barbieri pushed a commit to branch master.

http://git.enlightenment.org/core/efl.git/commit/?id=e9a72ea8f4b803f4b5accee6f487652de675174e

commit e9a72ea8f4b803f4b5accee6f487652de675174e
Author: Gustavo Sverzut Barbieri <barbi...@profusion.mobi>
Date:   Sat Dec 10 10:21:56 2016 -0200

    efl_net: spell check s/revogation/revocation/g
    
    Sorry, in pt_BR it's revoGar... so I did misspell :-)
---
 src/examples/ecore/efl_net_server_example.c            |  4 ++--
 src/examples/ecore/efl_net_server_simple_example.c     |  4 ++--
 src/examples/ecore/efl_net_socket_ssl_dialer_example.c |  8 ++++----
 src/examples/ecore/efl_net_socket_ssl_server_example.c |  8 ++++----
 src/lib/ecore_con/ecore_con_legacy.c                   |  6 +++---
 src/lib/ecore_con/efl_net_dialer_http.c                |  4 ++--
 src/lib/ecore_con/efl_net_dialer_http.eo               |  4 ++--
 src/lib/ecore_con/efl_net_ssl_context.c                | 18 +++++++++---------
 src/lib/ecore_con/efl_net_ssl_context.eo               |  6 +++---
 src/lib/ecore_con/efl_net_ssl_ctx-gnutls.c             | 14 +++++++-------
 src/lib/ecore_con/efl_net_ssl_ctx-openssl.c            | 14 +++++++-------
 11 files changed, 45 insertions(+), 45 deletions(-)

diff --git a/src/examples/ecore/efl_net_server_example.c 
b/src/examples/ecore/efl_net_server_example.c
index c8fc088..32e7f83 100644
--- a/src/examples/ecore/efl_net_server_example.c
+++ b/src/examples/ecore/efl_net_server_example.c
@@ -533,7 +533,7 @@ static const Ecore_Getopt options = {
     ECORE_GETOPT_CHOICE('c', "ssl-cipher", "Cipher to use, defaults to 
'auto'", ciphers_strs),
     ECORE_GETOPT_APPEND(0, "ssl-certificate", "certificate path to use.", 
ECORE_GETOPT_TYPE_STR),
     ECORE_GETOPT_APPEND(0, "ssl-private-key", "private key path to use.", 
ECORE_GETOPT_TYPE_STR),
-    ECORE_GETOPT_APPEND(0, "ssl-crl", "certificate revogation list to use.", 
ECORE_GETOPT_TYPE_STR),
+    ECORE_GETOPT_APPEND(0, "ssl-crl", "certificate revocation list to use.", 
ECORE_GETOPT_TYPE_STR),
     ECORE_GETOPT_APPEND(0, "ssl-ca", "certificate authorities path to use.", 
ECORE_GETOPT_TYPE_STR),
 
     ECORE_GETOPT_CHOICE_METAVAR(0, NULL, "The server protocol.", "protocol",
@@ -706,7 +706,7 @@ main(int argc, char **argv)
         ssl_ctx = efl_add(EFL_NET_SSL_CONTEXT_CLASS, NULL,
                           efl_net_ssl_context_certificates_set(efl_added, 
eina_list_iterator_new(certificates)),
                           efl_net_ssl_context_private_keys_set(efl_added, 
eina_list_iterator_new(private_keys)),
-                          
efl_net_ssl_context_certificate_revogation_lists_set(efl_added, 
eina_list_iterator_new(crls)),
+                          
efl_net_ssl_context_certificate_revocation_lists_set(efl_added, 
eina_list_iterator_new(crls)),
                           
efl_net_ssl_context_certificate_authorities_set(efl_added, 
eina_list_iterator_new(cas)),
                           efl_net_ssl_context_setup(efl_added, cipher, 
EINA_FALSE /* a server! */));
 
diff --git a/src/examples/ecore/efl_net_server_simple_example.c 
b/src/examples/ecore/efl_net_server_simple_example.c
index a7dc2b7..d8580bf 100644
--- a/src/examples/ecore/efl_net_server_simple_example.c
+++ b/src/examples/ecore/efl_net_server_simple_example.c
@@ -328,7 +328,7 @@ static const Ecore_Getopt options = {
     ECORE_GETOPT_CHOICE('c', "ssl-cipher", "Cipher to use, defaults to 
'auto'", ciphers_strs),
     ECORE_GETOPT_APPEND(0, "ssl-certificate", "certificate path to use.", 
ECORE_GETOPT_TYPE_STR),
     ECORE_GETOPT_APPEND(0, "ssl-private-key", "private key path to use.", 
ECORE_GETOPT_TYPE_STR),
-    ECORE_GETOPT_APPEND(0, "ssl-crl", "certificate revogation list to use.", 
ECORE_GETOPT_TYPE_STR),
+    ECORE_GETOPT_APPEND(0, "ssl-crl", "certificate revocation list to use.", 
ECORE_GETOPT_TYPE_STR),
     ECORE_GETOPT_APPEND(0, "ssl-ca", "certificate authorities path to use.", 
ECORE_GETOPT_TYPE_STR),
 
     ECORE_GETOPT_CHOICE_METAVAR(0, NULL, "The server protocol.", "protocol",
@@ -505,7 +505,7 @@ main(int argc, char **argv)
         ssl_ctx = efl_add(EFL_NET_SSL_CONTEXT_CLASS, NULL,
                           efl_net_ssl_context_certificates_set(efl_added, 
eina_list_iterator_new(certificates)),
                           efl_net_ssl_context_private_keys_set(efl_added, 
eina_list_iterator_new(private_keys)),
-                          
efl_net_ssl_context_certificate_revogation_lists_set(efl_added, 
eina_list_iterator_new(crls)),
+                          
efl_net_ssl_context_certificate_revocation_lists_set(efl_added, 
eina_list_iterator_new(crls)),
                           
efl_net_ssl_context_certificate_authorities_set(efl_added, 
eina_list_iterator_new(cas)),
                           efl_net_ssl_context_setup(efl_added, cipher, 
EINA_FALSE /* a server! */));
 
diff --git a/src/examples/ecore/efl_net_socket_ssl_dialer_example.c 
b/src/examples/ecore/efl_net_socket_ssl_dialer_example.c
index 34abd16..7a06379 100644
--- a/src/examples/ecore/efl_net_socket_ssl_dialer_example.c
+++ b/src/examples/ecore/efl_net_socket_ssl_dialer_example.c
@@ -264,7 +264,7 @@ static const Ecore_Getopt options = {
     ECORE_GETOPT_CHOICE('c', "cipher", "Cipher to use, defaults to 'auto'", 
ciphers_strs),
     ECORE_GETOPT_APPEND(0, "certificate", "certificate path to use.", 
ECORE_GETOPT_TYPE_STR),
     ECORE_GETOPT_APPEND(0, "private-key", "private key path to use.", 
ECORE_GETOPT_TYPE_STR),
-    ECORE_GETOPT_APPEND(0, "crl", "certificate revogation list to use.", 
ECORE_GETOPT_TYPE_STR),
+    ECORE_GETOPT_APPEND(0, "crl", "certificate revocation list to use.", 
ECORE_GETOPT_TYPE_STR),
     ECORE_GETOPT_APPEND(0, "ca", "certificate authorities path to use.", 
ECORE_GETOPT_TYPE_STR),
 
     ECORE_GETOPT_STORE_FALSE(0, "no-default-paths", "Do not use default 
certificate paths from your system."),
@@ -420,7 +420,7 @@ main(int argc, char **argv)
    ssl_ctx = efl_add(EFL_NET_SSL_CONTEXT_CLASS, NULL,
                      efl_net_ssl_context_certificates_set(efl_added, 
eina_list_iterator_new(certificates)),
                      efl_net_ssl_context_private_keys_set(efl_added, 
eina_list_iterator_new(private_keys)),
-                     
efl_net_ssl_context_certificate_revogation_lists_set(efl_added, 
eina_list_iterator_new(crls)),
+                     
efl_net_ssl_context_certificate_revocation_lists_set(efl_added, 
eina_list_iterator_new(crls)),
                      
efl_net_ssl_context_certificate_authorities_set(efl_added, 
eina_list_iterator_new(cas)),
                      efl_net_ssl_context_default_paths_load_set(efl_added, 
default_paths_load),
                      efl_net_ssl_context_verify_mode_set(efl_added, 
verify_mode),
@@ -453,8 +453,8 @@ main(int argc, char **argv)
      fprintf(stderr, "INFO:     * %s\n", str);
    eina_iterator_free(it);
 
-   fprintf(stderr, "INFO:  - certificate revogation lists in use:\n");
-   it = efl_net_ssl_context_certificate_revogation_lists_get(ssl_ctx);
+   fprintf(stderr, "INFO:  - certificate revocation lists in use:\n");
+   it = efl_net_ssl_context_certificate_revocation_lists_get(ssl_ctx);
    EINA_ITERATOR_FOREACH(it, str)
      fprintf(stderr, "INFO:     * %s\n", str);
    eina_iterator_free(it);
diff --git a/src/examples/ecore/efl_net_socket_ssl_server_example.c 
b/src/examples/ecore/efl_net_socket_ssl_server_example.c
index c87fec3..578cbbb 100644
--- a/src/examples/ecore/efl_net_socket_ssl_server_example.c
+++ b/src/examples/ecore/efl_net_socket_ssl_server_example.c
@@ -184,7 +184,7 @@ static const Ecore_Getopt options = {
 
     ECORE_GETOPT_APPEND(0, "certificate", "certificate path to use.", 
ECORE_GETOPT_TYPE_STR),
     ECORE_GETOPT_APPEND(0, "private-key", "private key path to use.", 
ECORE_GETOPT_TYPE_STR),
-    ECORE_GETOPT_APPEND(0, "crl", "certificate revogation list to use.", 
ECORE_GETOPT_TYPE_STR),
+    ECORE_GETOPT_APPEND(0, "crl", "certificate revocation list to use.", 
ECORE_GETOPT_TYPE_STR),
     ECORE_GETOPT_APPEND(0, "ca", "certificate authorities path to use.", 
ECORE_GETOPT_TYPE_STR),
 
     ECORE_GETOPT_VERSION('V', "version"),
@@ -275,7 +275,7 @@ main(int argc, char **argv)
    ssl_ctx = efl_add(EFL_NET_SSL_CONTEXT_CLASS, NULL,
                      efl_net_ssl_context_certificates_set(efl_added, 
eina_list_iterator_new(certificates)),
                      efl_net_ssl_context_private_keys_set(efl_added, 
eina_list_iterator_new(private_keys)),
-                     
efl_net_ssl_context_certificate_revogation_lists_set(efl_added, 
eina_list_iterator_new(crls)),
+                     
efl_net_ssl_context_certificate_revocation_lists_set(efl_added, 
eina_list_iterator_new(crls)),
                      
efl_net_ssl_context_certificate_authorities_set(efl_added, 
eina_list_iterator_new(cas)),
                      efl_net_ssl_context_setup(efl_added, cipher, EINA_FALSE 
/* a server! */));
 
@@ -298,8 +298,8 @@ main(int argc, char **argv)
      fprintf(stderr, "INFO:     * %s\n", str);
    eina_iterator_free(it);
 
-   fprintf(stderr, "INFO:  - certificate revogation lists in use:\n");
-   it = efl_net_ssl_context_certificate_revogation_lists_get(ssl_ctx);
+   fprintf(stderr, "INFO:  - certificate revocation lists in use:\n");
+   it = efl_net_ssl_context_certificate_revocation_lists_get(ssl_ctx);
    EINA_ITERATOR_FOREACH(it, str)
      fprintf(stderr, "INFO:     * %s\n", str);
    eina_iterator_free(it);
diff --git a/src/lib/ecore_con/ecore_con_legacy.c 
b/src/lib/ecore_con/ecore_con_legacy.c
index cf2210f..fdf6b36 100644
--- a/src/lib/ecore_con/ecore_con_legacy.c
+++ b/src/lib/ecore_con/ecore_con_legacy.c
@@ -1530,7 +1530,7 @@ _ecore_con_server_ssl_ctx_create(const Ecore_Con_Server 
*svr)
    return efl_add(EFL_NET_SSL_CONTEXT_CLASS, NULL,
                   efl_net_ssl_context_certificates_set(efl_added, 
eina_list_iterator_new(svr->ssl.certs)),
                   efl_net_ssl_context_private_keys_set(efl_added, 
eina_list_iterator_new(svr->ssl.privkeys)),
-                  
efl_net_ssl_context_certificate_revogation_lists_set(efl_added, 
eina_list_iterator_new(svr->ssl.crls)),
+                  
efl_net_ssl_context_certificate_revocation_lists_set(efl_added, 
eina_list_iterator_new(svr->ssl.crls)),
                   efl_net_ssl_context_certificate_authorities_set(efl_added, 
eina_list_iterator_new(svr->ssl.cafiles)),
                   efl_net_ssl_context_default_paths_load_set(efl_added, 
EINA_FALSE), /* old API didn't load default paths */
                   efl_net_ssl_context_setup(efl_added, cipher, EINA_FALSE));
@@ -1878,7 +1878,7 @@ _ecore_con_server_dialer_ssl_job(void *data, const 
Efl_Event *event EINA_UNUSED)
    ssl_ctx = efl_add(EFL_NET_SSL_CONTEXT_CLASS, NULL,
                      efl_net_ssl_context_certificates_set(efl_added, 
eina_list_iterator_new(svr->ssl.certs)),
                      efl_net_ssl_context_private_keys_set(efl_added, 
eina_list_iterator_new(svr->ssl.privkeys)),
-                     
efl_net_ssl_context_certificate_revogation_lists_set(efl_added, 
eina_list_iterator_new(svr->ssl.crls)),
+                     
efl_net_ssl_context_certificate_revocation_lists_set(efl_added, 
eina_list_iterator_new(svr->ssl.crls)),
                      
efl_net_ssl_context_certificate_authorities_set(efl_added, 
eina_list_iterator_new(svr->ssl.cafiles)),
                      efl_net_ssl_context_verify_mode_set(efl_added, 
verify_mode),
                      efl_net_ssl_context_hostname_set(efl_added, 
svr->ssl.verify_name ? svr->ssl.verify_name : svr->name),
@@ -1955,7 +1955,7 @@ _ecore_con_server_dialer_ssl_upgrade_job(void *data, 
const Efl_Event *event EINA
    ssl_ctx = efl_add(EFL_NET_SSL_CONTEXT_CLASS, NULL,
                      efl_net_ssl_context_certificates_set(efl_added, 
eina_list_iterator_new(svr->ssl.certs)),
                      efl_net_ssl_context_private_keys_set(efl_added, 
eina_list_iterator_new(svr->ssl.privkeys)),
-                     
efl_net_ssl_context_certificate_revogation_lists_set(efl_added, 
eina_list_iterator_new(svr->ssl.crls)),
+                     
efl_net_ssl_context_certificate_revocation_lists_set(efl_added, 
eina_list_iterator_new(svr->ssl.crls)),
                      
efl_net_ssl_context_certificate_authorities_set(efl_added, 
eina_list_iterator_new(svr->ssl.cafiles)),
                      efl_net_ssl_context_verify_mode_set(efl_added, 
verify_mode),
                      efl_net_ssl_context_hostname_set(efl_added, 
svr->ssl.verify_name ? svr->ssl.verify_name : svr->name),
diff --git a/src/lib/ecore_con/efl_net_dialer_http.c 
b/src/lib/ecore_con/efl_net_dialer_http.c
index 288dd9b..c44d629 100644
--- a/src/lib/ecore_con/efl_net_dialer_http.c
+++ b/src/lib/ecore_con/efl_net_dialer_http.c
@@ -2342,7 +2342,7 @@ _efl_net_dialer_http_ssl_certificate_authority_get(Eo *o 
EINA_UNUSED, Efl_Net_Di
 }
 
 EOLIAN static void
-_efl_net_dialer_http_ssl_certificate_revogation_list_set(Eo *o EINA_UNUSED, 
Efl_Net_Dialer_Http_Data *pd, const char *path)
+_efl_net_dialer_http_ssl_certificate_revocation_list_set(Eo *o EINA_UNUSED, 
Efl_Net_Dialer_Http_Data *pd, const char *path)
 {
    CURLcode r;
 
@@ -2355,7 +2355,7 @@ 
_efl_net_dialer_http_ssl_certificate_revogation_list_set(Eo *o EINA_UNUSED, Efl_
 }
 
 EOLIAN static const char *
-_efl_net_dialer_http_ssl_certificate_revogation_list_get(Eo *o EINA_UNUSED, 
Efl_Net_Dialer_Http_Data *pd)
+_efl_net_dialer_http_ssl_certificate_revocation_list_get(Eo *o EINA_UNUSED, 
Efl_Net_Dialer_Http_Data *pd)
 {
    return pd->ssl.crl;
 }
diff --git a/src/lib/ecore_con/efl_net_dialer_http.eo 
b/src/lib/ecore_con/efl_net_dialer_http.eo
index f7a063b..af4e38a 100644
--- a/src/lib/ecore_con/efl_net_dialer_http.eo
+++ b/src/lib/ecore_con/efl_net_dialer_http.eo
@@ -356,8 +356,8 @@ class Efl.Net.Dialer.Http (Efl.Loop_User, Efl.Net.Dialer, 
Efl.Io.Sizer) {
             }
         }
 
-        @property ssl_certificate_revogation_list {
-            [[Defines a CRL (Certificate Revogation List) path to use.]]
+        @property ssl_certificate_revocation_list {
+            [[Defines a CRL (Certificate Revocation List) path to use.]]
             values {
                 file: string; [[File path to use for CRL]]
             }
diff --git a/src/lib/ecore_con/efl_net_ssl_context.c 
b/src/lib/ecore_con/efl_net_ssl_context.c
index 5779ff1..8f8e296 100644
--- a/src/lib/ecore_con/efl_net_ssl_context.c
+++ b/src/lib/ecore_con/efl_net_ssl_context.c
@@ -29,7 +29,7 @@ typedef struct _Efl_Net_Ssl_Ctx_Config {
    Eina_Bool load_defaults;
    Eina_List **certificates;
    Eina_List **private_keys;
-   Eina_List **certificate_revogation_lists;
+   Eina_List **certificate_revocation_lists;
    Eina_List **certificate_authorities;
 } Efl_Net_Ssl_Ctx_Config;
 
@@ -95,7 +95,7 @@ typedef struct _Efl_Net_Ssl_Context_Data
    Efl_Net_Ssl_Ctx ssl_ctx;
    Eina_List *certificates;
    Eina_List *private_keys;
-   Eina_List *certificate_revogation_lists;
+   Eina_List *certificate_revocation_lists;
    Eina_List *certificate_authorities;
    const char *hostname;
    Efl_Net_Ssl_Cipher cipher;
@@ -179,17 +179,17 @@ _efl_net_ssl_context_private_keys_set(Eo *o EINA_UNUSED, 
Efl_Net_Ssl_Context_Dat
 }
 
 static Eina_Iterator *
-_efl_net_ssl_context_certificate_revogation_lists_get(Eo *o EINA_UNUSED, 
Efl_Net_Ssl_Context_Data *pd)
+_efl_net_ssl_context_certificate_revocation_lists_get(Eo *o EINA_UNUSED, 
Efl_Net_Ssl_Context_Data *pd)
 {
-   return eina_list_iterator_new(pd->certificate_revogation_lists);
+   return eina_list_iterator_new(pd->certificate_revocation_lists);
 }
 
 static void
-_efl_net_ssl_context_certificate_revogation_lists_set(Eo *o EINA_UNUSED, 
Efl_Net_Ssl_Context_Data *pd, Eina_Iterator *it)
+_efl_net_ssl_context_certificate_revocation_lists_set(Eo *o EINA_UNUSED, 
Efl_Net_Ssl_Context_Data *pd, Eina_Iterator *it)
 {
    EINA_SAFETY_ON_TRUE_RETURN(efl_finalized_get(o));
-   _efl_net_ssl_context_string_list_free(&pd->certificate_revogation_lists);
-   pd->certificate_revogation_lists = 
_efl_net_ssl_context_string_iter_to_list(it);
+   _efl_net_ssl_context_string_list_free(&pd->certificate_revocation_lists);
+   pd->certificate_revocation_lists = 
_efl_net_ssl_context_string_iter_to_list(it);
 }
 
 static Eina_Iterator *
@@ -304,7 +304,7 @@ _efl_net_ssl_context_efl_object_finalize(Eo *o, 
Efl_Net_Ssl_Context_Data *pd)
    cfg.load_defaults = pd->load_defaults;
    cfg.certificates = &pd->certificates;
    cfg.private_keys = &pd->private_keys;
-   cfg.certificate_revogation_lists = &pd->certificate_revogation_lists;
+   cfg.certificate_revocation_lists = &pd->certificate_revocation_lists;
    cfg.certificate_authorities = &pd->certificate_authorities;
    cfg.load_defaults = pd->load_defaults;
 
@@ -343,7 +343,7 @@ _efl_net_ssl_context_efl_object_destructor(Eo *o, 
Efl_Net_Ssl_Context_Data *pd)
 
    _efl_net_ssl_context_string_list_free(&pd->certificates);
    _efl_net_ssl_context_string_list_free(&pd->private_keys);
-   _efl_net_ssl_context_string_list_free(&pd->certificate_revogation_lists);
+   _efl_net_ssl_context_string_list_free(&pd->certificate_revocation_lists);
    _efl_net_ssl_context_string_list_free(&pd->certificate_authorities);
 
    eina_stringshare_replace(&pd->hostname, NULL);
diff --git a/src/lib/ecore_con/efl_net_ssl_context.eo 
b/src/lib/ecore_con/efl_net_ssl_context.eo
index d980843..0bf5e15 100644
--- a/src/lib/ecore_con/efl_net_ssl_context.eo
+++ b/src/lib/ecore_con/efl_net_ssl_context.eo
@@ -4,7 +4,7 @@ class Efl.Net.Ssl.Context (Efl.Object) {
     [[A SSL Context that is used to start a SSL socket wrapper.
 
       The context will contain common configurations such as
-      certificates, private keys, certificate revogation lists (CRLs),
+      certificates, private keys, certificate revocation lists (CRLs),
       certificate authorities (CAs) and so on.
 
       The method @.setup must be called once before
@@ -62,8 +62,8 @@ class Efl.Net.Ssl.Context (Efl.Object) {
             }
         }
 
-        @property certificate_revogation_lists {
-            [[The list of paths to CRL (certificate revogation list) to use.
+        @property certificate_revocation_lists {
+            [[The list of paths to CRL (certificate revocation list) to use.
 
               Can only be set during object construction!
             ]]
diff --git a/src/lib/ecore_con/efl_net_ssl_ctx-gnutls.c 
b/src/lib/ecore_con/efl_net_ssl_ctx-gnutls.c
index cdd3969..67b7c25 100644
--- a/src/lib/ecore_con/efl_net_ssl_ctx-gnutls.c
+++ b/src/lib/ecore_con/efl_net_ssl_ctx-gnutls.c
@@ -13,7 +13,7 @@ _efl_net_ssl_ctx_load_lists(Efl_Net_Ssl_Ctx *ctx, 
Efl_Net_Ssl_Ctx_Config cfg)
    const char *path;
    unsigned certificates_count = eina_list_count(*cfg.certificates);
    unsigned private_keys_count = eina_list_count(*cfg.private_keys);
-   unsigned certificate_revogation_lists_count = 
eina_list_count(*cfg.certificate_revogation_lists);
+   unsigned certificate_revocation_lists_count = 
eina_list_count(*cfg.certificate_revocation_lists);
    unsigned certificate_authorities_count = 
eina_list_count(*cfg.certificate_authorities);
    int r;
 
@@ -98,23 +98,23 @@ _efl_net_ssl_ctx_load_lists(Efl_Net_Ssl_Ctx *ctx, 
Efl_Net_Ssl_Ctx_Config cfg)
         while (pk_node->next);
      }
 
-   EINA_LIST_FOREACH_SAFE(*cfg.certificate_revogation_lists, n, n_next, path)
+   EINA_LIST_FOREACH_SAFE(*cfg.certificate_revocation_lists, n, n_next, path)
      {
         r = gnutls_certificate_set_x509_crl_file(ctx->x509_cred, path, 
GNUTLS_X509_FMT_PEM);
         if (r < 0)
           {
-             ERR("ssl_ctx=%p could not use certificate revogation lists from 
%s: %s",
+             ERR("ssl_ctx=%p could not use certificate revocation lists from 
%s: %s",
                  ctx, path, gnutls_strerror(r));
              eina_stringshare_del(path);
-             *cfg.certificate_revogation_lists = 
eina_list_remove_list(*cfg.certificate_revogation_lists, n);
+             *cfg.certificate_revocation_lists = 
eina_list_remove_list(*cfg.certificate_revocation_lists, n);
              continue;
           }
 
-        DBG("ssl_ctx=%p loaded certificate revogation lists '%s'", ctx, path);
+        DBG("ssl_ctx=%p loaded certificate revocation lists '%s'", ctx, path);
      }
-   if (certificate_revogation_lists_count && 
!*cfg.certificate_revogation_lists)
+   if (certificate_revocation_lists_count && 
!*cfg.certificate_revocation_lists)
      {
-        ERR("ssl_ctx=%p none of the required certificate revogation lists were 
loaded!", ctx);
+        ERR("ssl_ctx=%p none of the required certificate revocation lists were 
loaded!", ctx);
         return EINVAL;
      }
 
diff --git a/src/lib/ecore_con/efl_net_ssl_ctx-openssl.c 
b/src/lib/ecore_con/efl_net_ssl_ctx-openssl.c
index 526764a..12614c7 100644
--- a/src/lib/ecore_con/efl_net_ssl_ctx-openssl.c
+++ b/src/lib/ecore_con/efl_net_ssl_ctx-openssl.c
@@ -42,7 +42,7 @@ _efl_net_ssl_ctx_load_lists(Efl_Net_Ssl_Ctx *ctx, 
Efl_Net_Ssl_Ctx_Config cfg)
    const char *path;
    unsigned certificates_count = eina_list_count(*cfg.certificates);
    unsigned private_keys_count = eina_list_count(*cfg.private_keys);
-   unsigned certificate_revogation_lists_count = 
eina_list_count(*cfg.certificate_revogation_lists);
+   unsigned certificate_revocation_lists_count = 
eina_list_count(*cfg.certificate_revocation_lists);
    unsigned certificate_authorities_count = 
eina_list_count(*cfg.certificate_authorities);
    long err_ssl;
    const char *err_file;
@@ -155,7 +155,7 @@ _efl_net_ssl_ctx_check_errors();
         return ENOSYS;
      }
 
-   EINA_LIST_FOREACH_SAFE(*cfg.certificate_revogation_lists, n, n_next, path)
+   EINA_LIST_FOREACH_SAFE(*cfg.certificate_revocation_lists, n, n_next, path)
      {
         if ((X509_load_crl_file(x509_lookup, path, X509_FILETYPE_PEM) != 1) &&
             (X509_load_crl_file(x509_lookup, path, X509_FILETYPE_ASN1) != 1))
@@ -163,23 +163,23 @@ _efl_net_ssl_ctx_check_errors();
              err_ssl = ERR_peek_error_line_data(&err_file, &err_line, 
&err_data, &err_flags);
              _efl_net_ssl_ctx_check_errors();
 
-             ERR("ssl_ctx=%p could not use certificate revogation lists from 
%s [%s:%d%s%s '%s']",
+             ERR("ssl_ctx=%p could not use certificate revocation lists from 
%s [%s:%d%s%s '%s']",
                  ctx, path,
                  err_file, err_line,
                  (err_flags & ERR_TXT_STRING) ? " " : "",
                  (err_flags & ERR_TXT_STRING) ? err_data : "",
                  ERR_reason_error_string(err_ssl));
              eina_stringshare_del(path);
-             *cfg.certificate_revogation_lists = 
eina_list_remove_list(*cfg.certificate_revogation_lists, n);
+             *cfg.certificate_revocation_lists = 
eina_list_remove_list(*cfg.certificate_revocation_lists, n);
              continue;
           }
 
-        DBG("ssl_ctx=%p loaded certificate revogation lists '%s'", ctx, path);
+        DBG("ssl_ctx=%p loaded certificate revocation lists '%s'", ctx, path);
         x509_store_flags |= X509_V_FLAG_CRL_CHECK | X509_V_FLAG_CRL_CHECK_ALL;
      }
-   if (certificate_revogation_lists_count && 
!*cfg.certificate_revogation_lists)
+   if (certificate_revocation_lists_count && 
!*cfg.certificate_revocation_lists)
      {
-        ERR("ssl_ctx=%p none of the required certificate revogation lists were 
loaded!", ctx);
+        ERR("ssl_ctx=%p none of the required certificate revocation lists were 
loaded!", ctx);
         return EINVAL;
      }
    X509_STORE_set_flags(x509_store, x509_store_flags);

-- 


Reply via email to