From: sapph2c Date: Tue, 30 Apr 2024 00:26:54 +0000 (-0400) Subject: Fixed typos in EVP_PKEY_decrypt.pod and RSA_public_encrypt.pod X-Git-Tag: openssl-3.3.1~58 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=85a97087a3beb9d4b9f7fbe14d96034d5d9dcee4;p=thirdparty%2Fopenssl.git Fixed typos in EVP_PKEY_decrypt.pod and RSA_public_encrypt.pod CLA: trivial Reviewed-by: Paul Dale Reviewed-by: Tomas Mraz (Merged from https://github.com/openssl/openssl/pull/24304) (cherry picked from commit f4601b6de709a89120c86ad825b70f65b332deed) --- diff --git a/doc/man3/EVP_PKEY_decrypt.pod b/doc/man3/EVP_PKEY_decrypt.pod index 1f5d06b5b84..903d933fb2c 100644 --- a/doc/man3/EVP_PKEY_decrypt.pod +++ b/doc/man3/EVP_PKEY_decrypt.pod @@ -68,7 +68,7 @@ of side-channel secure code from applications using OpenSSL. If OpenSSL is configured to use a provider that doesn't implement implicit rejection, the code still needs to handle the returned values using side-channel free code. -Side-channel free handling of the error stack can be peformed using +Side-channel free handling of the error stack can be performed using either a pair of unconditional L and L calls or by using the L call. diff --git a/doc/man3/RSA_public_encrypt.pod b/doc/man3/RSA_public_encrypt.pod index 5e0139b7115..47d198a24c1 100644 --- a/doc/man3/RSA_public_encrypt.pod +++ b/doc/man3/RSA_public_encrypt.pod @@ -102,7 +102,7 @@ a side-channel secure error handling. Applications that want to be secure against side-channel attacks with providers that don't implement implicit rejection, still need to handle the returned values using side-channel free code. -Side-channel free handling of the error stack can be peformed using +Side-channel free handling of the error stack can be performed using either a pair of unconditional L and L calls or by using the L call.