Skip to content

Commit

Permalink
Fix typos found by codespell
Browse files Browse the repository at this point in the history
Only modify doc/man* in the openssl-3.0 branch.

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Paul Dale <pauli@openssl.org>
(Merged from #21464)
  • Loading branch information
DimitriPapadopoulos authored and paulidale committed Jul 18, 2023
1 parent ca11458 commit 698cb0d
Show file tree
Hide file tree
Showing 3 changed files with 3 additions and 3 deletions.
2 changes: 1 addition & 1 deletion doc/man3/ASYNC_WAIT_CTX_new.pod
Original file line number Diff line number Diff line change
Expand Up @@ -83,7 +83,7 @@ will be populated with the list of added and deleted fds respectively. Similarly
to ASYNC_WAIT_CTX_get_all_fds() either of these can be NULL, but if they are not
NULL then the caller is responsible for ensuring sufficient memory is allocated.

Implementors of async aware code (e.g. engines) are encouraged to return a
Implementers of async aware code (e.g. engines) are encouraged to return a
stable fd for the lifetime of the B<ASYNC_WAIT_CTX> in order to reduce the
"churn" of regularly changing fds - although no guarantees of this are provided
to applications.
Expand Down
2 changes: 1 addition & 1 deletion doc/man3/OSSL_SELF_TEST_new.pod
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ OSSL_SELF_TEST_onend - functionality to trigger a callback during a self test

=head1 DESCRIPTION

These methods are intended for use by provider implementors, to display
These methods are intended for use by provider implementers, to display
diagnostic information during self testing.

OSSL_SELF_TEST_new() allocates an opaque B<OSSL_SELF_TEST> object that has a
Expand Down
2 changes: 1 addition & 1 deletion doc/man3/SSL_CTX_new.pod
Original file line number Diff line number Diff line change
Expand Up @@ -100,7 +100,7 @@ provide serialization of access for these cases.

=head1 NOTES

On session estabilishment, by default, no peer credentials verification is done.
On session establishment, by default, no peer credentials verification is done.
This must be explicitly requested, typically using L<SSL_CTX_set_verify(3)>.
For verifying peer certificates many options can be set using various functions
such as L<SSL_CTX_load_verify_locations(3)> and L<SSL_CTX_set1_param(3)>.
Expand Down

0 comments on commit 698cb0d

Please sign in to comment.