From db34ae5f14e40e383a06b5067ee6d57de52e924b Mon Sep 17 00:00:00 2001 From: Jan Luebbe Date: Fri, 9 May 2025 09:56:26 +0200 Subject: [PATCH] Fix some typos in the man pages Reviewed-by: Paul Yang Reviewed-by: Tomas Mraz (Merged from https://github.com/openssl/openssl/pull/27590) (cherry picked from commit 8fd0d230fdf80f7b6a3ee6c1197923600ce45c6a) --- doc/man3/CMS_get0_SignerInfos.pod | 2 +- doc/man3/EVP_PKEY_encapsulate.pod | 4 ++-- doc/man3/EVP_PKEY_new.pod | 4 ++-- doc/man3/EVP_PKEY_sign.pod | 2 +- doc/man3/OSSL_CRMF_MSG_get0_tmpl.pod | 2 +- doc/man3/SSL_set_quic_tls_cbs.pod | 2 +- doc/man3/X509_STORE_CTX_new.pod | 2 +- doc/man3/X509_check_purpose.pod | 2 +- 8 files changed, 10 insertions(+), 10 deletions(-) diff --git a/doc/man3/CMS_get0_SignerInfos.pod b/doc/man3/CMS_get0_SignerInfos.pod index 385726ced35..29fb683c09b 100644 --- a/doc/man3/CMS_get0_SignerInfos.pod +++ b/doc/man3/CMS_get0_SignerInfos.pod @@ -38,7 +38,7 @@ CMS_SignerInfo_cert_cmp() compares the certificate B against the signer identifier B. It returns zero if the comparison is successful and non zero if not. -CMS_SignerInfo_set1_signer_cert() sets the signers certificate of B to +CMS_SignerInfo_set1_signer_cert() sets the signer's certificate of B to B. =head1 NOTES diff --git a/doc/man3/EVP_PKEY_encapsulate.pod b/doc/man3/EVP_PKEY_encapsulate.pod index a82eaded592..e37599c4c41 100644 --- a/doc/man3/EVP_PKEY_encapsulate.pod +++ b/doc/man3/EVP_PKEY_encapsulate.pod @@ -30,14 +30,14 @@ key that is used during encapsulation. The EVP_PKEY_encapsulate() function performs a public key encapsulation operation using I. -The shared secret writen to I can be used as an input for key +The shared secret written to I can be used as an input for key derivation, typically for various symmetric algorithms. Its size is written to I, which must be initialised to the size of the provided buffer. The ciphertext written to I is an encapsulated form, which is expected to be only usable by the holder of the private key corresponding -to wthe public key associated with I. +to the public key associated with I. This ciphertext is then communicated to the private-key holder, who can use L to securely recover the same shared secret. diff --git a/doc/man3/EVP_PKEY_new.pod b/doc/man3/EVP_PKEY_new.pod index eccc21aac63..72d129deff2 100644 --- a/doc/man3/EVP_PKEY_new.pod +++ b/doc/man3/EVP_PKEY_new.pod @@ -174,7 +174,7 @@ C, B, B and B -keys, which don't have legacy numeric I assigments, but their raw form is +keys, which don't have legacy numeric I assignments, but their raw form is nevertheless available. @@ -198,7 +198,7 @@ C, B, B and B -keys, which don't have legacy numeric I assigments, but their raw form is +keys, which don't have legacy numeric I assignments, but their raw form is nevertheless available. EVP_PKEY_new_CMAC_key() works in the same way as EVP_PKEY_new_raw_private_key() diff --git a/doc/man3/EVP_PKEY_sign.pod b/doc/man3/EVP_PKEY_sign.pod index b88a9893f52..d258226804e 100644 --- a/doc/man3/EVP_PKEY_sign.pod +++ b/doc/man3/EVP_PKEY_sign.pod @@ -40,7 +40,7 @@ signing a pre-computed message digest using the algorithm given by I and the key given through L or L. A context I without a pre-loaded key cannot be used with this function. This function provides almost the same functionality as EVP_PKEY_sign_init_ex(), -but is uniquely intended to be used with a pre-computed messsage digest, and +but is uniquely intended to be used with a pre-computed message digest, and allows pre-determining the exact conditions for that message digest, if a composite signature algorithm (such as RSA-SHA256) was fetched. Following a call to this function, setting parameters that modifies the digest diff --git a/doc/man3/OSSL_CRMF_MSG_get0_tmpl.pod b/doc/man3/OSSL_CRMF_MSG_get0_tmpl.pod index 6c095c0ee0e..0f700c118f5 100644 --- a/doc/man3/OSSL_CRMF_MSG_get0_tmpl.pod +++ b/doc/man3/OSSL_CRMF_MSG_get0_tmpl.pod @@ -109,7 +109,7 @@ On success, the function verifies the decrypted data as signed data, using the trust store I and any untrusted certificates in I. Doing so, it checks for the purpose "CMP Key Generation Authority" (cmKGA). -OSSL_CRMF_ENCRYPTEDKEY_init_envdata() returns I, intialized with +OSSL_CRMF_ENCRYPTEDKEY_init_envdata() returns I, initialized with the enveloped data I. OSSL_CRMF_ENCRYPTEDVALUE_decrypt() decrypts the encrypted value in the given diff --git a/doc/man3/SSL_set_quic_tls_cbs.pod b/doc/man3/SSL_set_quic_tls_cbs.pod index 618cc29bc74..75d217bdeaa 100644 --- a/doc/man3/SSL_set_quic_tls_cbs.pod +++ b/doc/man3/SSL_set_quic_tls_cbs.pod @@ -110,7 +110,7 @@ ever be read by OpenSSL. The OSSL_FUNC_SSL_QUIC_TLS_yield_secret_fn callback (function id B) is called when a new secret has been -established. The I argument identies the TLS protection level and +established. The I argument identities the TLS protection level and will be one of B, B, B or B. The I will either be diff --git a/doc/man3/X509_STORE_CTX_new.pod b/doc/man3/X509_STORE_CTX_new.pod index c219cee9d62..4810d48a01a 100644 --- a/doc/man3/X509_STORE_CTX_new.pod +++ b/doc/man3/X509_STORE_CTX_new.pod @@ -85,7 +85,7 @@ If I is NULL nothing is done. X509_STORE_CTX_init() sets up I for a subsequent verification operation. X509_STORE_CTX_init() initializes the internal state and resources of the -given I. Among others, it sets the verification parameters associcated +given I. Among others, it sets the verification parameters associated with the method name C, which includes the C purpose, and takes over callback function pointers from I (unless NULL). It must be called before each call to L or diff --git a/doc/man3/X509_check_purpose.pod b/doc/man3/X509_check_purpose.pod index 4e152be8fa5..59440dc013d 100644 --- a/doc/man3/X509_check_purpose.pod +++ b/doc/man3/X509_check_purpose.pod @@ -80,7 +80,7 @@ Unless the id stays the same for an existing entry, I must be fresh, which can be achieved by using the result of X509_PURPOSE_get_unused_id(). The function also sets in the entry the trust id I, the given I, the purpose (long) name I, the short name I, the purpose checking -funktion I of type B, +function I of type B, and its user data I which may be retrieved via the B pointer. X509_PURPOSE_cleanup() removes all purposes that are not pre-defined. -- 2.47.3