diff options
author | Gustaf Neumann <neumann@wu-wien.ac.at> | 2020-06-29 21:13:07 +0200 |
---|---|---|
committer | Dr. Matthias St. Pierre <matthias.st.pierre@ncp-e.com> | 2020-07-05 01:49:20 +0200 |
commit | 8c1cbc72105ffd493b48e65f8f5fd3657dedb28c (patch) | |
tree | b1437e0210f80d7de45d8d33903a2f28fe1b82da /doc/man1 | |
parent | 3a19f1a9dd16f5855a7e2a42cd3e7f136f849bd3 (diff) | |
download | openssl-new-8c1cbc72105ffd493b48e65f8f5fd3657dedb28c.tar.gz |
Fix typos and repeated words
CLA: trivial
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matthias St. Pierre <Matthias.St.Pierre@ncp-e.com>
(Merged from https://github.com/openssl/openssl/pull/12320)
Diffstat (limited to 'doc/man1')
-rw-r--r-- | doc/man1/openssl-ca.pod.in | 2 | ||||
-rw-r--r-- | doc/man1/openssl-cmp.pod.in | 2 | ||||
-rw-r--r-- | doc/man1/openssl-dsa.pod.in | 2 | ||||
-rw-r--r-- | doc/man1/openssl-enc.pod.in | 2 | ||||
-rw-r--r-- | doc/man1/openssl-pkcs12.pod.in | 2 | ||||
-rw-r--r-- | doc/man1/openssl-pkcs8.pod.in | 2 | ||||
-rw-r--r-- | doc/man1/openssl-pkeyutl.pod.in | 2 | ||||
-rw-r--r-- | doc/man1/openssl-s_client.pod.in | 6 | ||||
-rw-r--r-- | doc/man1/openssl-s_server.pod.in | 4 | ||||
-rw-r--r-- | doc/man1/openssl-s_time.pod.in | 4 | ||||
-rw-r--r-- | doc/man1/openssl-sess_id.pod.in | 2 | ||||
-rw-r--r-- | doc/man1/openssl.pod | 2 |
12 files changed, 16 insertions, 16 deletions
diff --git a/doc/man1/openssl-ca.pod.in b/doc/man1/openssl-ca.pod.in index 22a0cb40d8..519f5f4eed 100644 --- a/doc/man1/openssl-ca.pod.in +++ b/doc/man1/openssl-ca.pod.in @@ -253,7 +253,7 @@ DNs match the order of the request. This is not needed for Xenroll. =item B<-noemailDN> The DN of a certificate can contain the EMAIL field if present in the -request DN, however it is good policy just having the e-mail set into +request DN, however, it is good policy just having the e-mail set into the altName extension of the certificate. When this option is set the EMAIL field is removed from the certificate' subject and set only in the, eventually present, extensions. The B<email_in_dn> keyword can be diff --git a/doc/man1/openssl-cmp.pod.in b/doc/man1/openssl-cmp.pod.in index 0d05e7fb98..b148afb2dc 100644 --- a/doc/man1/openssl-cmp.pod.in +++ b/doc/man1/openssl-cmp.pod.in @@ -1104,7 +1104,7 @@ This prints information about all received ITAV B<infoType>s to stdout. For CMP client invocations, in particular for certificate enrollment, usually many parameters need to be set, which is tedious and error-prone to do on the command line. -Therefore the client offers the possibility to read +Therefore, the client offers the possibility to read options from sections of the OpenSSL config file, usually called B<openssl.cnf>. The values found there can still be extended and even overridden by any subsequently loaded sections and on the command line. diff --git a/doc/man1/openssl-dsa.pod.in b/doc/man1/openssl-dsa.pod.in index f3d1a9423c..2db0407821 100644 --- a/doc/man1/openssl-dsa.pod.in +++ b/doc/man1/openssl-dsa.pod.in @@ -62,7 +62,7 @@ The input and formats; the default is B<PEM>. See L<openssl(1)/Format Options> for details. Private keys are a sequence of B<ASN.1 INTEGERS>: the version (zero), B<p>, -B<q>, B<g>, and the public and and private key components. Public keys +B<q>, B<g>, and the public and private key components. Public keys are a B<SubjectPublicKeyInfo> structure with the B<DSA> type. The B<PEM> format also accepts PKCS#8 data. diff --git a/doc/man1/openssl-enc.pod.in b/doc/man1/openssl-enc.pod.in index 6971de51ad..dcbeb8877b 100644 --- a/doc/man1/openssl-enc.pod.in +++ b/doc/man1/openssl-enc.pod.in @@ -241,7 +241,7 @@ a strong block cipher, such as AES, in CBC mode. All the block ciphers normally use PKCS#5 padding, also known as standard block padding. This allows a rudimentary integrity or password check to -be performed. However since the chance of random data passing the test +be performed. However, since the chance of random data passing the test is better than 1 in 256 it isn't a very good test. If padding is disabled then the input data must be a multiple of the cipher diff --git a/doc/man1/openssl-pkcs12.pod.in b/doc/man1/openssl-pkcs12.pod.in index da5214d563..7d0629b376 100644 --- a/doc/man1/openssl-pkcs12.pod.in +++ b/doc/man1/openssl-pkcs12.pod.in @@ -244,7 +244,7 @@ This option is only interpreted by MSIE and similar MS software. Normally encryption purposes but arbitrary length keys for signing. The B<-keysig> option marks the key for signing only. Signing only keys can be used for S/MIME signing, authenticode (ActiveX control signing) and SSL client -authentication, however due to a bug only MSIE 5.0 and later support +authentication, however, due to a bug only MSIE 5.0 and later support the use of signing only keys for SSL client authentication. =item B<-macalg> I<digest> diff --git a/doc/man1/openssl-pkcs8.pod.in b/doc/man1/openssl-pkcs8.pod.in index 0729302053..719e3d9168 100644 --- a/doc/man1/openssl-pkcs8.pod.in +++ b/doc/man1/openssl-pkcs8.pod.in @@ -248,7 +248,7 @@ one million iterations of the password: Test vectors from this PKCS#5 v2.0 implementation were posted to the pkcs-tng mailing list using triple DES, DES and RC2 with high iteration counts, several people confirmed that they could decrypt the private -keys produced and Therefore it can be assumed that the PKCS#5 v2.0 +keys produced and therefore, it can be assumed that the PKCS#5 v2.0 implementation is reasonably accurate at least as far as these algorithms are concerned. diff --git a/doc/man1/openssl-pkeyutl.pod.in b/doc/man1/openssl-pkeyutl.pod.in index d823f0b851..2bcbb54c57 100644 --- a/doc/man1/openssl-pkeyutl.pod.in +++ b/doc/man1/openssl-pkeyutl.pod.in @@ -43,7 +43,7 @@ B<openssl> B<pkeyutl> =head1 DESCRIPTION -This command can be used to perform low level public key +This command can be used to perform low-level public key operations using any supported algorithm. =head1 OPTIONS diff --git a/doc/man1/openssl-s_client.pod.in b/doc/man1/openssl-s_client.pod.in index 367e59e925..e8f73cdb99 100644 --- a/doc/man1/openssl-s_client.pod.in +++ b/doc/man1/openssl-s_client.pod.in @@ -192,7 +192,7 @@ When used with the B<-proxy> flag, the program will attempt to authenticate with the specified proxy using basic (base64) authentication. NB: Basic authentication is insecure; the credentials are sent to the proxy in easily reversible base64 encoding before any TLS/SSL session is established. -Therefore these credentials are easily recovered by anyone able to sniff/trace +Therefore, these credentials are easily recovered by anyone able to sniff/trace the network. Use with caution. =item B<-proxy_pass> I<arg> @@ -854,14 +854,14 @@ is that a web client complains it has no certificates or gives an empty list to choose from. This is normally because the server is not sending the clients certificate authority in its "acceptable CA list" when it requests a certificate. By using this command, the CA list can be viewed -and checked. However some servers only request client authentication +and checked. However, some servers only request client authentication after a specific URL is requested. To obtain the list in this case it is necessary to use the B<-prexit> option and send an HTTP request for an appropriate page. If a certificate is specified on the command line using the B<-cert> option it will not be used unless the server specifically requests -a client certificate. Therefore merely including a client certificate +a client certificate. Therefore, merely including a client certificate on the command line is no guarantee that the certificate works. If there are problems verifying a server certificate then the diff --git a/doc/man1/openssl-s_server.pod.in b/doc/man1/openssl-s_server.pod.in index 28ef15ea56..07cde67cde 100644 --- a/doc/man1/openssl-s_server.pod.in +++ b/doc/man1/openssl-s_server.pod.in @@ -433,9 +433,9 @@ For more information on shutting down a connection, see L<SSL_shutdown(3)>. =item B<-id_prefix> I<val> Generate SSL/TLS session IDs prefixed by I<val>. This is mostly useful -for testing any SSL/TLS code (eg. proxies) that wish to deal with multiple +for testing any SSL/TLS code (e.g. proxies) that wish to deal with multiple servers, when each of which might be generating a unique range of session -IDs (eg. with a certain prefix). +IDs (e.g. with a certain prefix). =item B<-verify_return_error> diff --git a/doc/man1/openssl-s_time.pod.in b/doc/man1/openssl-s_time.pod.in index 0f9f055591..90e54f03c2 100644 --- a/doc/man1/openssl-s_time.pod.in +++ b/doc/man1/openssl-s_time.pod.in @@ -157,14 +157,14 @@ is that a web client complains it has no certificates or gives an empty list to choose from. This is normally because the server is not sending the clients certificate authority in its "acceptable CA list" when it requests a certificate. By using L<openssl-s_client(1)> the CA list can be -viewed and checked. However some servers only request client authentication +viewed and checked. However, some servers only request client authentication after a specific URL is requested. To obtain the list in this case it is necessary to use the B<-prexit> option of L<openssl-s_client(1)> and send an HTTP request for an appropriate page. If a certificate is specified on the command line using the B<-cert> option it will not be used unless the server specifically requests -a client certificate. Therefore merely including a client certificate +a client certificate. Therefore, merely including a client certificate on the command line is no guarantee that the certificate works. =head1 BUGS diff --git a/doc/man1/openssl-sess_id.pod.in b/doc/man1/openssl-sess_id.pod.in index 1318283028..67cc0e7e2d 100644 --- a/doc/man1/openssl-sess_id.pod.in +++ b/doc/man1/openssl-sess_id.pod.in @@ -136,7 +136,7 @@ This is the return code when an SSL client certificate is verified. Since the SSL session output contains the master key it is possible to read the contents of an encrypted session using this -information. Therefore appropriate security precautions should be taken if +information. Therefore, appropriate security precautions should be taken if the information is being output by a "real" application. This is however strongly discouraged and should only be used for debugging purposes. diff --git a/doc/man1/openssl.pod b/doc/man1/openssl.pod index dee181d264..dbab509be4 100644 --- a/doc/man1/openssl.pod +++ b/doc/man1/openssl.pod @@ -1125,7 +1125,7 @@ a string and leading or trailing spaces. =item B<esc_2254> Escape the "special" characters in a field as required by RFC 2254 in a field. -That is, the B<NUL> character and and of C<()*>. +That is, the B<NUL> character and of C<()*>. =item B<esc_ctrl> |