提交 2b4ffc65 编写于 作者: S Scott Schaefer 提交者: Dr. Stephen Henson

Fix various spelling errors

上级 856c6dfb
...@@ -105,7 +105,7 @@ ...@@ -105,7 +105,7 @@
* in the asn1 der encoding * in the asn1 der encoding
* possible values: named_curve (default) * possible values: named_curve (default)
* explicit * explicit
* -no_seed - if 'explicit' parameters are choosen do not use the seed * -no_seed - if 'explicit' parameters are chosen do not use the seed
* -genkey - generate ec key * -genkey - generate ec key
* -rand file - files to use for random number input * -rand file - files to use for random number input
* -engine e - use engine e, possibly a hardware device * -engine e - use engine e, possibly a hardware device
...@@ -286,7 +286,7 @@ bad: ...@@ -286,7 +286,7 @@ bad:
BIO_printf(bio_err, " " BIO_printf(bio_err, " "
" explicit\n"); " explicit\n");
BIO_printf(bio_err, " -no_seed if 'explicit'" BIO_printf(bio_err, " -no_seed if 'explicit'"
" parameters are choosen do not" " parameters are chosen do not"
" use the seed\n"); " use the seed\n");
BIO_printf(bio_err, " -genkey generate ec" BIO_printf(bio_err, " -genkey generate ec"
" key\n"); " key\n");
......
...@@ -310,7 +310,7 @@ static ERR_STRING_DATA ASN1_str_reasons[]= ...@@ -310,7 +310,7 @@ static ERR_STRING_DATA ASN1_str_reasons[]=
{ERR_REASON(ASN1_R_UNKNOWN_PUBLIC_KEY_TYPE),"unknown public key type"}, {ERR_REASON(ASN1_R_UNKNOWN_PUBLIC_KEY_TYPE),"unknown public key type"},
{ERR_REASON(ASN1_R_UNKNOWN_SIGNATURE_ALGORITHM),"unknown signature algorithm"}, {ERR_REASON(ASN1_R_UNKNOWN_SIGNATURE_ALGORITHM),"unknown signature algorithm"},
{ERR_REASON(ASN1_R_UNKNOWN_TAG) ,"unknown tag"}, {ERR_REASON(ASN1_R_UNKNOWN_TAG) ,"unknown tag"},
{ERR_REASON(ASN1_R_UNKOWN_FORMAT) ,"unkown format"}, {ERR_REASON(ASN1_R_UNKOWN_FORMAT) ,"unknown format"},
{ERR_REASON(ASN1_R_UNSUPPORTED_ANY_DEFINED_BY_TYPE),"unsupported any defined by type"}, {ERR_REASON(ASN1_R_UNSUPPORTED_ANY_DEFINED_BY_TYPE),"unsupported any defined by type"},
{ERR_REASON(ASN1_R_UNSUPPORTED_CIPHER) ,"unsupported cipher"}, {ERR_REASON(ASN1_R_UNSUPPORTED_CIPHER) ,"unsupported cipher"},
{ERR_REASON(ASN1_R_UNSUPPORTED_ENCRYPTION_ALGORITHM),"unsupported encryption algorithm"}, {ERR_REASON(ASN1_R_UNSUPPORTED_ENCRYPTION_ALGORITHM),"unsupported encryption algorithm"},
......
...@@ -119,7 +119,7 @@ variable points to a section containing further ENGINE configuration ...@@ -119,7 +119,7 @@ variable points to a section containing further ENGINE configuration
information. information.
The section pointed to by B<engines> is a table of engine names (though see The section pointed to by B<engines> is a table of engine names (though see
B<engine_id> below) and further sections containing configuration informations B<engine_id> below) and further sections containing configuration information
specific to each ENGINE. specific to each ENGINE.
Each ENGINE specific section is used to set default algorithms, load Each ENGINE specific section is used to set default algorithms, load
......
...@@ -41,7 +41,7 @@ PKCS#8 private key format use the B<pkcs8> command. ...@@ -41,7 +41,7 @@ PKCS#8 private key format use the B<pkcs8> command.
This specifies the input format. The B<DER> option with a private key uses This specifies the input format. The B<DER> option with a private key uses
an ASN.1 DER encoded SEC1 private key. When used with a public key it an ASN.1 DER encoded SEC1 private key. When used with a public key it
uses the SubjectPublicKeyInfo structur as specified in RFC 3280. uses the SubjectPublicKeyInfo structure as specified in RFC 3280.
The B<PEM> form is the default format: it consists of the B<DER> format base64 The B<PEM> form is the default format: it consists of the B<DER> format base64
encoded with additional header and footer lines. In the case of a private key encoded with additional header and footer lines. In the case of a private key
PKCS#8 format is also accepted. PKCS#8 format is also accepted.
......
...@@ -75,7 +75,7 @@ L<openssl(1)|openssl(1)>. ...@@ -75,7 +75,7 @@ L<openssl(1)|openssl(1)>.
=item B<-passout arg> =item B<-passout arg>
pass phrase source to encrypt any outputed private keys with. For more pass phrase source to encrypt any outputted private keys with. For more
information about the format of B<arg> see the B<PASS PHRASE ARGUMENTS> section information about the format of B<arg> see the B<PASS PHRASE ARGUMENTS> section
in L<openssl(1)|openssl(1)>. in L<openssl(1)|openssl(1)>.
......
...@@ -303,7 +303,7 @@ Reverses effect of B<-asn1-kludge> ...@@ -303,7 +303,7 @@ Reverses effect of B<-asn1-kludge>
=item B<-newhdr> =item B<-newhdr>
Adds the word B<NEW> to the PEM file header and footer lines on the outputed Adds the word B<NEW> to the PEM file header and footer lines on the outputted
request. Some software (Netscape certificate server) and some CAs need this. request. Some software (Netscape certificate server) and some CAs need this.
=item B<-batch> =item B<-batch>
......
...@@ -125,7 +125,7 @@ by using an appropriate certificate. ...@@ -125,7 +125,7 @@ by using an appropriate certificate.
=item B<-dcertform format>, B<-dkeyform format>, B<-dpass arg> =item B<-dcertform format>, B<-dkeyform format>, B<-dpass arg>
addtional certificate and private key format and passphrase respectively. additional certificate and private key format and passphrase respectively.
=item B<-nocert> =item B<-nocert>
......
...@@ -352,7 +352,7 @@ switch always overrides the settings in the config file. ...@@ -352,7 +352,7 @@ switch always overrides the settings in the config file.
This is the main section and it specifies the name of another section This is the main section and it specifies the name of another section
that contains all the options for the B<-reply> command. This default that contains all the options for the B<-reply> command. This default
section can be overriden with the B<-section> command line switch. (Optional) section can be overridden with the B<-section> command line switch. (Optional)
=item B<oid_file> =item B<oid_file>
...@@ -453,7 +453,7 @@ included. Default is no. (Optional) ...@@ -453,7 +453,7 @@ included. Default is no. (Optional)
=head1 ENVIRONMENT VARIABLES =head1 ENVIRONMENT VARIABLES
B<OPENSSL_CONF> contains the path of the configuration file and can be B<OPENSSL_CONF> contains the path of the configuration file and can be
overriden by the B<-config> command line option. overridden by the B<-config> command line option.
=head1 EXAMPLES =head1 EXAMPLES
......
...@@ -124,7 +124,7 @@ The name of an EGD socket to get random data from. (Optional) ...@@ -124,7 +124,7 @@ The name of an EGD socket to get random data from. (Optional)
=item [request]... =item [request]...
List of files containing B<RFC 3161> DER-encoded time stamp requests. If no List of files containing B<RFC 3161> DER-encoded time stamp requests. If no
requests are specifed only one request will be sent to the server and it will be requests are specified only one request will be sent to the server and it will be
read from the standard input. (Optional) read from the standard input. (Optional)
=back =back
......
...@@ -48,7 +48,7 @@ necessary parameters are set, by re-creating the blinding parameters. ...@@ -48,7 +48,7 @@ necessary parameters are set, by re-creating the blinding parameters.
BN_BLINDING_convert_ex() multiplies B<n> with the blinding factor B<A>. BN_BLINDING_convert_ex() multiplies B<n> with the blinding factor B<A>.
If B<r> is not NULL a copy the inverse blinding factor B<Ai> will be If B<r> is not NULL a copy the inverse blinding factor B<Ai> will be
returned in B<r> (this is useful if a B<RSA> object is shared amoung returned in B<r> (this is useful if a B<RSA> object is shared among
several threads). BN_BLINDING_invert_ex() multiplies B<n> with the several threads). BN_BLINDING_invert_ex() multiplies B<n> with the
inverse blinding factor B<Ai>. If B<r> is not NULL it will be used as inverse blinding factor B<Ai>. If B<r> is not NULL it will be used as
the inverse blinding. the inverse blinding.
......
...@@ -17,7 +17,7 @@ EVP_BytesToKey - password based encryption routine ...@@ -17,7 +17,7 @@ EVP_BytesToKey - password based encryption routine
EVP_BytesToKey() derives a key and IV from various parameters. B<type> is EVP_BytesToKey() derives a key and IV from various parameters. B<type> is
the cipher to derive the key and IV for. B<md> is the message digest to use. the cipher to derive the key and IV for. B<md> is the message digest to use.
The B<salt> paramter is used as a salt in the derivation: it should point to The B<salt> parameter is used as a salt in the derivation: it should point to
an 8 byte buffer or NULL if no salt is used. B<data> is a buffer containing an 8 byte buffer or NULL if no salt is used. B<data> is a buffer containing
B<datal> bytes which is used to derive the keying data. B<count> is the B<datal> bytes which is used to derive the keying data. B<count> is the
iteration count to use. The derived key and IV will be written to B<key> iteration count to use. The derived key and IV will be written to B<key>
......
...@@ -162,7 +162,7 @@ does not remain in memory. ...@@ -162,7 +162,7 @@ does not remain in memory.
EVP_EncryptInit(), EVP_DecryptInit() and EVP_CipherInit() behave in a EVP_EncryptInit(), EVP_DecryptInit() and EVP_CipherInit() behave in a
similar way to EVP_EncryptInit_ex(), EVP_DecryptInit_ex and similar way to EVP_EncryptInit_ex(), EVP_DecryptInit_ex and
EVP_CipherInit_ex() except the B<ctx> paramter does not need to be EVP_CipherInit_ex() except the B<ctx> parameter does not need to be
initialized and they always use the default cipher implementation. initialized and they always use the default cipher implementation.
EVP_EncryptFinal(), EVP_DecryptFinal() and EVP_CipherFinal() behave in a EVP_EncryptFinal(), EVP_DecryptFinal() and EVP_CipherFinal() behave in a
......
...@@ -113,7 +113,7 @@ a special status code is set to the verification callback. This permits it ...@@ -113,7 +113,7 @@ a special status code is set to the verification callback. This permits it
to examine the valid policy tree and perform additional checks or simply to examine the valid policy tree and perform additional checks or simply
log it for debugging purposes. log it for debugging purposes.
By default some addtional features such as indirect CRLs and CRLs signed by By default some additional features such as indirect CRLs and CRLs signed by
different keys are disabled. If B<X509_V_FLAG_EXTENDED_CRL_SUPPORT> is set different keys are disabled. If B<X509_V_FLAG_EXTENDED_CRL_SUPPORT> is set
they are enabled. they are enabled.
......
...@@ -201,7 +201,7 @@ handle PKCS#8 format encrypted and unencrypted keys too. ...@@ -201,7 +201,7 @@ handle PKCS#8 format encrypted and unencrypted keys too.
PEM_write_bio_PKCS8PrivateKey() and PEM_write_PKCS8PrivateKey() PEM_write_bio_PKCS8PrivateKey() and PEM_write_PKCS8PrivateKey()
write a private key in an EVP_PKEY structure in PKCS#8 write a private key in an EVP_PKEY structure in PKCS#8
EncryptedPrivateKeyInfo format using PKCS#5 v2.0 password based encryption EncryptedPrivateKeyInfo format using PKCS#5 v2.0 password based encryption
algorithms. The B<cipher> argument specifies the encryption algoritm to algorithms. The B<cipher> argument specifies the encryption algorithm to
use: unlike all other PEM routines the encryption is applied at the use: unlike all other PEM routines the encryption is applied at the
PKCS#8 level and not in the PEM headers. If B<cipher> is NULL then no PKCS#8 level and not in the PEM headers. If B<cipher> is NULL then no
encryption is used and a PKCS#8 PrivateKeyInfo structure is used instead. encryption is used and a PKCS#8 PrivateKeyInfo structure is used instead.
......
...@@ -169,8 +169,8 @@ that will always continue the TLS/SSL handshake regardless of verification ...@@ -169,8 +169,8 @@ that will always continue the TLS/SSL handshake regardless of verification
failure, if wished. The callback realizes a verification depth limit with failure, if wished. The callback realizes a verification depth limit with
more informational output. more informational output.
All verification errors are printed, informations about the certificate chain All verification errors are printed; information about the certificate chain
are printed on request. is printed on request.
The example is realized for a server that does allow but not require client The example is realized for a server that does allow but not require client
certificates. certificates.
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册