From: FdaSilvaYY Date: Tue, 7 Jun 2016 21:03:15 +0000 (+0200) Subject: Fix some typos in pod files X-Git-Tag: OpenSSL_1_1_0-pre6~515 X-Git-Url: https://git.openssl.org/?p=openssl.git;a=commitdiff_plain;h=77a795e4b0ac541b305561811bab355f5bb316fd Fix some typos in pod files Reviewed-by: Matt Caswell Reviewed-by: Rich Salz (Merged from https://github.com/openssl/openssl/pull/1189) --- diff --git a/doc/apps/asn1parse.pod b/doc/apps/asn1parse.pod index 6679108cfa..10a5aba51d 100644 --- a/doc/apps/asn1parse.pod +++ b/doc/apps/asn1parse.pod @@ -125,7 +125,7 @@ The output will typically contain lines like this: ..... -This example is part of a self signed certificate. Each line starts with the +This example is part of a self-signed certificate. Each line starts with the offset in decimal. B specifies the current depth. The depth is increased within the scope of any SET or SEQUENCE. B gives the header length (tag and length octets) of the current type. B gives the length of diff --git a/doc/apps/ca.pod b/doc/apps/ca.pod index 8dfac0122e..9bf1239190 100644 --- a/doc/apps/ca.pod +++ b/doc/apps/ca.pod @@ -89,7 +89,7 @@ signed by the CA. =item B<-ss_cert filename> -a single self signed certificate to be signed by the CA. +a single self-signed certificate to be signed by the CA. =item B<-spkac filename> @@ -643,11 +643,11 @@ CRL: however there is no option to do this. V2 CRL features like delta CRLs are not currently supported. Although several requests can be input and handled at once it is only -possible to include one SPKAC or self signed certificate. +possible to include one SPKAC or self-signed certificate. =head1 BUGS -The use of an in memory text database can cause problems when large +The use of an in-memory text database can cause problems when large numbers of certificates are present because, as the name implies the database has to be kept in memory. diff --git a/doc/apps/ciphers.pod b/doc/apps/ciphers.pod index 121912bce6..c392077653 100644 --- a/doc/apps/ciphers.pod +++ b/doc/apps/ciphers.pod @@ -246,7 +246,7 @@ Cipher suites using authenticated ephemeral ECDH key agreement. =item B -Anonymous Elliptic Curve Diffie Hellman cipher suites. +Anonymous Elliptic Curve Diffie-Hellman cipher suites. =item B, B diff --git a/doc/apps/dgst.pod b/doc/apps/dgst.pod index f0f984416b..3f1b02ca51 100644 --- a/doc/apps/dgst.pod +++ b/doc/apps/dgst.pod @@ -225,8 +225,8 @@ prior to verification. =head1 HISTORY -The default digest was changed from MD5 to SHA256 in Openssl 1.1. -The FIPS-related options were removed in OpenSSL 1.1 +The default digest was changed from MD5 to SHA256 in OpenSSL 1.1.0 +The FIPS-related options were removed in OpenSSL 1.1.0 =head1 COPYRIGHT diff --git a/doc/apps/genpkey.pod b/doc/apps/genpkey.pod index a916e76464..8a789463cd 100644 --- a/doc/apps/genpkey.pod +++ b/doc/apps/genpkey.pod @@ -73,14 +73,14 @@ implementation. See B below for more details. =item B<-genparam> generate a set of parameters instead of a private key. If used this option must -precede and B<-algorithm>, B<-paramfile> or B<-pkeyopt> options. +precede any B<-algorithm>, B<-paramfile> or B<-pkeyopt> options. =item B<-paramfile filename> Some public key algorithms generate a private key based on a set of parameters. They can be supplied using this option. If this option is used the public key algorithm used is determined by the parameters. If used this option must -precede and B<-pkeyopt> options. The options B<-paramfile> and B<-algorithm> +precede any B<-pkeyopt> options. The options B<-paramfile> and B<-algorithm> are mutually exclusive. =item B<-text> diff --git a/doc/apps/nseq.pod b/doc/apps/nseq.pod index 695496598e..4765aecea8 100644 --- a/doc/apps/nseq.pod +++ b/doc/apps/nseq.pod @@ -2,7 +2,7 @@ =head1 NAME -nseq - create or examine a netscape certificate sequence +nseq - create or examine a Netscape certificate sequence =head1 SYNOPSIS diff --git a/doc/apps/openssl.pod b/doc/apps/openssl.pod index bc260e9d06..8299d2a26a 100644 --- a/doc/apps/openssl.pod +++ b/doc/apps/openssl.pod @@ -353,7 +353,7 @@ RC5 Cipher =head1 COMMAND OPTIONS Details of which options are available depend on the specific command. -This section desribes some common options with common behavior. +This section describes some common options with common behavior. =head2 Common Options diff --git a/doc/apps/pkeyutl.pod b/doc/apps/pkeyutl.pod index 6b8e2bc277..91eeda5488 100644 --- a/doc/apps/pkeyutl.pod +++ b/doc/apps/pkeyutl.pod @@ -125,7 +125,7 @@ derive a shared secret using the peer key. Use key derivation function B. The supported algorithms are at present B and B. -Note: additional paramers and the KDF output length will normally have to be +Note: additional parameters and the KDF output length will normally have to be set for this to work. See L and L for the supported string parameters of each algorithm. diff --git a/doc/apps/s_server.pod b/doc/apps/s_server.pod index f887cc668a..8e0ff78e69 100644 --- a/doc/apps/s_server.pod +++ b/doc/apps/s_server.pod @@ -305,7 +305,7 @@ from the client. =item B<-dtls>, B<-dtls1>, B<-dtls1_2> These options make B use DTLS protocols instead of TLS. -With B<-dtls>, B will negotiate any supported DTLS protcol version, +With B<-dtls>, B will negotiate any supported DTLS protocol version, whilst B<-dtls1> and B<-dtls1_2> will only support DTLSv1.0 and DTLSv1.2 respectively. @@ -339,7 +339,7 @@ L for further information. The maximum number of encrypt/decrypt pipelines to be used. This will only have an effect if an engine has been loaded that supports pipelining (e.g. the dasync -engine) and a suiteable ciphersuite has been negotiated. The default value is 1. +engine) and a suitable ciphersuite has been negotiated. The default value is 1. See L for further information. =item B<-read_buf int> diff --git a/doc/apps/verify.pod b/doc/apps/verify.pod index fd75aba957..051cd624f1 100644 --- a/doc/apps/verify.pod +++ b/doc/apps/verify.pod @@ -210,14 +210,14 @@ effect. A B of additional untrusted certificates (intermediate issuer CAs) used to construct a certificate chain from the subject certificate to a trust-anchor. The B should contain one or more certificates in PEM format. -This option can be specified more than once to include untrusted certiificates +This option can be specified more than once to include untrusted certificates from multiple B. =item B<-trusted file> A B of trusted certificates, which must be self-signed, unless the B<-partial_chain> option is specified. -The B contain one or more certificates in PEM format. +The B contains one or more certificates in PEM format. With this option, no additional (e.g., default) certificate lists are consulted. That is, the only trust-anchors are those listed in B. @@ -340,7 +340,7 @@ CA. The process of 'looking up the issuers certificate' itself involves a number of steps. -Ater all certificates whose subject name matches the issuer name of the current +After all certificates whose subject name matches the issuer name of the current certificate are subject to further tests. The relevant authority key identifier components of the current certificate (if present) must match the subject key identifier (if present) and issuer and @@ -388,7 +388,7 @@ problem was detected starting with zero for the certificate being verified itsel then 1 for the CA that signed the certificate and so on. Finally a text version of the error number is presented. -An partial list of the error codes and messages is shown below, this also +A partial list of the error codes and messages is shown below, this also includes the name of the error code as defined in the header file x509_vfy.h Some of the error codes are defined but never returned: these are described as "unused". @@ -473,7 +473,7 @@ An error occurred trying to allocate memory. This should never happen. =item B -The passed certificate is self signed and the same certificate cannot be found in the list of +The passed certificate is self-signed and the same certificate cannot be found in the list of trusted certificates. =item B diff --git a/doc/apps/x509.pod b/doc/apps/x509.pod index 4eb1a22687..cddfc8ce4a 100644 --- a/doc/apps/x509.pod +++ b/doc/apps/x509.pod @@ -834,7 +834,7 @@ Otherwise it is the same as a normal SSL server. The extended key usage extension must be absent or include the "email protection" OID. Netscape certificate type must be absent or should have the -S/MIME bit set. If the S/MIME bit is not set in netscape certificate type +S/MIME bit set. If the S/MIME bit is not set in Netscape certificate type then the SSL client bit is tolerated as an alternative but a warning is shown: this is because some Verisign certificates don't set the S/MIME bit.