Typos fixing

Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Paul Dale <pauli@openssl.org>
Reviewed-by: Hugo Landau <hlandau@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/20109)
This commit is contained in:
FdaSilvaYY 2021-02-20 23:39:30 +01:00 committed by Hugo Landau
parent 4a6e5a11c7
commit 91b968bc8e
7 changed files with 10 additions and 10 deletions

View File

@ -1963,7 +1963,7 @@ int s_client_main(int argc, char **argv)
/*
* In TLSv1.3 NewSessionTicket messages arrive after the handshake and can
* come at any time. Therefore we use a callback to write out the session
* come at any time. Therefore, we use a callback to write out the session
* when we know about it. This approach works for < TLSv1.3 as well.
*/
SSL_CTX_set_session_cache_mode(ctx, SSL_SESS_CACHE_CLIENT
@ -2849,7 +2849,7 @@ int s_client_main(int argc, char **argv)
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS)
/*
* Under Windows/DOS we make the assumption that we can always
* write to the tty: therefore if we need to write to the tty we
* write to the tty: therefore, if we need to write to the tty we
* just fall through. Otherwise we timeout the select every
* second and see if there are any keypresses. Note: this is a
* hack, in a proper Windows application we wouldn't do this.
@ -3394,7 +3394,7 @@ static void print_stuff(BIO *bio, SSL *s, int full)
/*
* We also print the verify results when we dump session information,
* but in TLSv1.3 we may not get that right away (or at all) depending
* on when we get a NewSessionTicket. Therefore we print it now as well.
* on when we get a NewSessionTicket. Therefore, we print it now as well.
*/
verify_result = SSL_get_verify_result(s);
BIO_printf(bio, "Verify return code: %ld (%s)\n", verify_result,

View File

@ -22,7 +22,7 @@ The EVP_PKEY_decapsulate_init() function initializes a private key algorithm
context I<ctx> for a decapsulation operation and then sets the I<params>
on the context in the same way as calling L<EVP_PKEY_CTX_set_params(3)>.
The EVP_PKEY_auth_decapsulate_init() function is similiar to
The EVP_PKEY_auth_decapsulate_init() function is similar to
EVP_PKEY_decapsulate_init() but also passes an I<authpub> authentication public
key that is used during decapsulation.

View File

@ -22,7 +22,7 @@ The EVP_PKEY_encapsulate_init() function initializes a public key algorithm
context I<ctx> for an encapsulation operation and then sets the I<params>
on the context in the same way as calling L<EVP_PKEY_CTX_set_params(3)>.
The EVP_PKEY_auth_encapsulate_init() function is similiar to
The EVP_PKEY_auth_encapsulate_init() function is similar to
EVP_PKEY_encapsulate_init() but also passes an I<authpriv> authentication private
key that is used during encapsulation.

View File

@ -7,7 +7,7 @@ EVP_KDF-HMAC-DRBG
=head1 DESCRIPTION
Support for a deterministic HMAC DRBG using the B<EVP_KDF> API. This is similiar
Support for a deterministic HMAC DRBG using the B<EVP_KDF> API. This is similar
to L<EVP_RAND-HMAC-DRBG(7)>, but uses fixed values for its entropy and nonce
values. This is used to generate deterministic nonce value required by ECDSA
and DSA (as defined in RFC 6979).

View File

@ -186,7 +186,7 @@ both return 1 unconditionally.
For RSA keys, L<EVP_PKEY_public_check(3)> conforms to the SP800-56Br1 I<public key
check> when the OpenSSL FIPS provider is used. The OpenSSL default provider
performs similiar tests but relaxes the keysize restrictions for backwards
performs similar tests but relaxes the keysize restrictions for backwards
compatibility.
For RSA keys, L<EVP_PKEY_public_check_quick(3)> is the same as

View File

@ -137,7 +137,7 @@ The key object should have been previously generated, loaded or imported into
the provider using the key management (OSSL_OP_KEYMGMT) operation (see
provider-keymgmt(7)>.
OSSL_FUNC_kem_auth_encapsulate_init() is similiar to
OSSL_FUNC_kem_auth_encapsulate_init() is similar to
OSSL_FUNC_kem_encapsulate_init(), but also passes an additional authentication
key I<provauthkey> which cannot be NULL.
@ -165,7 +165,7 @@ The key object should have been previously generated, loaded or imported into
the provider using the key management (OSSL_OP_KEYMGMT) operation (see
provider-keymgmt(7)>.
OSSL_FUNC_kem_auth_decapsulate_init() is similiar to
OSSL_FUNC_kem_auth_decapsulate_init() is similar to
OSSL_FUNC_kem_decapsulate_init(), but also passes an additional authentication
key I<provauthkey> which cannot be NULL.

View File

@ -239,7 +239,7 @@ x942_encode_otherinfo(size_t keylen,
goto err;
/*
* Since we allocated the exact size required, the buffer should point to the
* start of the alllocated buffer at this point.
* start of the allocated buffer at this point.
*/
if (WPACKET_get_curr(&pkt) != der_buf)
goto err;