/*
* In TLSv1.3 NewSessionTicket messages arrive after the handshake and can
- * come at any time. Therefore we use a callback to write out the session
+ * come at any time. Therefore, we use a callback to write out the session
* when we know about it. This approach works for < TLSv1.3 as well.
*/
SSL_CTX_set_session_cache_mode(ctx, SSL_SESS_CACHE_CLIENT
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS)
/*
* Under Windows/DOS we make the assumption that we can always
- * write to the tty: therefore if we need to write to the tty we
+ * write to the tty: therefore, if we need to write to the tty we
* just fall through. Otherwise we timeout the select every
* second and see if there are any keypresses. Note: this is a
* hack, in a proper Windows application we wouldn't do this.
/*
* We also print the verify results when we dump session information,
* but in TLSv1.3 we may not get that right away (or at all) depending
- * on when we get a NewSessionTicket. Therefore we print it now as well.
+ * on when we get a NewSessionTicket. Therefore, we print it now as well.
*/
verify_result = SSL_get_verify_result(s);
BIO_printf(bio, "Verify return code: %ld (%s)\n", verify_result,
context I<ctx> for a decapsulation operation and then sets the I<params>
on the context in the same way as calling L<EVP_PKEY_CTX_set_params(3)>.
-The EVP_PKEY_auth_decapsulate_init() function is similiar to
+The EVP_PKEY_auth_decapsulate_init() function is similar to
EVP_PKEY_decapsulate_init() but also passes an I<authpub> authentication public
key that is used during decapsulation.
context I<ctx> for an encapsulation operation and then sets the I<params>
on the context in the same way as calling L<EVP_PKEY_CTX_set_params(3)>.
-The EVP_PKEY_auth_encapsulate_init() function is similiar to
+The EVP_PKEY_auth_encapsulate_init() function is similar to
EVP_PKEY_encapsulate_init() but also passes an I<authpriv> authentication private
key that is used during encapsulation.
=head1 DESCRIPTION
-Support for a deterministic HMAC DRBG using the B<EVP_KDF> API. This is similiar
+Support for a deterministic HMAC DRBG using the B<EVP_KDF> API. This is similar
to L<EVP_RAND-HMAC-DRBG(7)>, but uses fixed values for its entropy and nonce
values. This is used to generate deterministic nonce value required by ECDSA
and DSA (as defined in RFC 6979).
For RSA keys, L<EVP_PKEY_public_check(3)> conforms to the SP800-56Br1 I<public key
check> when the OpenSSL FIPS provider is used. The OpenSSL default provider
-performs similiar tests but relaxes the keysize restrictions for backwards
+performs similar tests but relaxes the keysize restrictions for backwards
compatibility.
For RSA keys, L<EVP_PKEY_public_check_quick(3)> is the same as
the provider using the key management (OSSL_OP_KEYMGMT) operation (see
provider-keymgmt(7)>.
-OSSL_FUNC_kem_auth_encapsulate_init() is similiar to
+OSSL_FUNC_kem_auth_encapsulate_init() is similar to
OSSL_FUNC_kem_encapsulate_init(), but also passes an additional authentication
key I<provauthkey> which cannot be NULL.
the provider using the key management (OSSL_OP_KEYMGMT) operation (see
provider-keymgmt(7)>.
-OSSL_FUNC_kem_auth_decapsulate_init() is similiar to
+OSSL_FUNC_kem_auth_decapsulate_init() is similar to
OSSL_FUNC_kem_decapsulate_init(), but also passes an additional authentication
key I<provauthkey> which cannot be NULL.
goto err;
/*
* Since we allocated the exact size required, the buffer should point to the
- * start of the alllocated buffer at this point.
+ * start of the allocated buffer at this point.
*/
if (WPACKET_get_curr(&pkt) != der_buf)
goto err;