , "Failed to decode CRL from %s\n\n" , url );
21042104 return NULL ; /* FAILED */
21052105 }
21062106 return crl ; /* OK */
@@ -4221,17 +4221,17 @@ static int read_token(GLOBAL_OPTIONS *options, ENGINE *engine)
42214221 struct {
42224222 const char * id ;
42234223 X509 * cert ;
4224- } parms ;
4224+ } params ;
42254225
4226- parms .id = options -> p11cert ;
4227- parms .cert = NULL ;
4228- ENGINE_ctrl_cmd (engine , "LOAD_CERT_CTRL" , 0 , & parms , NULL , 1 );
4229- if (!parms .cert ) {
4226+ params .id = options -> p11cert ;
4227+ params .cert = NULL ;
4228+ ENGINE_ctrl_cmd (engine , "LOAD_CERT_CTRL" , 0 , & params , NULL , 1 );
4229+ if (!params .cert ) {
42304230 fprintf (stderr , "Failed to load certificate %s\n" , options -> p11cert );
42314231 ENGINE_finish (engine );
42324232 return 0 ; /* FAILED */
42334233 } else
4234- sk_X509_push (options -> certs , parms .cert );
4234+ sk_X509_push (options -> certs , params .cert );
42354235 }
42364236
42374237 options -> pkey = ENGINE_load_private_key (engine , options -> keyfile , NULL , NULL );
0 commit comments