From 1f238535a5a4bc44f05e8e8dc0a6a46c906c463d Mon Sep 17 00:00:00 2001 From: "Dr. David von Oheimb" Date: Mon, 14 Apr 2025 10:48:10 +0200 Subject: [PATCH] provider-signature.pod: fix typos (digeset -> digest) Reviewed-by: Tomas Mraz Reviewed-by: Tom Cosgrove (Merged from https://github.com/openssl/openssl/pull/27372) (cherry picked from commit 7d14d1c46a6144c5f8eafc8d07b750324e1275be) --- doc/man7/provider-signature.pod | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/doc/man7/provider-signature.pod b/doc/man7/provider-signature.pod index fe6307f1ec1..b10bb1b1c9a 100644 --- a/doc/man7/provider-signature.pod +++ b/doc/man7/provider-signature.pod @@ -284,7 +284,7 @@ should be written to I<*siglen>. If I is NULL then the maximum length of the signature should be written to I<*siglen>. OSSL_FUNC_signature_digest_sign() implements a "one shot" digest sign operation -previously started through OSSL_FUNC_signature_digeset_sign_init(). A previously +previously started through OSSL_FUNC_signature_digest_sign_init(). A previously initialised signature context is passed in the I parameter. The data to be signed is in I which should be I bytes long. Unless I is NULL, the signature should be written to the location pointed to by the I @@ -294,7 +294,7 @@ length of the signature should be written to I<*siglen>. =head2 Digest Verify Functions -OSSL_FUNC_signature_digeset_verify_init() initialises a context for verifying given a +OSSL_FUNC_signature_digest_verify_init() initialises a context for verifying given a provider side verification context in the I parameter, and a pointer to a provider key object in the I parameter. The I, if not NULL, should be set on the context in a manner similar to @@ -318,7 +318,7 @@ verification context is passed in the I parameter. The signature to be verified is in I which is I bytes long. OSSL_FUNC_signature_digest_verify() implements a "one shot" digest verify operation -previously started through OSSL_FUNC_signature_digeset_verify_init(). A previously +previously started through OSSL_FUNC_signature_digest_verify_init(). A previously initialised verification context is passed in the I parameter. The data to be verified is in I which should be I bytes long. The signature to be verified is in I which is I bytes long. -- 2.47.2