mirror of
https://github.com/openssl/openssl.git
synced 2026-01-18 17:11:31 +01:00
Fix some typos in the man pages
Reviewed-by: Paul Yang <kaishen.yy@antfin.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/27590)
This commit is contained in:
@@ -38,7 +38,7 @@ CMS_SignerInfo_cert_cmp() compares the certificate B<cert> against the signer
|
||||
identifier B<si>. It returns zero if the comparison is successful and non zero
|
||||
if not.
|
||||
|
||||
CMS_SignerInfo_set1_signer_cert() sets the signers certificate of B<si> to
|
||||
CMS_SignerInfo_set1_signer_cert() sets the signer's certificate of B<si> to
|
||||
B<signer>.
|
||||
|
||||
=head1 NOTES
|
||||
|
||||
@@ -30,14 +30,14 @@ key that is used during encapsulation.
|
||||
|
||||
The EVP_PKEY_encapsulate() function performs a public key encapsulation
|
||||
operation using I<ctx>.
|
||||
The shared secret writen to I<genkey> can be used as an input for key
|
||||
The shared secret written to I<genkey> can be used as an input for key
|
||||
derivation, typically for various symmetric algorithms.
|
||||
Its size is written to I<genkeylen>, which must be initialised to the
|
||||
size of the provided buffer.
|
||||
|
||||
The ciphertext written to I<wrappedkey> is an encapsulated form, which
|
||||
is expected to be only usable by the holder of the private key corresponding
|
||||
to wthe public key associated with I<ctx>.
|
||||
to the public key associated with I<ctx>.
|
||||
This ciphertext is then communicated to the private-key holder, who can use
|
||||
L<EVP_PKEY_decapsulate(3)> to securely recover the same shared secret.
|
||||
|
||||
|
||||
@@ -174,7 +174,7 @@ C<ML-DSA-87>,
|
||||
B<ML-KEM-512>,
|
||||
B<ML-KEM-768> and
|
||||
B<ML-KEM-1024>
|
||||
keys, which don't have legacy numeric I<NID> assigments, but their raw form is
|
||||
keys, which don't have legacy numeric I<NID> assignments, but their raw form is
|
||||
nevertheless available.
|
||||
|
||||
|
||||
@@ -198,7 +198,7 @@ C<ML-DSA-87>,
|
||||
B<ML-KEM-512>,
|
||||
B<ML-KEM-768> and
|
||||
B<ML-KEM-1024>
|
||||
keys, which don't have legacy numeric I<NID> assigments, but their raw form is
|
||||
keys, which don't have legacy numeric I<NID> assignments, but their raw form is
|
||||
nevertheless available.
|
||||
|
||||
EVP_PKEY_new_CMAC_key() works in the same way as EVP_PKEY_new_raw_private_key()
|
||||
|
||||
@@ -40,7 +40,7 @@ signing a pre-computed message digest using the algorithm given by I<algo> and
|
||||
the key given through L<EVP_PKEY_CTX_new(3)> or L<EVP_PKEY_CTX_new_from_pkey(3)>.
|
||||
A context I<ctx> without a pre-loaded key cannot be used with this function.
|
||||
This function provides almost the same functionality as EVP_PKEY_sign_init_ex(),
|
||||
but is uniquely intended to be used with a pre-computed messsage digest, and
|
||||
but is uniquely intended to be used with a pre-computed message digest, and
|
||||
allows pre-determining the exact conditions for that message digest, if a
|
||||
composite signature algorithm (such as RSA-SHA256) was fetched.
|
||||
Following a call to this function, setting parameters that modifies the digest
|
||||
|
||||
@@ -109,7 +109,7 @@ On success, the function verifies the decrypted data as signed data,
|
||||
using the trust store I<ts> and any untrusted certificates in I<extra>.
|
||||
Doing so, it checks for the purpose "CMP Key Generation Authority" (cmKGA).
|
||||
|
||||
OSSL_CRMF_ENCRYPTEDKEY_init_envdata() returns I<OSSL_CRMF_ENCRYPTEDKEY>, intialized with
|
||||
OSSL_CRMF_ENCRYPTEDKEY_init_envdata() returns I<OSSL_CRMF_ENCRYPTEDKEY>, initialized with
|
||||
the enveloped data I<envdata>.
|
||||
|
||||
OSSL_CRMF_ENCRYPTEDVALUE_decrypt() decrypts the encrypted value in the given
|
||||
|
||||
@@ -110,7 +110,7 @@ ever be read by OpenSSL.
|
||||
|
||||
The OSSL_FUNC_SSL_QUIC_TLS_yield_secret_fn callback (function id
|
||||
B<OSSL_FUNC_SSL_QUIC_TLS_YIELD_SECRET>) is called when a new secret has been
|
||||
established. The I<prot_level> argument identies the TLS protection level and
|
||||
established. The I<prot_level> argument identities the TLS protection level and
|
||||
will be one of B<OSSL_RECORD_PROTECTION_LEVEL_NONE>,
|
||||
B<OSSL_RECORD_PROTECTION_LEVEL_EARLY>, B<OSSL_RECORD_PROTECTION_LEVEL_HANDSHAKE>
|
||||
or B<OSSL_RECORD_PROTECTION_LEVEL_APPLICATION>. The I<direction> will either be
|
||||
|
||||
@@ -85,7 +85,7 @@ If I<ctx> is NULL nothing is done.
|
||||
X509_STORE_CTX_init() sets up I<ctx> for a subsequent verification operation.
|
||||
|
||||
X509_STORE_CTX_init() initializes the internal state and resources of the
|
||||
given I<ctx>. Among others, it sets the verification parameters associcated
|
||||
given I<ctx>. Among others, it sets the verification parameters associated
|
||||
with the method name C<default>, which includes the C<any> purpose,
|
||||
and takes over callback function pointers from I<trust_store> (unless NULL).
|
||||
It must be called before each call to L<X509_verify_cert(3)> or
|
||||
|
||||
@@ -80,7 +80,7 @@ Unless the id stays the same for an existing entry, I<id> must be fresh,
|
||||
which can be achieved by using the result of X509_PURPOSE_get_unused_id().
|
||||
The function also sets in the entry the trust id I<trust>, the given I<flags>,
|
||||
the purpose (long) name I<name>, the short name I<sname>, the purpose checking
|
||||
funktion I<ck> of type B<int (*) (const X509_PURPOSE *, const X509 *, int)>,
|
||||
function I<ck> of type B<int (*) (const X509_PURPOSE *, const X509 *, int)>,
|
||||
and its user data I<arg> which may be retrieved via the B<X509_PURPOSE> pointer.
|
||||
|
||||
X509_PURPOSE_cleanup() removes all purposes that are not pre-defined.
|
||||
|
||||
Reference in New Issue
Block a user