-.\" $OpenBSD: ASN1_TYPE_get.3,v 1.15 2021/11/23 17:53:59 schwarze Exp $
+.\" $OpenBSD: ASN1_TYPE_get.3,v 1.16 2021/11/26 13:48:21 jsg Exp $
.\" selective merge up to: OpenSSL 6328d367 Jul 4 21:58:30 2020 +0200
.\"
.\" This file is a derived work.
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
.\" OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd $Mdocdate: November 23 2021 $
+.Dd $Mdocdate: November 26 2021 $
.Dt ASN1_TYPE_GET 3
.Os
.Sh NAME
.Fa num
is a
.Dv NULL
-pointer and copies the octet string value from the second elememt,
+pointer and copies the octet string value from the second element,
but not more than
.Fa buflen
bytes, into the
-.\" $OpenBSD: ASN1_item_verify.3,v 1.1 2021/11/07 15:29:01 schwarze Exp $
+.\" $OpenBSD: ASN1_item_verify.3,v 1.2 2021/11/26 13:48:21 jsg Exp $
.\"
.\" Copyright (c) 2021 Ingo Schwarze <schwarze@openbsd.org>
.\"
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\"
-.Dd $Mdocdate: November 7 2021 $
+.Dd $Mdocdate: November 26 2021 $
.Dt ASN1_ITEM_VERIFY 3
.Os
.Sh NAME
.Fa pkey .
.Sh RETURN VALUES
.Fn ASN1_item_verify
-returns 1 if signure verification succeds, 0 if signature verification
+returns 1 if signature verification succeeds, 0 if signature verification
fails, or \-1 if
.Fa pkey
is
-.\" $OpenBSD: ASN1_parse_dump.3,v 1.1 2021/07/11 19:03:45 schwarze Exp $
+.\" $OpenBSD: ASN1_parse_dump.3,v 1.2 2021/11/26 13:48:21 jsg Exp $
.\"
.\" Copyright (c) 2021 Ingo Schwarze <schwarze@openbsd.org>
.\"
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\"
-.Dd $Mdocdate: July 11 2021 $
+.Dd $Mdocdate: November 26 2021 $
.Dt ASN1_PARSE_DUMP 3
.Os
.Sh NAME
Otherwise, the
.Fa dump
argument decides the format.
-If it is zero, a raw hex dump is emissed, consisting of two hexadecimal
+If it is zero, a raw hex dump is emitted, consisting of two hexadecimal
digits for every data byte.
If
.Fa dump
.Fn ASN1_parse
is identical to
.Fn ASN1_parse_dump
-woth 0 passed as the
+with 0 passed as the
.Fa dump
argument.
.Sh RETURN VALUES
-.\" $OpenBSD: X509V3_extensions_print.3,v 1.1 2021/07/12 14:54:00 schwarze Exp $
+.\" $OpenBSD: X509V3_extensions_print.3,v 1.2 2021/11/26 13:48:21 jsg Exp $
.\"
.\" Copyright (c) 2021 Ingo Schwarze <schwarze@openbsd.org>
.\"
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\"
-.Dd $Mdocdate: July 12 2021 $
+.Dd $Mdocdate: November 26 2021 $
.Dt X509V3_EXTENSIONS_PRINT 3
.Os
.Sh NAME
without decoding it first.
In both cases, an
.Fa indent
-incremented by 4 space characaters is used.
+incremented by 4 space characters is used.
.El
.Pp
If
-.\" $OpenBSD: X509_ATTRIBUTE_set1_object.3,v 1.2 2021/10/22 13:21:06 schwarze Exp $
+.\" $OpenBSD: X509_ATTRIBUTE_set1_object.3,v 1.3 2021/11/26 13:48:21 jsg Exp $
.\"
.\" Copyright (c) 2021 Ingo Schwarze <schwarze@openbsd.org>
.\"
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\"
-.Dd $Mdocdate: October 22 2021 $
+.Dd $Mdocdate: November 26 2021 $
.Dt X509_ATTRIBUTE_SET1_OBJECT 3
.Os
.Sh NAME
.Dv NULL
if obtaining
.Fa obj ,
-allocating mamory, or copying fails.
+allocating memory, or copying fails.
.Sh SEE ALSO
.Xr ASN1_OBJECT_new 3 ,
.Xr ASN1_STRING_new 3 ,
-.\" $OpenBSD: X509_check_trust.3,v 1.4 2021/10/29 11:25:37 schwarze Exp $
+.\" $OpenBSD: X509_check_trust.3,v 1.5 2021/11/26 13:48:21 jsg Exp $
.\"
.\" Copyright (c) 2021 Ingo Schwarze <schwarze@openbsd.org>
.\"
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\"
-.Dd $Mdocdate: October 29 2021 $
+.Dd $Mdocdate: November 26 2021 $
.Dt X509_CHECK_TRUST 3
.Os
.Sh NAME
identifiers are supported.
The
.Dq ASN.1 NID
-column indicates the correspondig ASN.1 object identifier;
+column indicates the corresponding ASN.1 object identifier;
for the relationship between ASN.1 NIDs and OIDs, see the
.Xr OBJ_nid2obj 3
manual page.
-.\" $OpenBSD: X509at_get_attr.3,v 1.5 2021/10/26 12:56:48 schwarze Exp $
+.\" $OpenBSD: X509at_get_attr.3,v 1.6 2021/11/26 13:48:21 jsg Exp $
.\"
.\" Copyright (c) 2021 Ingo Schwarze <schwarze@openbsd.org>
.\"
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\"
-.Dd $Mdocdate: October 26 2021 $
+.Dd $Mdocdate: November 26 2021 $
.Dt X509AT_GET_ATTR 3
.Os
.Sh NAME
.Sh DESCRIPTION
These functions retrieve information from the
.Fa attrs
-array of X.501 Attibute objects.
+array of X.501 Attribute objects.
They all fail if
.Fa attrs
is a
-.\" $OpenBSD: SSL_read_early_data.3,v 1.3 2021/10/27 22:11:21 tb Exp $
+.\" $OpenBSD: SSL_read_early_data.3,v 1.4 2021/11/26 13:48:22 jsg Exp $
.\" content checked up to: OpenSSL 6328d367 Jul 4 21:58:30 2020 +0200
.\"
.\" Copyright (c) 2020 Ingo Schwarze <schwarze@openbsd.org>
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\"
-.Dd $Mdocdate: October 27 2021 $
+.Dd $Mdocdate: November 26 2021 $
.Dt SSL_READ_EARLY_DATA 3
.Os
.Sh NAME
to cause serious security vulnerabilities.
.Pp
If these functions are used, other TLS implementations
-may allow the transfer of application data during the inital handshake.
+may allow the transfer of application data during the initial handshake.
Even when used as designed, security of the connection is compromised;
in particular, application data is exchanged with unauthenticated peers,
and there is no forward secrecy.