diff --git a/doc/crypto/CMS_add1_recipient_cert.pod b/doc/crypto/CMS_add1_recipient_cert.pod index 5e737e29fdc7f1ab3350e1460475b10ff3f4914a..d1e4104bb8677509c2675c5a3577392c88a51749 100644 --- a/doc/crypto/CMS_add1_recipient_cert.pod +++ b/doc/crypto/CMS_add1_recipient_cert.pod @@ -20,7 +20,7 @@ structure. CMS_add0_recipient_key() adds symmetric key B of length B using wrapping algorithm B, identifier B or length B and optional -values B, B abd B to CMS_ContentInfo enveloped +values B, B and B to CMS_ContentInfo enveloped data structure B as a KEKRecipientInfo structure. The CMS_ContentInfo structure should be obtained from an initial call to diff --git a/doc/crypto/CMS_decrypt.pod b/doc/crypto/CMS_decrypt.pod index 02df55e36fa35359443ca73f9b97626e52dabf10..b6bb3b1188cddf687c62498783bce16e50081fe0 100644 --- a/doc/crypto/CMS_decrypt.pod +++ b/doc/crypto/CMS_decrypt.pod @@ -30,7 +30,7 @@ needed to locate the appropriate (of possible several) recipients in the CMS structure. If B is set to NULL all possible recipients are tried. It is possible to determine the correct recipient key by other means (for -example looking them up in a database) and settin them in the CMS strutucre +example looking them up in a database) and setting them in the CMS structure in advance using the CMS utility functions such as CMS_set1_pkey(). In this case both B and B should be set to NULL. diff --git a/doc/crypto/CMS_encrypt.pod b/doc/crypto/CMS_encrypt.pod index 4ba2b22da4ffa05555a5ca6f3b3f46cab0fca239..0e3c79e4b3a0a40ccd9ba714bd994df0299551c4 100644 --- a/doc/crypto/CMS_encrypt.pod +++ b/doc/crypto/CMS_encrypt.pod @@ -76,7 +76,7 @@ PEM_write_bio_CMS_stream() finalize the structure. Alternatively finalization can be performed by obtaining the streaming ASN1 B directly using BIO_new_CMS(). -The receipients specified in B use a CMS KeyTransRecipientInfo info +The recipients specified in B use a CMS KeyTransRecipientInfo info structure. KEKRecipientInfo is also supported using the flag B and CMS_add0_recipient_key(). diff --git a/doc/crypto/CMS_get0_RecipientInfos.pod b/doc/crypto/CMS_get0_RecipientInfos.pod index fa6957489323060cc3d5c950f0e56384a92d8560..7b9a31cf56e195e9e46fd94057f17dc13caca2ca 100644 --- a/doc/crypto/CMS_get0_RecipientInfos.pod +++ b/doc/crypto/CMS_get0_RecipientInfos.pod @@ -35,7 +35,7 @@ identifier associated with a specific CMS_RecipientInfo structure B, which must be of type CMS_RECIPINFO_TRANS. Either the keyidentifier will be set in B or B issuer name and serial number in B and B. -CMS_RecipientInfo_ktri_cert_cmp() compares the cerificate B against the +CMS_RecipientInfo_ktri_cert_cmp() compares the certificate B against the CMS_RecipientInfo structure B, which must be of type CMS_RECIPINFO_TRANS. It returns zero if the comparison is successful and non zero if not. @@ -91,7 +91,7 @@ CMS_RecipientInfo_kekri_get0_id(), CMS_RecipientInfo_set0_key() and CMS_RecipientInfo_decrypt() return 1 for success or 0 if an error occurs. CMS_RecipientInfo_ktri_cert_cmp() and CMS_RecipientInfo_kekri_cmp() return 0 -for a successul comparison and non zero otherwise. +for a successful comparison and non zero otherwise. Any error can be obtained from L. diff --git a/doc/crypto/CMS_get0_SignerInfos.pod b/doc/crypto/CMS_get0_SignerInfos.pod index 7276e7022497c826b69cba56a42b8206a65e1baf..a992f04865fe984e0f52eeef1c0fc338db6b2bfc 100644 --- a/doc/crypto/CMS_get0_SignerInfos.pod +++ b/doc/crypto/CMS_get0_SignerInfos.pod @@ -26,7 +26,7 @@ associated with a specific CMS_SignerInfo structure B. Either the keyidentifier will be set in B or B issuer name and serial number in B and B. -CMS_SignerInfo_cert_cmp() compares the cerificate B against the signer +CMS_SignerInfo_cert_cmp() compares the certificate B against the signer identifier B. It returns zero if the comparison is successful and non zero if not. diff --git a/doc/crypto/CMS_get0_type.pod b/doc/crypto/CMS_get0_type.pod index 6f8f8f6578362656ea584a645c82f824a777ebae..8ff1c3115cd45d79eb8cc0bde9ace09409d87ea6 100644 --- a/doc/crypto/CMS_get0_type.pod +++ b/doc/crypto/CMS_get0_type.pod @@ -16,11 +16,11 @@ CMS_get0_type() returns the content type of a CMS_ContentInfo structure as and ASN1_OBJECT pointer. An application can then decide how to process the -CMS_ContentInfo strutucture based on this value. +CMS_ContentInfo structure based on this value. CMS_set1_eContentType() sets the embedded content type of a CMS_ContentInfo structure. It should be called with CMS functions with the B -flag and B the strutucre is finalised, otherwise the results are +flag and B the structure is finalised, otherwise the results are undefined. ASN1_OBJECT *CMS_get0_eContentType() returns a pointer to the embedded diff --git a/doc/crypto/CMS_get1_ReceiptRequest.pod b/doc/crypto/CMS_get1_ReceiptRequest.pod index ba9ff9f022fc267f1c3440af81f73a76b2815080..7cbb0c67f3d0c6f685f3689d1e58b49f70c210a3 100644 --- a/doc/crypto/CMS_get1_ReceiptRequest.pod +++ b/doc/crypto/CMS_get1_ReceiptRequest.pod @@ -24,7 +24,7 @@ option in B is used. The B parameter specifies the B field value. The CMS_add1_ReceiptRequest() function adds a signed receipt request B -to SignerInfo strutucre B. +to SignerInfo structure B. int CMS_get1_ReceiptRequest() looks for a signed receipt request in B, if any is found it is decoded and written to B. diff --git a/doc/crypto/CMS_sign.pod b/doc/crypto/CMS_sign.pod index 46b1debde4a847e1100f8e1683cbaf40f5b966a3..88258cec15a33cf70bda0a5a390d35fae4436eda 100644 --- a/doc/crypto/CMS_sign.pod +++ b/doc/crypto/CMS_sign.pod @@ -13,7 +13,7 @@ CMS_sign - create a CMS SignedData structure =head1 DESCRIPTION CMS_sign() creates and returns a CMS SignedData structure. B is -the certificate to sign with, B is the corresponsding private key. +the certificate to sign with, B is the corresponding private key. B is an optional additional set of certificates to include in the CMS structure (for example any intermediate CAs in the chain). Any or all of these parameters can be B, see B below. @@ -114,6 +114,6 @@ L, L CMS_sign() was added to OpenSSL 0.9.8 The B flag is only supported for detached data in OpenSSL 0.9.8, -it is supportd for embedded data in OpenSSL 0.9.9 and later. +it is supported for embedded data in OpenSSL 0.9.9 and later. =cut diff --git a/doc/crypto/CMS_sign_add1_signer.pod b/doc/crypto/CMS_sign_add1_signer.pod index ea49bdca1b5668fa173263164879e6d5cc05a74a..c2a67b3738f9df9faf56baeda3d1a2e08ff7bfd6 100644 --- a/doc/crypto/CMS_sign_add1_signer.pod +++ b/doc/crypto/CMS_sign_add1_signer.pod @@ -40,14 +40,14 @@ The main purpose of this CMS_sign_add1_signer() is to provide finer control over a CMS signed data structure where the simpler CMS_sign() function defaults are not appropriate. For example if multiple signers or non default digest algorithms are needed. New attributes can also be added using the returned -CMS_SignerInfo struture and the CMS attribute utility functions or the +CMS_SignerInfo structure and the CMS attribute utility functions or the CMS signed receipt request functions. Any of the following flags (ored together) can be passed in the B parameter. If B is set then an attempt is made to copy the content -digest value from the CMS_ContentInfo struture: to add a signer to an existing +digest value from the CMS_ContentInfo structure: to add a signer to an existing structure. An error occurs if a matching digest value cannot be found to copy. The returned CMS_ContentInfo structure will be valid and finalized when this flag is set. diff --git a/doc/crypto/CMS_verify.pod b/doc/crypto/CMS_verify.pod index cfe3c326a009733b1be250c275328e7923f6823b..0dfcf3dab44973b49c169b9e31d5267bbd25e537 100644 --- a/doc/crypto/CMS_verify.pod +++ b/doc/crypto/CMS_verify.pod @@ -16,7 +16,7 @@ CMS_verify - verify a CMS SignedData structure CMS_verify() verifies a CMS SignedData structure. B is the CMS_ContentInfo structure to verify. B is a set of certificates in which to search for -the signer's certificate. B is a trusted certficate store (used for +the signer's certificate. B is a trusted certificate store (used for chain verification). B is the signed data if the content is not present in B (that is it is detached). The content is written to B if it is not NULL. @@ -25,7 +25,7 @@ B is an optional set of flags, which can be used to modify the verify operation. CMS_get0_signers() retrieves the signer's certificate(s) from B, it must -be called after a succeful CMS_verify() operation. +be called after a successful CMS_verify() operation. =head1 VERIFY PROCESS @@ -101,7 +101,7 @@ timestamp). =head1 RETURN VALUES CMS_verify() returns 1 for a successful verification and zero if an error -occured. +occurred. CMS_get0_signers() returns all signers or B if an error occurred. diff --git a/doc/crypto/SMIME_write_CMS.pod b/doc/crypto/SMIME_write_CMS.pod index 6319876b7d0b5b09e4348e396834e3446f51d0ce..ccec6cafa805f673abec4945ccc4c9c532d91d43 100644 --- a/doc/crypto/SMIME_write_CMS.pod +++ b/doc/crypto/SMIME_write_CMS.pod @@ -40,7 +40,7 @@ the data must be read twice: once to compute the signature in CMS_sign() and once to output the S/MIME message. If streaming is performed the content is output in BER format using indefinite -length constructuted encoding except in the case of signed data with detached +length constructed encoding except in the case of signed data with detached content where the content is absent and DER format is used. =head1 BUGS