From: jsg Date: Fri, 26 Nov 2021 13:48:21 +0000 (+0000) Subject: spelling X-Git-Url: http://artulab.com/gitweb/?a=commitdiff_plain;h=729b18003be6f3b0b33acfabd6a6368b6d0a22cf;p=openbsd spelling ok schwarze@ --- diff --git a/lib/libcrypto/man/ASN1_TYPE_get.3 b/lib/libcrypto/man/ASN1_TYPE_get.3 index 1a80ddccbc8..2778936b20b 100644 --- a/lib/libcrypto/man/ASN1_TYPE_get.3 +++ b/lib/libcrypto/man/ASN1_TYPE_get.3 @@ -1,4 +1,4 @@ -.\" $OpenBSD: ASN1_TYPE_get.3,v 1.15 2021/11/23 17:53:59 schwarze Exp $ +.\" $OpenBSD: ASN1_TYPE_get.3,v 1.16 2021/11/26 13:48:21 jsg Exp $ .\" selective merge up to: OpenSSL 6328d367 Jul 4 21:58:30 2020 +0200 .\" .\" This file is a derived work. @@ -65,7 +65,7 @@ .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED .\" OF THE POSSIBILITY OF SUCH DAMAGE. .\" -.Dd $Mdocdate: November 23 2021 $ +.Dd $Mdocdate: November 26 2021 $ .Dt ASN1_TYPE_GET 3 .Os .Sh NAME @@ -296,7 +296,7 @@ unless .Fa num is a .Dv NULL -pointer and copies the octet string value from the second elememt, +pointer and copies the octet string value from the second element, but not more than .Fa buflen bytes, into the diff --git a/lib/libcrypto/man/ASN1_item_verify.3 b/lib/libcrypto/man/ASN1_item_verify.3 index 3e32558e7b9..5d185185770 100644 --- a/lib/libcrypto/man/ASN1_item_verify.3 +++ b/lib/libcrypto/man/ASN1_item_verify.3 @@ -1,4 +1,4 @@ -.\" $OpenBSD: ASN1_item_verify.3,v 1.1 2021/11/07 15:29:01 schwarze Exp $ +.\" $OpenBSD: ASN1_item_verify.3,v 1.2 2021/11/26 13:48:21 jsg Exp $ .\" .\" Copyright (c) 2021 Ingo Schwarze .\" @@ -14,7 +14,7 @@ .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. .\" -.Dd $Mdocdate: November 7 2021 $ +.Dd $Mdocdate: November 26 2021 $ .Dt ASN1_ITEM_VERIFY 3 .Os .Sh NAME @@ -51,7 +51,7 @@ and the private key corresponding to the public key .Fa pkey . .Sh RETURN VALUES .Fn ASN1_item_verify -returns 1 if signure verification succeds, 0 if signature verification +returns 1 if signature verification succeeds, 0 if signature verification fails, or \-1 if .Fa pkey is diff --git a/lib/libcrypto/man/ASN1_parse_dump.3 b/lib/libcrypto/man/ASN1_parse_dump.3 index 240d2d338e7..8661c555214 100644 --- a/lib/libcrypto/man/ASN1_parse_dump.3 +++ b/lib/libcrypto/man/ASN1_parse_dump.3 @@ -1,4 +1,4 @@ -.\" $OpenBSD: ASN1_parse_dump.3,v 1.1 2021/07/11 19:03:45 schwarze Exp $ +.\" $OpenBSD: ASN1_parse_dump.3,v 1.2 2021/11/26 13:48:21 jsg Exp $ .\" .\" Copyright (c) 2021 Ingo Schwarze .\" @@ -14,7 +14,7 @@ .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. .\" -.Dd $Mdocdate: July 11 2021 $ +.Dd $Mdocdate: November 26 2021 $ .Dt ASN1_PARSE_DUMP 3 .Os .Sh NAME @@ -133,7 +133,7 @@ carriage returns and horizontal tabs, it is printed as an ASCII string. Otherwise, the .Fa dump argument decides the format. -If it is zero, a raw hex dump is emissed, consisting of two hexadecimal +If it is zero, a raw hex dump is emitted, consisting of two hexadecimal digits for every data byte. If .Fa dump @@ -175,7 +175,7 @@ bytes. .Fn ASN1_parse is identical to .Fn ASN1_parse_dump -woth 0 passed as the +with 0 passed as the .Fa dump argument. .Sh RETURN VALUES diff --git a/lib/libcrypto/man/X509V3_extensions_print.3 b/lib/libcrypto/man/X509V3_extensions_print.3 index ad5b02a8262..8c43fe9b01e 100644 --- a/lib/libcrypto/man/X509V3_extensions_print.3 +++ b/lib/libcrypto/man/X509V3_extensions_print.3 @@ -1,4 +1,4 @@ -.\" $OpenBSD: X509V3_extensions_print.3,v 1.1 2021/07/12 14:54:00 schwarze Exp $ +.\" $OpenBSD: X509V3_extensions_print.3,v 1.2 2021/11/26 13:48:21 jsg Exp $ .\" .\" Copyright (c) 2021 Ingo Schwarze .\" @@ -14,7 +14,7 @@ .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. .\" -.Dd $Mdocdate: July 12 2021 $ +.Dd $Mdocdate: November 26 2021 $ .Dt X509V3_EXTENSIONS_PRINT 3 .Os .Sh NAME @@ -56,7 +56,7 @@ the BER-encoded data of the extension is dumped with without decoding it first. In both cases, an .Fa indent -incremented by 4 space characaters is used. +incremented by 4 space characters is used. .El .Pp If diff --git a/lib/libcrypto/man/X509_ATTRIBUTE_set1_object.3 b/lib/libcrypto/man/X509_ATTRIBUTE_set1_object.3 index 396b31a3eca..3555d4b1691 100644 --- a/lib/libcrypto/man/X509_ATTRIBUTE_set1_object.3 +++ b/lib/libcrypto/man/X509_ATTRIBUTE_set1_object.3 @@ -1,4 +1,4 @@ -.\" $OpenBSD: X509_ATTRIBUTE_set1_object.3,v 1.2 2021/10/22 13:21:06 schwarze Exp $ +.\" $OpenBSD: X509_ATTRIBUTE_set1_object.3,v 1.3 2021/11/26 13:48:21 jsg Exp $ .\" .\" Copyright (c) 2021 Ingo Schwarze .\" @@ -14,7 +14,7 @@ .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. .\" -.Dd $Mdocdate: October 22 2021 $ +.Dd $Mdocdate: November 26 2021 $ .Dt X509_ATTRIBUTE_SET1_OBJECT 3 .Os .Sh NAME @@ -240,7 +240,7 @@ return a pointer to the changed or new object or .Dv NULL if obtaining .Fa obj , -allocating mamory, or copying fails. +allocating memory, or copying fails. .Sh SEE ALSO .Xr ASN1_OBJECT_new 3 , .Xr ASN1_STRING_new 3 , diff --git a/lib/libcrypto/man/X509_check_trust.3 b/lib/libcrypto/man/X509_check_trust.3 index f6a5dbe5b2a..80306e3cd11 100644 --- a/lib/libcrypto/man/X509_check_trust.3 +++ b/lib/libcrypto/man/X509_check_trust.3 @@ -1,4 +1,4 @@ -.\" $OpenBSD: X509_check_trust.3,v 1.4 2021/10/29 11:25:37 schwarze Exp $ +.\" $OpenBSD: X509_check_trust.3,v 1.5 2021/11/26 13:48:21 jsg Exp $ .\" .\" Copyright (c) 2021 Ingo Schwarze .\" @@ -14,7 +14,7 @@ .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. .\" -.Dd $Mdocdate: October 29 2021 $ +.Dd $Mdocdate: November 26 2021 $ .Dt X509_CHECK_TRUST 3 .Os .Sh NAME @@ -107,7 +107,7 @@ By default, the following identifiers are supported. The .Dq ASN.1 NID -column indicates the correspondig ASN.1 object identifier; +column indicates the corresponding ASN.1 object identifier; for the relationship between ASN.1 NIDs and OIDs, see the .Xr OBJ_nid2obj 3 manual page. diff --git a/lib/libcrypto/man/X509at_get_attr.3 b/lib/libcrypto/man/X509at_get_attr.3 index 418302b1b3f..8b85609b213 100644 --- a/lib/libcrypto/man/X509at_get_attr.3 +++ b/lib/libcrypto/man/X509at_get_attr.3 @@ -1,4 +1,4 @@ -.\" $OpenBSD: X509at_get_attr.3,v 1.5 2021/10/26 12:56:48 schwarze Exp $ +.\" $OpenBSD: X509at_get_attr.3,v 1.6 2021/11/26 13:48:21 jsg Exp $ .\" .\" Copyright (c) 2021 Ingo Schwarze .\" @@ -14,7 +14,7 @@ .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. .\" -.Dd $Mdocdate: October 26 2021 $ +.Dd $Mdocdate: November 26 2021 $ .Dt X509AT_GET_ATTR 3 .Os .Sh NAME @@ -60,7 +60,7 @@ .Sh DESCRIPTION These functions retrieve information from the .Fa attrs -array of X.501 Attibute objects. +array of X.501 Attribute objects. They all fail if .Fa attrs is a diff --git a/lib/libssl/man/SSL_read_early_data.3 b/lib/libssl/man/SSL_read_early_data.3 index 641fad2f4d0..1435c159358 100644 --- a/lib/libssl/man/SSL_read_early_data.3 +++ b/lib/libssl/man/SSL_read_early_data.3 @@ -1,4 +1,4 @@ -.\" $OpenBSD: SSL_read_early_data.3,v 1.3 2021/10/27 22:11:21 tb Exp $ +.\" $OpenBSD: SSL_read_early_data.3,v 1.4 2021/11/26 13:48:22 jsg Exp $ .\" content checked up to: OpenSSL 6328d367 Jul 4 21:58:30 2020 +0200 .\" .\" Copyright (c) 2020 Ingo Schwarze @@ -15,7 +15,7 @@ .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. .\" -.Dd $Mdocdate: October 27 2021 $ +.Dd $Mdocdate: November 26 2021 $ .Dt SSL_READ_EARLY_DATA 3 .Os .Sh NAME @@ -87,7 +87,7 @@ and because when they are used, inconspicuous oversights are likely to cause serious security vulnerabilities. .Pp If these functions are used, other TLS implementations -may allow the transfer of application data during the inital handshake. +may allow the transfer of application data during the initial handshake. Even when used as designed, security of the connection is compromised; in particular, application data is exchanged with unauthenticated peers, and there is no forward secrecy.