-.\" $OpenBSD: BIO_dump.3,v 1.2 2021/07/11 20:18:07 beck Exp $
+.\" $OpenBSD: BIO_dump.3,v 1.3 2022/01/15 23:38:50 jsg Exp $
.\"
.\" Copyright (c) 2021 Ingo Schwarze <schwarze@openbsd.org>
.\"
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\"
-.Dd $Mdocdate: July 11 2021 $
+.Dd $Mdocdate: January 15 2022 $
.Dt BIO_DUMP 3
.Os
.Sh NAME
Non-printable ASCII characters are replaced with dots.
.Pp
Trailing space characters and NUL bytes are omitted from the main table.
-If there are any, an additional line is printed, constisting of the
+If there are any, an additional line is printed, consisting of the
.Fa len
argument as a four-digit hexadecimal number, a dash, and the fixed string
.Qq <SPACES/NULS> .
-.\" $OpenBSD: DH_set_method.3,v 1.7 2018/04/18 01:09:01 schwarze Exp $
+.\" $OpenBSD: DH_set_method.3,v 1.8 2022/01/15 23:38:50 jsg Exp $
.\" OpenSSL b97fdb57 Nov 11 09:33:09 2016 +0100
.\"
.\" This file was written by Ulf Moeller <ulf@openssl.org>.
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
.\" OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd $Mdocdate: April 18 2018 $
+.Dd $Mdocdate: January 15 2022 $
.Dt DH_SET_METHOD 3
.Os
.Sh NAME
.Pp
.Fn DH_get_default_method
returns a pointer to the current default method,
-even if it is actually overridded by an
+even if it is actually overridden by an
.Vt ENGINE .
.Pp
.Fn DH_set_method
-.\" $OpenBSD: DSA_meth_new.3,v 1.1 2018/03/18 13:06:36 schwarze Exp $
+.\" $OpenBSD: DSA_meth_new.3,v 1.2 2022/01/15 23:38:50 jsg Exp $
.\" selective merge up to: OpenSSL a970b14f Jul 31 18:58:40 2017 -0400
.\"
.\" This file is a derived work.
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
.\" OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd $Mdocdate: March 18 2018 $
+.Dd $Mdocdate: January 15 2022 $
.Dt DSA_METH_NEW 3
.Os
.Sh NAME
.Sh DESCRIPTION
The
.Vt DSA_METHOD
-structure holds function pinters for custom DSA implementations.
+structure holds function pointers for custom DSA implementations.
.Pp
.Fn DSA_meth_new
creates a new
-.\" $OpenBSD: DSA_set_method.3,v 1.9 2018/04/18 01:09:01 schwarze Exp $
+.\" $OpenBSD: DSA_set_method.3,v 1.10 2022/01/15 23:38:50 jsg Exp $
.\" OpenSSL b97fdb57 Nov 11 09:33:09 2016 +0100
.\"
.\" This file was written by Ulf Moeller <ulf@openssl.org>.
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
.\" OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd $Mdocdate: April 18 2018 $
+.Dd $Mdocdate: January 15 2022 $
.Dt DSA_SET_METHOD 3
.Os
.Sh NAME
.Pp
.Fn DSA_get_default_method
returns a pointer to the current default method,
-even if it is actually overridded by an
+even if it is actually overridden by an
.Vt ENGINE .
.Pp
.Fn DSA_set_method
-.\" $OpenBSD: ENGINE_ctrl.3,v 1.4 2018/04/19 18:43:58 schwarze Exp $
+.\" $OpenBSD: ENGINE_ctrl.3,v 1.5 2022/01/15 23:38:50 jsg Exp $
.\" content checked up to:
.\" OpenSSL ENGINE_add 1f13ad31 Dec 25 17:50:39 2017 +0800
.\"
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\"
-.Dd $Mdocdate: April 19 2018 $
+.Dd $Mdocdate: January 15 2022 $
.Dt ENGINE_CTRL 3
.Os
.Sh NAME
into the buffer
.Fa p
and NUL-terminate it.
-It is the reponsability of the caller to make sure that the buffer
+It is the responsibility of the caller to make sure that the buffer
.Fa p
is large enough, either by calling
.Dv ENGINE_CTRL_GET_DESC_LEN_FROM_CMD
into the buffer
.Fa p
and NUL-terminate it.
-It is the reponsability of the caller to make sure that the buffer
+It is the responsibility of the caller to make sure that the buffer
.Fa p
is large enough, either by calling
.Dv ENGINE_CTRL_GET_NAME_LEN_FROM_CMD
-.\" $OpenBSD: OCSP_CRLID_new.3,v 1.7 2019/06/06 01:06:58 schwarze Exp $
+.\" $OpenBSD: OCSP_CRLID_new.3,v 1.8 2022/01/15 23:38:50 jsg Exp $
.\"
.\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org>
.\"
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\"
-.Dd $Mdocdate: June 6 2019 $
+.Dd $Mdocdate: January 15 2022 $
.Dt OCSP_CRLID_NEW 3
.Os
.Sh NAME
.Nm OCSP_crlID_new
.Nd OCSP CRL extension
.Sh SYNOPSIS
-.In opsenssl/ocsp.h
+.In openssl/ocsp.h
.Ft OCSP_CRLID *
.Fn OCSP_CRLID_new void
.Ft void
-.\" $OpenBSD: PEM_read.3,v 1.13 2021/03/12 05:18:00 jsg Exp $
+.\" $OpenBSD: PEM_read.3,v 1.14 2022/01/15 23:38:50 jsg Exp $
.\" full merge up to: OpenSSL 83cf7abf May 29 13:07:08 2018 +0100
.\"
.\" This file is a derived work.
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
.\" OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd $Mdocdate: March 12 2021 $
+.Dd $Mdocdate: January 15 2022 $
.Dt PEM_READ 3
.Os
.Sh NAME
.Fa "BIO *bp"
.Fa "const char *name"
.Fa "const char *header"
-.Fa "ocnst unsigned char *data"
+.Fa "const unsigned char *data"
.Fa "long len"
.Fc
.Ft int
-.\" $OpenBSD: RSA_set_method.3,v 1.15 2019/06/08 10:40:51 schwarze Exp $
+.\" $OpenBSD: RSA_set_method.3,v 1.16 2022/01/15 23:38:50 jsg Exp $
.\" OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400
.\"
.\" This file was written by Ulf Moeller <ulf@openssl.org>
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
.\" OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd $Mdocdate: June 8 2019 $
+.Dd $Mdocdate: January 15 2022 $
.Dt RSA_SET_METHOD 3
.Os
.Sh NAME
.Pp
.Fn RSA_get_default_method
returns a pointer to the current default method,
-even if it is actually overridded by an
+even if it is actually overridden by an
.Vt ENGINE .
.Pp
.Fn RSA_set_method
-.\" $OpenBSD: X509_OBJECT_get0_X509.3,v 1.13 2021/11/18 10:09:24 schwarze Exp $
+.\" $OpenBSD: X509_OBJECT_get0_X509.3,v 1.14 2022/01/15 23:38:50 jsg Exp $
.\"
.\" Copyright (c) 2018, 2021 Ingo Schwarze <schwarze@openbsd.org>
.\"
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\"
-.Dd $Mdocdate: November 18 2021 $
+.Dd $Mdocdate: January 15 2022 $
.Dt X509_OBJECT_GET0_X509 3
.Os
.Sh NAME
or if no match is found.
.Pp
.Fn X509_OBJECT_retrieve_match
-returns the first mathching
+returns the first matching
.Vt X509_OBJECT
or
.Dv NULL
-.\" $OpenBSD: get_rfc3526_prime_8192.3,v 1.5 2021/12/18 19:43:01 schwarze Exp $
+.\" $OpenBSD: get_rfc3526_prime_8192.3,v 1.6 2022/01/15 23:38:50 jsg Exp $
.\" checked up to: OpenSSL DH_get_1024_160 99d63d46 Oct 26 13:56:48 2016 -0400
.\"
.\" Copyright (c) 2017 Ingo Schwarze <schwarze@openbsd.org>
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\"
-.Dd $Mdocdate: December 18 2021 $
+.Dd $Mdocdate: January 15 2022 $
.Dt GET_RFC3526_PRIME_8192 3
.Os
.Sh NAME
.Nm BN_get_rfc3526_prime_4096 ,
.Nm BN_get_rfc3526_prime_6144 ,
.Nm BN_get_rfc3526_prime_8192
-.Nd standard moduli for Diffie-Hellmann key exchange
+.Nd standard moduli for Diffie-Hellman key exchange
.Sh SYNOPSIS
.In openssl/bn.h
.Ft BIGNUM *
.Fa p ,
where the group operation is defined as multiplication modulo
.Fa p ,
-is used for Diffie-Hellmann key exchange.
+is used for Diffie-Hellman key exchange.
The first two of these groups are called the First Oakley Group and
the Second Oakley Group.
-Obiviously, all these groups are cyclic groups of order
+Obviously, all these groups are cyclic groups of order
.Fa p ,
respectively, and the numbers returned by these functions are not
secrets.
-.\" $OpenBSD: SSL_CIPHER_get_name.3,v 1.12 2021/05/12 15:12:35 tb Exp $
+.\" $OpenBSD: SSL_CIPHER_get_name.3,v 1.13 2022/01/15 23:38:50 jsg Exp $
.\" full merge up to: OpenSSL b97fdb57 Nov 11 09:33:09 2016 +0100
.\" selective merge up to: OpenSSL 61f805c1 Jan 16 01:01:46 2018 +0800
.\"
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
.\" OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd $Mdocdate: May 12 2021 $
+.Dd $Mdocdate: January 15 2022 $
.Dt SSL_CIPHER_GET_NAME 3
.Os
.Sh NAME
which must not be
.Dv NULL .
The ID here is an OpenSSL-specific concept, which stores a prefix
-of 0x0300 in the higher two bytes and the IANA-specified chipher
+of 0x0300 in the higher two bytes and the IANA-specified cipher
suite ID in the lower two bytes.
For instance, TLS_RSA_WITH_NULL_MD5 has IANA ID "0x00, 0x01", so
.Fn SSL_CIPHER_get_id
-.\" $OpenBSD: SSL_CTX_set_tlsext_ticket_key_cb.3,v 1.6 2021/06/11 19:41:39 jmc Exp $
+.\" $OpenBSD: SSL_CTX_set_tlsext_ticket_key_cb.3,v 1.7 2022/01/15 23:38:50 jsg Exp $
.\" OpenSSL b97fdb57 Nov 11 09:33:09 2016 +0100
.\"
.\" This file was written by Rich Salz <rsalz@akamai.com>
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
.\" OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd $Mdocdate: June 11 2021 $
+.Dd $Mdocdate: January 15 2022 $
.Dt SSL_CTX_SET_TLSEXT_TICKET_KEY_CB 3
.Os
.Sh NAME
The maximum IV length is
.Dv EVP_MAX_IV_LENGTH
bytes defined in
-.In opsenssl/evp.h .
+.In openssl/evp.h .
.Pp
The initialization vector
.Fa iv