mirror of https://github.com/openssl/openssl
Typos fixing
Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20109)
This commit is contained in:
parent
4a6e5a11c7
commit
91b968bc8e
|
@ -1963,7 +1963,7 @@ int s_client_main(int argc, char **argv)
|
|||
|
||||
/*
|
||||
* In TLSv1.3 NewSessionTicket messages arrive after the handshake and can
|
||||
* come at any time. Therefore we use a callback to write out the session
|
||||
* come at any time. Therefore, we use a callback to write out the session
|
||||
* when we know about it. This approach works for < TLSv1.3 as well.
|
||||
*/
|
||||
SSL_CTX_set_session_cache_mode(ctx, SSL_SESS_CACHE_CLIENT
|
||||
|
@ -2849,7 +2849,7 @@ int s_client_main(int argc, char **argv)
|
|||
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS)
|
||||
/*
|
||||
* Under Windows/DOS we make the assumption that we can always
|
||||
* write to the tty: therefore if we need to write to the tty we
|
||||
* write to the tty: therefore, if we need to write to the tty we
|
||||
* just fall through. Otherwise we timeout the select every
|
||||
* second and see if there are any keypresses. Note: this is a
|
||||
* hack, in a proper Windows application we wouldn't do this.
|
||||
|
@ -3394,7 +3394,7 @@ static void print_stuff(BIO *bio, SSL *s, int full)
|
|||
/*
|
||||
* We also print the verify results when we dump session information,
|
||||
* but in TLSv1.3 we may not get that right away (or at all) depending
|
||||
* on when we get a NewSessionTicket. Therefore we print it now as well.
|
||||
* on when we get a NewSessionTicket. Therefore, we print it now as well.
|
||||
*/
|
||||
verify_result = SSL_get_verify_result(s);
|
||||
BIO_printf(bio, "Verify return code: %ld (%s)\n", verify_result,
|
||||
|
|
|
@ -22,7 +22,7 @@ The EVP_PKEY_decapsulate_init() function initializes a private key algorithm
|
|||
context I<ctx> for a decapsulation operation and then sets the I<params>
|
||||
on the context in the same way as calling L<EVP_PKEY_CTX_set_params(3)>.
|
||||
|
||||
The EVP_PKEY_auth_decapsulate_init() function is similiar to
|
||||
The EVP_PKEY_auth_decapsulate_init() function is similar to
|
||||
EVP_PKEY_decapsulate_init() but also passes an I<authpub> authentication public
|
||||
key that is used during decapsulation.
|
||||
|
||||
|
|
|
@ -22,7 +22,7 @@ The EVP_PKEY_encapsulate_init() function initializes a public key algorithm
|
|||
context I<ctx> for an encapsulation operation and then sets the I<params>
|
||||
on the context in the same way as calling L<EVP_PKEY_CTX_set_params(3)>.
|
||||
|
||||
The EVP_PKEY_auth_encapsulate_init() function is similiar to
|
||||
The EVP_PKEY_auth_encapsulate_init() function is similar to
|
||||
EVP_PKEY_encapsulate_init() but also passes an I<authpriv> authentication private
|
||||
key that is used during encapsulation.
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ EVP_KDF-HMAC-DRBG
|
|||
|
||||
=head1 DESCRIPTION
|
||||
|
||||
Support for a deterministic HMAC DRBG using the B<EVP_KDF> API. This is similiar
|
||||
Support for a deterministic HMAC DRBG using the B<EVP_KDF> API. This is similar
|
||||
to L<EVP_RAND-HMAC-DRBG(7)>, but uses fixed values for its entropy and nonce
|
||||
values. This is used to generate deterministic nonce value required by ECDSA
|
||||
and DSA (as defined in RFC 6979).
|
||||
|
|
|
@ -186,7 +186,7 @@ both return 1 unconditionally.
|
|||
|
||||
For RSA keys, L<EVP_PKEY_public_check(3)> conforms to the SP800-56Br1 I<public key
|
||||
check> when the OpenSSL FIPS provider is used. The OpenSSL default provider
|
||||
performs similiar tests but relaxes the keysize restrictions for backwards
|
||||
performs similar tests but relaxes the keysize restrictions for backwards
|
||||
compatibility.
|
||||
|
||||
For RSA keys, L<EVP_PKEY_public_check_quick(3)> is the same as
|
||||
|
|
|
@ -137,7 +137,7 @@ The key object should have been previously generated, loaded or imported into
|
|||
the provider using the key management (OSSL_OP_KEYMGMT) operation (see
|
||||
provider-keymgmt(7)>.
|
||||
|
||||
OSSL_FUNC_kem_auth_encapsulate_init() is similiar to
|
||||
OSSL_FUNC_kem_auth_encapsulate_init() is similar to
|
||||
OSSL_FUNC_kem_encapsulate_init(), but also passes an additional authentication
|
||||
key I<provauthkey> which cannot be NULL.
|
||||
|
||||
|
@ -165,7 +165,7 @@ The key object should have been previously generated, loaded or imported into
|
|||
the provider using the key management (OSSL_OP_KEYMGMT) operation (see
|
||||
provider-keymgmt(7)>.
|
||||
|
||||
OSSL_FUNC_kem_auth_decapsulate_init() is similiar to
|
||||
OSSL_FUNC_kem_auth_decapsulate_init() is similar to
|
||||
OSSL_FUNC_kem_decapsulate_init(), but also passes an additional authentication
|
||||
key I<provauthkey> which cannot be NULL.
|
||||
|
||||
|
|
|
@ -239,7 +239,7 @@ x942_encode_otherinfo(size_t keylen,
|
|||
goto err;
|
||||
/*
|
||||
* Since we allocated the exact size required, the buffer should point to the
|
||||
* start of the alllocated buffer at this point.
|
||||
* start of the allocated buffer at this point.
|
||||
*/
|
||||
if (WPACKET_get_curr(&pkt) != der_buf)
|
||||
goto err;
|
||||
|
|
Loading…
Reference in New Issue