Browse Source

Typos fixing

Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Paul Dale <pauli@openssl.org>
Reviewed-by: Hugo Landau <hlandau@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/20109)
FdaSilvaYY 3 years ago
parent
commit
91b968bc8e

+ 3 - 3
apps/s_client.c

@@ -1963,7 +1963,7 @@ int s_client_main(int argc, char **argv)
 
     /*
      * In TLSv1.3 NewSessionTicket messages arrive after the handshake and can
-     * come at any time. Therefore we use a callback to write out the session
+     * come at any time. Therefore, we use a callback to write out the session
      * when we know about it. This approach works for < TLSv1.3 as well.
      */
     SSL_CTX_set_session_cache_mode(ctx, SSL_SESS_CACHE_CLIENT
@@ -2849,7 +2849,7 @@ int s_client_main(int argc, char **argv)
 #if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS)
             /*
              * Under Windows/DOS we make the assumption that we can always
-             * write to the tty: therefore if we need to write to the tty we
+             * write to the tty: therefore, if we need to write to the tty we
              * just fall through. Otherwise we timeout the select every
              * second and see if there are any keypresses. Note: this is a
              * hack, in a proper Windows application we wouldn't do this.
@@ -3394,7 +3394,7 @@ static void print_stuff(BIO *bio, SSL *s, int full)
         /*
          * We also print the verify results when we dump session information,
          * but in TLSv1.3 we may not get that right away (or at all) depending
-         * on when we get a NewSessionTicket. Therefore we print it now as well.
+         * on when we get a NewSessionTicket. Therefore, we print it now as well.
          */
         verify_result = SSL_get_verify_result(s);
         BIO_printf(bio, "Verify return code: %ld (%s)\n", verify_result,

+ 1 - 1
doc/man3/EVP_PKEY_decapsulate.pod

@@ -22,7 +22,7 @@ The EVP_PKEY_decapsulate_init() function initializes a private key algorithm
 context I<ctx> for a decapsulation operation and then sets the I<params>
 on the context in the same way as calling L<EVP_PKEY_CTX_set_params(3)>.
 
-The EVP_PKEY_auth_decapsulate_init() function is similiar to
+The EVP_PKEY_auth_decapsulate_init() function is similar to
 EVP_PKEY_decapsulate_init() but also passes an I<authpub> authentication public
 key that is used during decapsulation.
 

+ 1 - 1
doc/man3/EVP_PKEY_encapsulate.pod

@@ -22,7 +22,7 @@ The EVP_PKEY_encapsulate_init() function initializes a public key algorithm
 context I<ctx> for an encapsulation operation and then sets the I<params>
 on the context in the same way as calling L<EVP_PKEY_CTX_set_params(3)>.
 
-The EVP_PKEY_auth_encapsulate_init() function is similiar to
+The EVP_PKEY_auth_encapsulate_init() function is similar to
 EVP_PKEY_encapsulate_init() but also passes an I<authpriv> authentication private
 key that is used during encapsulation.
 

+ 1 - 1
doc/man7/EVP_KDF-HMAC-DRBG.pod

@@ -7,7 +7,7 @@ EVP_KDF-HMAC-DRBG
 
 =head1 DESCRIPTION
 
-Support for a deterministic HMAC DRBG using the B<EVP_KDF> API. This is similiar
+Support for a deterministic HMAC DRBG using the B<EVP_KDF> API. This is similar
 to L<EVP_RAND-HMAC-DRBG(7)>, but uses fixed values for its entropy and nonce
 values. This is used to generate deterministic nonce value required by ECDSA
 and DSA (as defined in RFC 6979).

+ 1 - 1
doc/man7/EVP_PKEY-RSA.pod

@@ -186,7 +186,7 @@ both return 1 unconditionally.
 
 For RSA keys, L<EVP_PKEY_public_check(3)> conforms to the SP800-56Br1 I<public key
 check> when the OpenSSL FIPS provider is used. The OpenSSL default provider
-performs similiar tests but relaxes the keysize restrictions for backwards
+performs similar tests but relaxes the keysize restrictions for backwards
 compatibility.
 
 For RSA keys, L<EVP_PKEY_public_check_quick(3)> is the same as

+ 2 - 2
doc/man7/provider-kem.pod

@@ -137,7 +137,7 @@ The key object should have been previously generated, loaded or imported into
 the provider using the key management (OSSL_OP_KEYMGMT) operation (see
 provider-keymgmt(7)>.
 
-OSSL_FUNC_kem_auth_encapsulate_init() is similiar to
+OSSL_FUNC_kem_auth_encapsulate_init() is similar to
 OSSL_FUNC_kem_encapsulate_init(), but also passes an additional authentication
 key I<provauthkey> which cannot be NULL.
 
@@ -165,7 +165,7 @@ The key object should have been previously generated, loaded or imported into
 the provider using the key management (OSSL_OP_KEYMGMT) operation (see
 provider-keymgmt(7)>.
 
-OSSL_FUNC_kem_auth_decapsulate_init() is similiar to
+OSSL_FUNC_kem_auth_decapsulate_init() is similar to
 OSSL_FUNC_kem_decapsulate_init(), but also passes an additional authentication
 key I<provauthkey> which cannot be NULL.
 

+ 1 - 1
providers/implementations/kdfs/x942kdf.c

@@ -239,7 +239,7 @@ x942_encode_otherinfo(size_t keylen,
         goto err;
     /*
      * Since we allocated the exact size required, the buffer should point to the
-     * start of the alllocated buffer at this point.
+     * start of the allocated buffer at this point.
      */
     if (WPACKET_get_curr(&pkt) != der_buf)
         goto err;