diff options
author | FdaSilvaYY <fdasilvayy@gmail.com> | 2021-02-20 23:39:30 +0100 |
---|---|---|
committer | Hugo Landau <hlandau@openssl.org> | 2023-01-24 11:03:20 +0000 |
commit | 91b968bc8e4125a1202e7955961f8e7dfcd17513 (patch) | |
tree | 35410b2a73a933dbbbeb2cc09fb154e1e1d96946 | |
parent | 4a6e5a11c72a4f3ec082cc065b44906409ad8fae (diff) | |
download | openssl-new-91b968bc8e4125a1202e7955961f8e7dfcd17513.tar.gz |
Typos fixing
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Paul Dale <pauli@openssl.org>
Reviewed-by: Hugo Landau <hlandau@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/20109)
-rw-r--r-- | apps/s_client.c | 6 | ||||
-rw-r--r-- | doc/man3/EVP_PKEY_decapsulate.pod | 2 | ||||
-rw-r--r-- | doc/man3/EVP_PKEY_encapsulate.pod | 2 | ||||
-rw-r--r-- | doc/man7/EVP_KDF-HMAC-DRBG.pod | 2 | ||||
-rw-r--r-- | doc/man7/EVP_PKEY-RSA.pod | 2 | ||||
-rw-r--r-- | doc/man7/provider-kem.pod | 4 | ||||
-rw-r--r-- | providers/implementations/kdfs/x942kdf.c | 2 |
7 files changed, 10 insertions, 10 deletions
diff --git a/apps/s_client.c b/apps/s_client.c index 5324f50fcc..9942893bd3 100644 --- a/apps/s_client.c +++ b/apps/s_client.c @@ -1963,7 +1963,7 @@ int s_client_main(int argc, char **argv) /* * In TLSv1.3 NewSessionTicket messages arrive after the handshake and can - * come at any time. Therefore we use a callback to write out the session + * come at any time. Therefore, we use a callback to write out the session * when we know about it. This approach works for < TLSv1.3 as well. */ SSL_CTX_set_session_cache_mode(ctx, SSL_SESS_CACHE_CLIENT @@ -2849,7 +2849,7 @@ int s_client_main(int argc, char **argv) #if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS) /* * Under Windows/DOS we make the assumption that we can always - * write to the tty: therefore if we need to write to the tty we + * write to the tty: therefore, if we need to write to the tty we * just fall through. Otherwise we timeout the select every * second and see if there are any keypresses. Note: this is a * hack, in a proper Windows application we wouldn't do this. @@ -3394,7 +3394,7 @@ static void print_stuff(BIO *bio, SSL *s, int full) /* * We also print the verify results when we dump session information, * but in TLSv1.3 we may not get that right away (or at all) depending - * on when we get a NewSessionTicket. Therefore we print it now as well. + * on when we get a NewSessionTicket. Therefore, we print it now as well. */ verify_result = SSL_get_verify_result(s); BIO_printf(bio, "Verify return code: %ld (%s)\n", verify_result, diff --git a/doc/man3/EVP_PKEY_decapsulate.pod b/doc/man3/EVP_PKEY_decapsulate.pod index 9ae87ddcec..27532b4abb 100644 --- a/doc/man3/EVP_PKEY_decapsulate.pod +++ b/doc/man3/EVP_PKEY_decapsulate.pod @@ -22,7 +22,7 @@ The EVP_PKEY_decapsulate_init() function initializes a private key algorithm context I<ctx> for a decapsulation operation and then sets the I<params> on the context in the same way as calling L<EVP_PKEY_CTX_set_params(3)>. -The EVP_PKEY_auth_decapsulate_init() function is similiar to +The EVP_PKEY_auth_decapsulate_init() function is similar to EVP_PKEY_decapsulate_init() but also passes an I<authpub> authentication public key that is used during decapsulation. diff --git a/doc/man3/EVP_PKEY_encapsulate.pod b/doc/man3/EVP_PKEY_encapsulate.pod index 1a6f998f5a..5da5a656b8 100644 --- a/doc/man3/EVP_PKEY_encapsulate.pod +++ b/doc/man3/EVP_PKEY_encapsulate.pod @@ -22,7 +22,7 @@ The EVP_PKEY_encapsulate_init() function initializes a public key algorithm context I<ctx> for an encapsulation operation and then sets the I<params> on the context in the same way as calling L<EVP_PKEY_CTX_set_params(3)>. -The EVP_PKEY_auth_encapsulate_init() function is similiar to +The EVP_PKEY_auth_encapsulate_init() function is similar to EVP_PKEY_encapsulate_init() but also passes an I<authpriv> authentication private key that is used during encapsulation. diff --git a/doc/man7/EVP_KDF-HMAC-DRBG.pod b/doc/man7/EVP_KDF-HMAC-DRBG.pod index eb240da333..63a2070e01 100644 --- a/doc/man7/EVP_KDF-HMAC-DRBG.pod +++ b/doc/man7/EVP_KDF-HMAC-DRBG.pod @@ -7,7 +7,7 @@ EVP_KDF-HMAC-DRBG =head1 DESCRIPTION -Support for a deterministic HMAC DRBG using the B<EVP_KDF> API. This is similiar +Support for a deterministic HMAC DRBG using the B<EVP_KDF> API. This is similar to L<EVP_RAND-HMAC-DRBG(7)>, but uses fixed values for its entropy and nonce values. This is used to generate deterministic nonce value required by ECDSA and DSA (as defined in RFC 6979). diff --git a/doc/man7/EVP_PKEY-RSA.pod b/doc/man7/EVP_PKEY-RSA.pod index 51103b8b29..3123813e9c 100644 --- a/doc/man7/EVP_PKEY-RSA.pod +++ b/doc/man7/EVP_PKEY-RSA.pod @@ -186,7 +186,7 @@ both return 1 unconditionally. For RSA keys, L<EVP_PKEY_public_check(3)> conforms to the SP800-56Br1 I<public key check> when the OpenSSL FIPS provider is used. The OpenSSL default provider -performs similiar tests but relaxes the keysize restrictions for backwards +performs similar tests but relaxes the keysize restrictions for backwards compatibility. For RSA keys, L<EVP_PKEY_public_check_quick(3)> is the same as diff --git a/doc/man7/provider-kem.pod b/doc/man7/provider-kem.pod index a76466ada9..fbbf5a5fee 100644 --- a/doc/man7/provider-kem.pod +++ b/doc/man7/provider-kem.pod @@ -137,7 +137,7 @@ The key object should have been previously generated, loaded or imported into the provider using the key management (OSSL_OP_KEYMGMT) operation (see provider-keymgmt(7)>. -OSSL_FUNC_kem_auth_encapsulate_init() is similiar to +OSSL_FUNC_kem_auth_encapsulate_init() is similar to OSSL_FUNC_kem_encapsulate_init(), but also passes an additional authentication key I<provauthkey> which cannot be NULL. @@ -165,7 +165,7 @@ The key object should have been previously generated, loaded or imported into the provider using the key management (OSSL_OP_KEYMGMT) operation (see provider-keymgmt(7)>. -OSSL_FUNC_kem_auth_decapsulate_init() is similiar to +OSSL_FUNC_kem_auth_decapsulate_init() is similar to OSSL_FUNC_kem_decapsulate_init(), but also passes an additional authentication key I<provauthkey> which cannot be NULL. diff --git a/providers/implementations/kdfs/x942kdf.c b/providers/implementations/kdfs/x942kdf.c index 78bd8d235e..d52c990e86 100644 --- a/providers/implementations/kdfs/x942kdf.c +++ b/providers/implementations/kdfs/x942kdf.c @@ -239,7 +239,7 @@ x942_encode_otherinfo(size_t keylen, goto err; /* * Since we allocated the exact size required, the buffer should point to the - * start of the alllocated buffer at this point. + * start of the allocated buffer at this point. */ if (WPACKET_get_curr(&pkt) != der_buf) goto err; |