mirror of https://github.com/openssl/openssl
Typos fixing
Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20109)
This commit is contained in:
parent
4a6e5a11c7
commit
91b968bc8e
|
@ -1963,7 +1963,7 @@ int s_client_main(int argc, char **argv)
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* In TLSv1.3 NewSessionTicket messages arrive after the handshake and can
|
* In TLSv1.3 NewSessionTicket messages arrive after the handshake and can
|
||||||
* come at any time. Therefore we use a callback to write out the session
|
* come at any time. Therefore, we use a callback to write out the session
|
||||||
* when we know about it. This approach works for < TLSv1.3 as well.
|
* when we know about it. This approach works for < TLSv1.3 as well.
|
||||||
*/
|
*/
|
||||||
SSL_CTX_set_session_cache_mode(ctx, SSL_SESS_CACHE_CLIENT
|
SSL_CTX_set_session_cache_mode(ctx, SSL_SESS_CACHE_CLIENT
|
||||||
|
@ -2849,7 +2849,7 @@ int s_client_main(int argc, char **argv)
|
||||||
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS)
|
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS)
|
||||||
/*
|
/*
|
||||||
* Under Windows/DOS we make the assumption that we can always
|
* Under Windows/DOS we make the assumption that we can always
|
||||||
* write to the tty: therefore if we need to write to the tty we
|
* write to the tty: therefore, if we need to write to the tty we
|
||||||
* just fall through. Otherwise we timeout the select every
|
* just fall through. Otherwise we timeout the select every
|
||||||
* second and see if there are any keypresses. Note: this is a
|
* second and see if there are any keypresses. Note: this is a
|
||||||
* hack, in a proper Windows application we wouldn't do this.
|
* hack, in a proper Windows application we wouldn't do this.
|
||||||
|
@ -3394,7 +3394,7 @@ static void print_stuff(BIO *bio, SSL *s, int full)
|
||||||
/*
|
/*
|
||||||
* We also print the verify results when we dump session information,
|
* We also print the verify results when we dump session information,
|
||||||
* but in TLSv1.3 we may not get that right away (or at all) depending
|
* but in TLSv1.3 we may not get that right away (or at all) depending
|
||||||
* on when we get a NewSessionTicket. Therefore we print it now as well.
|
* on when we get a NewSessionTicket. Therefore, we print it now as well.
|
||||||
*/
|
*/
|
||||||
verify_result = SSL_get_verify_result(s);
|
verify_result = SSL_get_verify_result(s);
|
||||||
BIO_printf(bio, "Verify return code: %ld (%s)\n", verify_result,
|
BIO_printf(bio, "Verify return code: %ld (%s)\n", verify_result,
|
||||||
|
|
|
@ -22,7 +22,7 @@ The EVP_PKEY_decapsulate_init() function initializes a private key algorithm
|
||||||
context I<ctx> for a decapsulation operation and then sets the I<params>
|
context I<ctx> for a decapsulation operation and then sets the I<params>
|
||||||
on the context in the same way as calling L<EVP_PKEY_CTX_set_params(3)>.
|
on the context in the same way as calling L<EVP_PKEY_CTX_set_params(3)>.
|
||||||
|
|
||||||
The EVP_PKEY_auth_decapsulate_init() function is similiar to
|
The EVP_PKEY_auth_decapsulate_init() function is similar to
|
||||||
EVP_PKEY_decapsulate_init() but also passes an I<authpub> authentication public
|
EVP_PKEY_decapsulate_init() but also passes an I<authpub> authentication public
|
||||||
key that is used during decapsulation.
|
key that is used during decapsulation.
|
||||||
|
|
||||||
|
|
|
@ -22,7 +22,7 @@ The EVP_PKEY_encapsulate_init() function initializes a public key algorithm
|
||||||
context I<ctx> for an encapsulation operation and then sets the I<params>
|
context I<ctx> for an encapsulation operation and then sets the I<params>
|
||||||
on the context in the same way as calling L<EVP_PKEY_CTX_set_params(3)>.
|
on the context in the same way as calling L<EVP_PKEY_CTX_set_params(3)>.
|
||||||
|
|
||||||
The EVP_PKEY_auth_encapsulate_init() function is similiar to
|
The EVP_PKEY_auth_encapsulate_init() function is similar to
|
||||||
EVP_PKEY_encapsulate_init() but also passes an I<authpriv> authentication private
|
EVP_PKEY_encapsulate_init() but also passes an I<authpriv> authentication private
|
||||||
key that is used during encapsulation.
|
key that is used during encapsulation.
|
||||||
|
|
||||||
|
|
|
@ -7,7 +7,7 @@ EVP_KDF-HMAC-DRBG
|
||||||
|
|
||||||
=head1 DESCRIPTION
|
=head1 DESCRIPTION
|
||||||
|
|
||||||
Support for a deterministic HMAC DRBG using the B<EVP_KDF> API. This is similiar
|
Support for a deterministic HMAC DRBG using the B<EVP_KDF> API. This is similar
|
||||||
to L<EVP_RAND-HMAC-DRBG(7)>, but uses fixed values for its entropy and nonce
|
to L<EVP_RAND-HMAC-DRBG(7)>, but uses fixed values for its entropy and nonce
|
||||||
values. This is used to generate deterministic nonce value required by ECDSA
|
values. This is used to generate deterministic nonce value required by ECDSA
|
||||||
and DSA (as defined in RFC 6979).
|
and DSA (as defined in RFC 6979).
|
||||||
|
|
|
@ -186,7 +186,7 @@ both return 1 unconditionally.
|
||||||
|
|
||||||
For RSA keys, L<EVP_PKEY_public_check(3)> conforms to the SP800-56Br1 I<public key
|
For RSA keys, L<EVP_PKEY_public_check(3)> conforms to the SP800-56Br1 I<public key
|
||||||
check> when the OpenSSL FIPS provider is used. The OpenSSL default provider
|
check> when the OpenSSL FIPS provider is used. The OpenSSL default provider
|
||||||
performs similiar tests but relaxes the keysize restrictions for backwards
|
performs similar tests but relaxes the keysize restrictions for backwards
|
||||||
compatibility.
|
compatibility.
|
||||||
|
|
||||||
For RSA keys, L<EVP_PKEY_public_check_quick(3)> is the same as
|
For RSA keys, L<EVP_PKEY_public_check_quick(3)> is the same as
|
||||||
|
|
|
@ -137,7 +137,7 @@ The key object should have been previously generated, loaded or imported into
|
||||||
the provider using the key management (OSSL_OP_KEYMGMT) operation (see
|
the provider using the key management (OSSL_OP_KEYMGMT) operation (see
|
||||||
provider-keymgmt(7)>.
|
provider-keymgmt(7)>.
|
||||||
|
|
||||||
OSSL_FUNC_kem_auth_encapsulate_init() is similiar to
|
OSSL_FUNC_kem_auth_encapsulate_init() is similar to
|
||||||
OSSL_FUNC_kem_encapsulate_init(), but also passes an additional authentication
|
OSSL_FUNC_kem_encapsulate_init(), but also passes an additional authentication
|
||||||
key I<provauthkey> which cannot be NULL.
|
key I<provauthkey> which cannot be NULL.
|
||||||
|
|
||||||
|
@ -165,7 +165,7 @@ The key object should have been previously generated, loaded or imported into
|
||||||
the provider using the key management (OSSL_OP_KEYMGMT) operation (see
|
the provider using the key management (OSSL_OP_KEYMGMT) operation (see
|
||||||
provider-keymgmt(7)>.
|
provider-keymgmt(7)>.
|
||||||
|
|
||||||
OSSL_FUNC_kem_auth_decapsulate_init() is similiar to
|
OSSL_FUNC_kem_auth_decapsulate_init() is similar to
|
||||||
OSSL_FUNC_kem_decapsulate_init(), but also passes an additional authentication
|
OSSL_FUNC_kem_decapsulate_init(), but also passes an additional authentication
|
||||||
key I<provauthkey> which cannot be NULL.
|
key I<provauthkey> which cannot be NULL.
|
||||||
|
|
||||||
|
|
|
@ -239,7 +239,7 @@ x942_encode_otherinfo(size_t keylen,
|
||||||
goto err;
|
goto err;
|
||||||
/*
|
/*
|
||||||
* Since we allocated the exact size required, the buffer should point to the
|
* Since we allocated the exact size required, the buffer should point to the
|
||||||
* start of the alllocated buffer at this point.
|
* start of the allocated buffer at this point.
|
||||||
*/
|
*/
|
||||||
if (WPACKET_get_curr(&pkt) != der_buf)
|
if (WPACKET_get_curr(&pkt) != der_buf)
|
||||||
goto err;
|
goto err;
|
||||||
|
|
Loading…
Reference in New Issue