diff options
author | Veres Lajos <vlajos@gmail.com> | 2013-06-13 00:22:32 +0100 |
---|---|---|
committer | Ben Laurie <ben@links.org> | 2013-09-05 21:39:42 +0100 |
commit | 478b50cf67d6a91fdcd584cff57c58b7e863055d (patch) | |
tree | 2503e85a768e8bde5edace29c80222b47ea1f0ea /doc/crypto | |
parent | d2625fd65772ce3de2563e648decd2d1074fd873 (diff) | |
download | openssl-478b50cf67d6a91fdcd584cff57c58b7e863055d.zip openssl-478b50cf67d6a91fdcd584cff57c58b7e863055d.tar.gz openssl-478b50cf67d6a91fdcd584cff57c58b7e863055d.tar.bz2 |
misspellings fixes by https://github.com/vlajos/misspell_fixer
Diffstat (limited to 'doc/crypto')
-rw-r--r-- | doc/crypto/ASN1_generate_nconf.pod | 2 | ||||
-rw-r--r-- | doc/crypto/BN_BLINDING_new.pod | 2 | ||||
-rw-r--r-- | doc/crypto/EVP_DigestInit.pod | 2 | ||||
-rw-r--r-- | doc/crypto/EVP_PKEY_cmp.pod | 4 | ||||
-rw-r--r-- | doc/crypto/X509_NAME_add_entry_by_txt.pod | 2 | ||||
-rw-r--r-- | doc/crypto/X509_STORE_CTX_get_error.pod | 8 | ||||
-rw-r--r-- | doc/crypto/rand.pod | 2 |
7 files changed, 11 insertions, 11 deletions
diff --git a/doc/crypto/ASN1_generate_nconf.pod b/doc/crypto/ASN1_generate_nconf.pod index 542fd15..f21f189 100644 --- a/doc/crypto/ASN1_generate_nconf.pod +++ b/doc/crypto/ASN1_generate_nconf.pod @@ -61,7 +61,7 @@ Encode the B<NULL> type, the B<value> string must not be present. =item B<INTEGER>, B<INT> Encodes an ASN1 B<INTEGER> type. The B<value> string represents -the value of the integer, it can be preceeded by a minus sign and +the value of the integer, it can be preceded by a minus sign and is normally interpreted as a decimal value unless the prefix B<0x> is included. diff --git a/doc/crypto/BN_BLINDING_new.pod b/doc/crypto/BN_BLINDING_new.pod index b96c56b..1fa7eb0 100644 --- a/doc/crypto/BN_BLINDING_new.pod +++ b/doc/crypto/BN_BLINDING_new.pod @@ -84,7 +84,7 @@ or NULL in case of an error. BN_BLINDING_update(), BN_BLINDING_convert(), BN_BLINDING_invert(), BN_BLINDING_convert_ex() and BN_BLINDING_invert_ex() return 1 on -success and 0 if an error occured. +success and 0 if an error occurred. BN_BLINDING_thread_id() returns a pointer to the thread id object within a B<BN_BLINDING> object. diff --git a/doc/crypto/EVP_DigestInit.pod b/doc/crypto/EVP_DigestInit.pod index 1ef69ec..5d2970e 100644 --- a/doc/crypto/EVP_DigestInit.pod +++ b/doc/crypto/EVP_DigestInit.pod @@ -267,7 +267,7 @@ and EVP_DigestFinal_ex() were added in OpenSSL 0.9.7. EVP_md_null(), EVP_md2(), EVP_md5(), EVP_sha(), EVP_sha1(), EVP_dss(), EVP_dss1(), EVP_mdc2() and EVP_ripemd160() were -changed to return truely const EVP_MD * in OpenSSL 0.9.7. +changed to return truly const EVP_MD * in OpenSSL 0.9.7. The link between digests and signing algorithms was fixed in OpenSSL 1.0 and later, so now EVP_sha1() can be used with RSA and DSA, there is no need to diff --git a/doc/crypto/EVP_PKEY_cmp.pod b/doc/crypto/EVP_PKEY_cmp.pod index 4f8185e..0ff027c 100644 --- a/doc/crypto/EVP_PKEY_cmp.pod +++ b/doc/crypto/EVP_PKEY_cmp.pod @@ -23,10 +23,10 @@ doesn't use parameters. The function EVP_PKEY_copy_parameters() copies the parameters from key B<from> to key B<to>. -The funcion EVP_PKEY_cmp_parameters() compares the parameters of keys +The function EVP_PKEY_cmp_parameters() compares the parameters of keys B<a> and B<b>. -The funcion EVP_PKEY_cmp() compares the public key components and paramters +The function EVP_PKEY_cmp() compares the public key components and paramters (if present) of keys B<a> and B<b>. =head1 NOTES diff --git a/doc/crypto/X509_NAME_add_entry_by_txt.pod b/doc/crypto/X509_NAME_add_entry_by_txt.pod index 1afd008..9a59033 100644 --- a/doc/crypto/X509_NAME_add_entry_by_txt.pod +++ b/doc/crypto/X509_NAME_add_entry_by_txt.pod @@ -44,7 +44,7 @@ B<loc>. The deleted entry is returned and must be freed up. =head1 NOTES The use of string types such as B<MBSTRING_ASC> or B<MBSTRING_UTF8> -is strongly recommened for the B<type> parameter. This allows the +is strongly recommend for the B<type> parameter. This allows the internal code to correctly determine the type of the field and to apply length checks according to the relevant standards. This is done using ASN1_STRING_set_by_NID(). diff --git a/doc/crypto/X509_STORE_CTX_get_error.pod b/doc/crypto/X509_STORE_CTX_get_error.pod index 60e8332..be00ff1 100644 --- a/doc/crypto/X509_STORE_CTX_get_error.pod +++ b/doc/crypto/X509_STORE_CTX_get_error.pod @@ -32,7 +32,7 @@ checks. X509_STORE_CTX_get_error_depth() returns the B<depth> of the error. This is a non-negative integer representing where in the certificate chain the error -occurred. If it is zero it occured in the end entity certificate, one if +occurred. If it is zero it occurred in the end entity certificate, one if it is the certificate which signed the end entity certificate and so on. X509_STORE_CTX_get_current_cert() returns the certificate in B<ctx> which @@ -246,11 +246,11 @@ Some feature of a certificate extension is not supported. Unused. =item B<X509_V_ERR_PERMITTED_VIOLATION: permitted subtree violation> -A name constraint violation occured in the permitted subtrees. +A name constraint violation occurred in the permitted subtrees. =item B<X509_V_ERR_EXCLUDED_VIOLATION: excluded subtree violation> -A name constraint violation occured in the excluded subtrees. +A name constraint violation occurred in the excluded subtrees. =item B<X509_V_ERR_SUBTREE_MINMAX: name constraints minimum and maximum not supported> @@ -270,7 +270,7 @@ a garbage extension or some new feature not currently supported. =item B<X509_V_ERR_CRL_PATH_VALIDATION_ERROR: CRL path validation error> -An error occured when attempting to verify the CRL path. This error can only +An error occurred when attempting to verify the CRL path. This error can only happen if extended CRL checking is enabled. =item B<X509_V_ERR_APPLICATION_VERIFICATION: application verification failure> diff --git a/doc/crypto/rand.pod b/doc/crypto/rand.pod index 1c068c8..922b8c1 100644 --- a/doc/crypto/rand.pod +++ b/doc/crypto/rand.pod @@ -39,7 +39,7 @@ Since the introduction of the ENGINE API, the recommended way of controlling default implementations is by using the ENGINE API functions. The default B<RAND_METHOD>, as set by RAND_set_rand_method() and returned by RAND_get_rand_method(), is only used if no ENGINE has been set as the default -"rand" implementation. Hence, these two functions are no longer the recommened +"rand" implementation. Hence, these two functions are no longer the recommend way to control defaults. If an alternative B<RAND_METHOD> implementation is being used (either set |