correct spelling errors detected by Debian lintian

CLA: trivial

Reviewed-by: Matthias St. Pierre <Matthias.St.Pierre@ncp-e.com>
Reviewed-by: Richard Levitte <levitte@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/5801)
This commit is contained in:
A. Schulze 2018-03-29 22:10:26 +02:00 committed by Richard Levitte
parent 7f6dfa19df
commit aa3b328541
5 changed files with 5 additions and 5 deletions

View file

@ -65,7 +65,7 @@
below. Similarly TLSv1.2 ciphersuites are not compatible with TLSv1.3. below. Similarly TLSv1.2 ciphersuites are not compatible with TLSv1.3.
In order to avoid issues where legacy TLSv1.2 ciphersuite configuration In order to avoid issues where legacy TLSv1.2 ciphersuite configuration
would otherwise inadvertently disable all TLSv1.3 ciphersuites the would otherwise inadvertently disable all TLSv1.3 ciphersuites the
configuraton has been separated out. See the ciphers man page or the configuration has been separated out. See the ciphers man page or the
SSL_CTX_set_ciphersuites() man page for more information. SSL_CTX_set_ciphersuites() man page for more information.
[Matt Caswell] [Matt Caswell]

View file

@ -370,7 +370,7 @@ int req_main(int argc, char **argv)
if (addext_bio) { if (addext_bio) {
if (verbose) if (verbose)
BIO_printf(bio_err, BIO_printf(bio_err,
"Using additional configuraton from command line\n"); "Using additional configuration from command line\n");
addext_conf = app_load_config_bio(addext_bio, NULL); addext_conf = app_load_config_bio(addext_bio, NULL);
} }
if (template != default_config_file && !app_load_modules(req_conf)) if (template != default_config_file && !app_load_modules(req_conf))

View file

@ -30,7 +30,7 @@ such as Linux that have both functions will normally not need to call these
functions as the OpenSSL library will do so automatically. functions as the OpenSSL library will do so automatically.
L<OPENSSL_init_crypto(3)> will register these functions with the appropriate L<OPENSSL_init_crypto(3)> will register these functions with the appropriate
hander, when the B<OPENSSL_INIT_ATFORK> flag is used. For other handler, when the B<OPENSSL_INIT_ATFORK> flag is used. For other
applications, these functions can be called directly. They should be used applications, these functions can be called directly. They should be used
according to the calling sequence described by the pthreads_atfork(3) according to the calling sequence described by the pthreads_atfork(3)
documentation, which is summarized here. OPENSSL_fork_prepare() should documentation, which is summarized here. OPENSSL_fork_prepare() should

View file

@ -42,7 +42,7 @@ B<dec_cb> is the application defined callback invoked after session ticket
decryption has been attempted and any session ticket application data is available. decryption has been attempted and any session ticket application data is available.
The application can call SSL_SESSION_get_ticket_appdata() at this time to retrieve The application can call SSL_SESSION_get_ticket_appdata() at this time to retrieve
the application data. The value of B<arg> is the same as that given to the application data. The value of B<arg> is the same as that given to
SSL_CTX_set_session_ticket_cb(). The B<retv> arguement is the result of the ticket SSL_CTX_set_session_ticket_cb(). The B<retv> argument is the result of the ticket
decryption. The B<keyname> and B<keyname_len> identify the key used to decrypt the decryption. The B<keyname> and B<keyname_len> identify the key used to decrypt the
session ticket. The B<dec_cb> callback is defined as type session ticket. The B<dec_cb> callback is defined as type
B<SSL_CTX_decrypt_session_ticket_fn>. B<SSL_CTX_decrypt_session_ticket_fn>.

View file

@ -106,7 +106,7 @@ B<x>, B<pkey> and B<chain> are set only if all were not previously set.
If B<override> is non-0, then the certificate, private key and chain certs If B<override> is non-0, then the certificate, private key and chain certs
are always set. If B<pkey> is NULL, then the public key of B<x> is used as are always set. If B<pkey> is NULL, then the public key of B<x> is used as
the private key. This is intended to be used with hardware (via the ENGINE the private key. This is intended to be used with hardware (via the ENGINE
inteface) that stores the private key securely, such that it cannot be interface) that stores the private key securely, such that it cannot be
accessed by OpenSSL. The reference count of the public key is incremented accessed by OpenSSL. The reference count of the public key is incremented
(twice if there is no private key); it is not copied nor duplicated. This (twice if there is no private key); it is not copied nor duplicated. This
allows all private key validations checks to succeed without an actual allows all private key validations checks to succeed without an actual