summaryrefslogtreecommitdiff
path: root/src/lib
diff options
context:
space:
mode:
authorsobrado <>2015-09-22 08:08:07 +0000
committersobrado <>2015-09-22 08:08:07 +0000
commitf087ce5ef830235035b12597598b8a15ef4d469b (patch)
tree44f72e5c66d08a8e69898fb02d0eff61ca84d533 /src/lib
parent8cd2e8a8ed69b1bd5763b94d2864fc4854e7deb4 (diff)
downloadopenbsd-f087ce5ef830235035b12597598b8a15ef4d469b.tar.gz
openbsd-f087ce5ef830235035b12597598b8a15ef4d469b.tar.bz2
openbsd-f087ce5ef830235035b12597598b8a15ef4d469b.zip
typos in documentation; better wording, suggested by jmc@libressl-v2.3.0
ok jmc@
Diffstat (limited to 'src/lib')
-rw-r--r--src/lib/libcrypto/doc/EC_GROUP_copy.pod4
-rw-r--r--src/lib/libcrypto/doc/EC_GROUP_new.pod4
-rw-r--r--src/lib/libcrypto/doc/EC_KEY_new.pod4
-rw-r--r--src/lib/libcrypto/doc/EVP_BytesToKey.pod2
-rw-r--r--src/lib/libcrypto/doc/EVP_DigestSignInit.pod2
-rw-r--r--src/lib/libcrypto/doc/EVP_EncryptInit.pod2
-rw-r--r--src/lib/libcrypto/doc/EVP_PKEY_CTX_ctrl.pod2
-rw-r--r--src/lib/libcrypto/doc/EVP_PKEY_CTX_new.pod2
-rw-r--r--src/lib/libcrypto/doc/EVP_PKEY_cmp.pod4
-rw-r--r--src/lib/libcrypto/doc/EVP_PKEY_keygen.pod6
-rw-r--r--src/lib/libcrypto/doc/OBJ_nid2obj.pod2
-rw-r--r--src/lib/libcrypto/doc/PKCS12_create.pod4
-rw-r--r--src/lib/libcrypto/doc/PKCS7_sign.pod4
-rw-r--r--src/lib/libcrypto/doc/PKCS7_sign_add_signer.pod4
-rw-r--r--src/lib/libcrypto/doc/PKCS7_verify.pod2
-rw-r--r--src/lib/libcrypto/doc/SMIME_write_PKCS7.pod2
-rw-r--r--src/lib/libcrypto/doc/X509_NAME_add_entry_by_txt.pod2
-rw-r--r--src/lib/libcrypto/doc/X509_NAME_get_index_by_NID.pod2
-rw-r--r--src/lib/libcrypto/doc/X509_STORE_CTX_get_error.pod10
-rw-r--r--src/lib/libcrypto/doc/X509_STORE_CTX_new.pod6
-rw-r--r--src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod2
-rw-r--r--src/lib/libcrypto/doc/X509_verify_cert.pod4
-rw-r--r--src/lib/libcrypto/doc/d2i_DSAPublicKey.pod2
-rw-r--r--src/lib/libcrypto/doc/engine.pod4
-rw-r--r--src/lib/libcrypto/man/ASN1_generate_nconf.34
-rw-r--r--src/lib/libcrypto/man/BUF_MEM_new.34
-rw-r--r--src/lib/libssl/src/doc/crypto/CONF_modules_load_file.pod4
-rw-r--r--src/lib/libssl/src/doc/crypto/EC_GROUP_copy.pod4
-rw-r--r--src/lib/libssl/src/doc/crypto/EC_GROUP_new.pod4
-rw-r--r--src/lib/libssl/src/doc/crypto/EC_KEY_new.pod4
-rw-r--r--src/lib/libssl/src/doc/crypto/EVP_BytesToKey.pod2
-rw-r--r--src/lib/libssl/src/doc/crypto/EVP_DigestSignInit.pod2
-rw-r--r--src/lib/libssl/src/doc/crypto/EVP_EncryptInit.pod2
-rw-r--r--src/lib/libssl/src/doc/crypto/EVP_PKEY_CTX_ctrl.pod2
-rw-r--r--src/lib/libssl/src/doc/crypto/EVP_PKEY_CTX_new.pod2
-rw-r--r--src/lib/libssl/src/doc/crypto/EVP_PKEY_cmp.pod4
-rw-r--r--src/lib/libssl/src/doc/crypto/EVP_PKEY_keygen.pod6
-rw-r--r--src/lib/libssl/src/doc/crypto/OBJ_nid2obj.pod2
-rw-r--r--src/lib/libssl/src/doc/crypto/PKCS12_create.pod4
-rw-r--r--src/lib/libssl/src/doc/crypto/PKCS7_sign.pod4
-rw-r--r--src/lib/libssl/src/doc/crypto/PKCS7_sign_add_signer.pod4
-rw-r--r--src/lib/libssl/src/doc/crypto/PKCS7_verify.pod2
-rw-r--r--src/lib/libssl/src/doc/crypto/SMIME_write_PKCS7.pod2
-rw-r--r--src/lib/libssl/src/doc/crypto/X509_NAME_add_entry_by_txt.pod2
-rw-r--r--src/lib/libssl/src/doc/crypto/X509_NAME_get_index_by_NID.pod2
-rw-r--r--src/lib/libssl/src/doc/crypto/X509_STORE_CTX_get_error.pod10
-rw-r--r--src/lib/libssl/src/doc/crypto/X509_STORE_CTX_new.pod6
-rw-r--r--src/lib/libssl/src/doc/crypto/X509_VERIFY_PARAM_set_flags.pod2
-rw-r--r--src/lib/libssl/src/doc/crypto/X509_verify_cert.pod4
-rw-r--r--src/lib/libssl/src/doc/crypto/d2i_DSAPublicKey.pod2
-rw-r--r--src/lib/libssl/src/doc/crypto/engine.pod4
51 files changed, 88 insertions, 88 deletions
diff --git a/src/lib/libcrypto/doc/EC_GROUP_copy.pod b/src/lib/libcrypto/doc/EC_GROUP_copy.pod
index 49dc01ced1..d4896af1d5 100644
--- a/src/lib/libcrypto/doc/EC_GROUP_copy.pod
+++ b/src/lib/libcrypto/doc/EC_GROUP_copy.pod
@@ -74,7 +74,7 @@ If the asn1_flag is 1 then this is a named curve with an associated ASN1 OID. If
74EC_GROUP_get_asn1_flag and EC_GROUP_set_asn1_flag get and set the status of the asn1_flag for the curve. If set then 74EC_GROUP_get_asn1_flag and EC_GROUP_set_asn1_flag get and set the status of the asn1_flag for the curve. If set then
75the curve_name must also be set. 75the curve_name must also be set.
76 76
77The point_coversion_form for a curve controls how EC_POINT data is encoded as ASN1 as defined in X9.62 (ECDSA). 77The point_conversion_form for a curve controls how EC_POINT data is encoded as ASN1 as defined in X9.62 (ECDSA).
78point_conversion_form_t is an enum defined as follows: 78point_conversion_form_t is an enum defined as follows:
79 79
80 typedef enum { 80 typedef enum {
@@ -135,7 +135,7 @@ or a pentanomial of the form:
135f(x) = x^m + x^k3 + x^k2 + x^k1 + 1 with m > k3 > k2 > k1 >= 1 135f(x) = x^m + x^k3 + x^k2 + x^k1 + 1 with m > k3 > k2 > k1 >= 1
136 136
137The function EC_GROUP_get_basis_type returns a NID identifying whether a trinomial or pentanomial is in use for the field. The 137The function EC_GROUP_get_basis_type returns a NID identifying whether a trinomial or pentanomial is in use for the field. The
138function EC_GROUP_get_trinomial_basis must only be called where f(x) is of the trinomial form, and returns the value of B<k>. Similary 138function EC_GROUP_get_trinomial_basis must only be called where f(x) is of the trinomial form, and returns the value of B<k>. Similarly
139the function EC_GROUP_get_pentanomial_basis must only be called where f(x) is of the pentanomial form, and returns the values of B<k1>, 139the function EC_GROUP_get_pentanomial_basis must only be called where f(x) is of the pentanomial form, and returns the values of B<k1>,
140B<k2> and B<k3> respectively. 140B<k2> and B<k3> respectively.
141 141
diff --git a/src/lib/libcrypto/doc/EC_GROUP_new.pod b/src/lib/libcrypto/doc/EC_GROUP_new.pod
index ff55bf33a3..9ab3566e65 100644
--- a/src/lib/libcrypto/doc/EC_GROUP_new.pod
+++ b/src/lib/libcrypto/doc/EC_GROUP_new.pod
@@ -48,8 +48,8 @@ EC_GROUP_set_curve_GFp sets the curve parameters B<p>, B<a> and B<b> for a curve
48EC_group_get_curve_GFp obtains the previously set curve parameters. 48EC_group_get_curve_GFp obtains the previously set curve parameters.
49 49
50EC_GROUP_set_curve_GF2m sets the equivalent curve parameters for a curve over F2^m. In this case B<p> represents 50EC_GROUP_set_curve_GF2m sets the equivalent curve parameters for a curve over F2^m. In this case B<p> represents
51the irreducible polybnomial - each bit represents a term in the polynomial. Therefore there will either be three 51the irreducible polynomial - each bit represents a term in the polynomial. Therefore there will either be three
52or five bits set dependant on whether the polynomial is a trinomial or a pentanomial. 52or five bits set dependent on whether the polynomial is a trinomial or a pentanomial.
53EC_group_get_curve_GF2m obtains the previously set curve parameters. 53EC_group_get_curve_GF2m obtains the previously set curve parameters.
54 54
55The functions EC_GROUP_new_curve_GFp and EC_GROUP_new_curve_GF2m are shortcuts for calling EC_GROUP_new and the 55The functions EC_GROUP_new_curve_GFp and EC_GROUP_new_curve_GF2m are shortcuts for calling EC_GROUP_new and the
diff --git a/src/lib/libcrypto/doc/EC_KEY_new.pod b/src/lib/libcrypto/doc/EC_KEY_new.pod
index 7f8f991ac7..02d7bac82c 100644
--- a/src/lib/libcrypto/doc/EC_KEY_new.pod
+++ b/src/lib/libcrypto/doc/EC_KEY_new.pod
@@ -40,7 +40,7 @@ EC_KEY_new, EC_KEY_get_flags, EC_KEY_set_flags, EC_KEY_clear_flags, EC_KEY_new_b
40 40
41=head1 DESCRIPTION 41=head1 DESCRIPTION
42 42
43An EC_KEY represents a public key and (optionaly) an associated private key. A new EC_KEY (with no associated curve) can be constructed by calling EC_KEY_new. 43An EC_KEY represents a public key and (optionally) an associated private key. A new EC_KEY (with no associated curve) can be constructed by calling EC_KEY_new.
44The reference count for the newly created EC_KEY is initially set to 1. A curve can be associated with the EC_KEY by calling 44The reference count for the newly created EC_KEY is initially set to 1. A curve can be associated with the EC_KEY by calling
45EC_KEY_set_group. 45EC_KEY_set_group.
46 46
@@ -77,7 +77,7 @@ along with the private key. If EC_PKEY_NO_PUBKEY is set then the public key is n
77The functions EC_KEY_get_conv_form and EC_KEY_set_conv_form get and set the point_conversion_form for the B<key>. For a description 77The functions EC_KEY_get_conv_form and EC_KEY_set_conv_form get and set the point_conversion_form for the B<key>. For a description
78of point_conversion_forms please refer to L<EC_POINT_new(3)|EC_POINT_new(3)>. 78of point_conversion_forms please refer to L<EC_POINT_new(3)|EC_POINT_new(3)>.
79 79
80EC_KEY_insert_key_method_data and EC_KEY_get_key_method_data enable the caller to associate arbitary additional data specific to the 80EC_KEY_insert_key_method_data and EC_KEY_get_key_method_data enable the caller to associate arbitrary additional data specific to the
81elliptic curve scheme being used with the EC_KEY object. This data is treated as a "black box" by the ec library. The data to be stored by EC_KEY_insert_key_method_data is provided in the B<data> parameter, which must have associated functions for duplicating, freeing and "clear_freeing" the data item. If a subsequent EC_KEY_get_key_method_data call is issued, the functions for duplicating, freeing and "clear_freeing" the data item must be provided again, and they must be the same as they were when the data item was inserted. 81elliptic curve scheme being used with the EC_KEY object. This data is treated as a "black box" by the ec library. The data to be stored by EC_KEY_insert_key_method_data is provided in the B<data> parameter, which must have associated functions for duplicating, freeing and "clear_freeing" the data item. If a subsequent EC_KEY_get_key_method_data call is issued, the functions for duplicating, freeing and "clear_freeing" the data item must be provided again, and they must be the same as they were when the data item was inserted.
82 82
83EC_KEY_set_flags sets the flags in the B<flags> parameter on the EC_KEY object. Any flags that are already set are left set. The currently defined standard flags are EC_FLAG_NON_FIPS_ALLOW and EC_FLAG_FIPS_CHECKED. In addition there is the flag EC_FLAG_COFACTOR_ECDH which is specific to ECDH and is defined in ecdh.h. EC_KEY_get_flags returns the current flags that are set for this EC_KEY. EC_KEY_clear_flags clears the flags indicated by the B<flags> parameter. All other flags are left in their existing state. 83EC_KEY_set_flags sets the flags in the B<flags> parameter on the EC_KEY object. Any flags that are already set are left set. The currently defined standard flags are EC_FLAG_NON_FIPS_ALLOW and EC_FLAG_FIPS_CHECKED. In addition there is the flag EC_FLAG_COFACTOR_ECDH which is specific to ECDH and is defined in ecdh.h. EC_KEY_get_flags returns the current flags that are set for this EC_KEY. EC_KEY_clear_flags clears the flags indicated by the B<flags> parameter. All other flags are left in their existing state.
diff --git a/src/lib/libcrypto/doc/EVP_BytesToKey.pod b/src/lib/libcrypto/doc/EVP_BytesToKey.pod
index a27146f5c9..2dffaa1efa 100644
--- a/src/lib/libcrypto/doc/EVP_BytesToKey.pod
+++ b/src/lib/libcrypto/doc/EVP_BytesToKey.pod
@@ -46,7 +46,7 @@ enough data is available for the key and IV. D_i is defined as:
46 46
47 D_i = HASH^count(D_(i-1) || data || salt) 47 D_i = HASH^count(D_(i-1) || data || salt)
48 48
49where || denotes concatentaion, D_0 is empty, HASH is the digest 49where || denotes concatenation, D_0 is empty, HASH is the digest
50algorithm in use, HASH^1(data) is simply HASH(data), HASH^2(data) 50algorithm in use, HASH^1(data) is simply HASH(data), HASH^2(data)
51is HASH(HASH(data)) and so on. 51is HASH(HASH(data)) and so on.
52 52
diff --git a/src/lib/libcrypto/doc/EVP_DigestSignInit.pod b/src/lib/libcrypto/doc/EVP_DigestSignInit.pod
index 7fd4c22e79..00205d2ae9 100644
--- a/src/lib/libcrypto/doc/EVP_DigestSignInit.pod
+++ b/src/lib/libcrypto/doc/EVP_DigestSignInit.pod
@@ -27,7 +27,7 @@ be used to set alternative signing options.
27EVP_DigestSignUpdate() hashes B<cnt> bytes of data at B<d> into the 27EVP_DigestSignUpdate() hashes B<cnt> bytes of data at B<d> into the
28signature context B<ctx>. This function can be called several times on the 28signature context B<ctx>. This function can be called several times on the
29same B<ctx> to include additional data. This function is currently implemented 29same B<ctx> to include additional data. This function is currently implemented
30usig a macro. 30using a macro.
31 31
32EVP_DigestSignFinal() signs the data in B<ctx> places the signature in B<sig>. 32EVP_DigestSignFinal() signs the data in B<ctx> places the signature in B<sig>.
33If B<sig> is B<NULL> then the maximum size of the output buffer is written to 33If B<sig> is B<NULL> then the maximum size of the output buffer is written to
diff --git a/src/lib/libcrypto/doc/EVP_EncryptInit.pod b/src/lib/libcrypto/doc/EVP_EncryptInit.pod
index a0a782e772..e9254de3d2 100644
--- a/src/lib/libcrypto/doc/EVP_EncryptInit.pod
+++ b/src/lib/libcrypto/doc/EVP_EncryptInit.pod
@@ -105,7 +105,7 @@ EVP_aes_192_ccm, EVP_aes_256_ccm - EVP cipher routines
105The EVP cipher routines are a high level interface to certain 105The EVP cipher routines are a high level interface to certain
106symmetric ciphers. 106symmetric ciphers.
107 107
108EVP_CIPHER_CTX_init() initializes cipher contex B<ctx>. 108EVP_CIPHER_CTX_init() initializes cipher context B<ctx>.
109 109
110EVP_EncryptInit_ex() sets up cipher context B<ctx> for encryption 110EVP_EncryptInit_ex() sets up cipher context B<ctx> for encryption
111with cipher B<type> from ENGINE B<impl>. B<ctx> must be initialized 111with cipher B<type> from ENGINE B<impl>. B<ctx> must be initialized
diff --git a/src/lib/libcrypto/doc/EVP_PKEY_CTX_ctrl.pod b/src/lib/libcrypto/doc/EVP_PKEY_CTX_ctrl.pod
index 91125da62e..e8776e1e67 100644
--- a/src/lib/libcrypto/doc/EVP_PKEY_CTX_ctrl.pod
+++ b/src/lib/libcrypto/doc/EVP_PKEY_CTX_ctrl.pod
@@ -90,7 +90,7 @@ B<PSS> block structure. If this macro is not called a salt length value of -2
90is used by default. 90is used by default.
91 91
92The EVP_PKEY_CTX_set_rsa_rsa_keygen_bits() macro sets the RSA key length for 92The EVP_PKEY_CTX_set_rsa_rsa_keygen_bits() macro sets the RSA key length for
93RSA key genration to B<bits>. If not specified 1024 bits is used. 93RSA key generation to B<bits>. If not specified 1024 bits is used.
94 94
95The EVP_PKEY_CTX_set_rsa_keygen_pubexp() macro sets the public exponent value 95The EVP_PKEY_CTX_set_rsa_keygen_pubexp() macro sets the public exponent value
96for RSA key generation to B<pubexp> currently it should be an odd integer. The 96for RSA key generation to B<pubexp> currently it should be an odd integer. The
diff --git a/src/lib/libcrypto/doc/EVP_PKEY_CTX_new.pod b/src/lib/libcrypto/doc/EVP_PKEY_CTX_new.pod
index 9822d6806f..60ad61e853 100644
--- a/src/lib/libcrypto/doc/EVP_PKEY_CTX_new.pod
+++ b/src/lib/libcrypto/doc/EVP_PKEY_CTX_new.pod
@@ -22,7 +22,7 @@ the algorithm specified in B<pkey> and ENGINE B<e>.
22The EVP_PKEY_CTX_new_id() function allocates public key algorithm context 22The EVP_PKEY_CTX_new_id() function allocates public key algorithm context
23using the algorithm specified by B<id> and ENGINE B<e>. It is normally used 23using the algorithm specified by B<id> and ENGINE B<e>. It is normally used
24when no B<EVP_PKEY> structure is associated with the operations, for example 24when no B<EVP_PKEY> structure is associated with the operations, for example
25during parameter generation of key genration for some algorithms. 25during parameter generation of key generation for some algorithms.
26 26
27EVP_PKEY_CTX_dup() duplicates the context B<ctx>. 27EVP_PKEY_CTX_dup() duplicates the context B<ctx>.
28 28
diff --git a/src/lib/libcrypto/doc/EVP_PKEY_cmp.pod b/src/lib/libcrypto/doc/EVP_PKEY_cmp.pod
index c389216086..7a690247bf 100644
--- a/src/lib/libcrypto/doc/EVP_PKEY_cmp.pod
+++ b/src/lib/libcrypto/doc/EVP_PKEY_cmp.pod
@@ -24,10 +24,10 @@ doesn't use parameters.
24The function EVP_PKEY_copy_parameters() copies the parameters from key 24The function EVP_PKEY_copy_parameters() copies the parameters from key
25B<from> to key B<to>. 25B<from> to key B<to>.
26 26
27The funcion EVP_PKEY_cmp_parameters() compares the parameters of keys 27The function EVP_PKEY_cmp_parameters() compares the parameters of keys
28B<a> and B<b>. 28B<a> and B<b>.
29 29
30The funcion EVP_PKEY_cmp() compares the public key components and paramters 30The function EVP_PKEY_cmp() compares the public key components and parameters
31(if present) of keys B<a> and B<b>. 31(if present) of keys B<a> and B<b>.
32 32
33=head1 NOTES 33=head1 NOTES
diff --git a/src/lib/libcrypto/doc/EVP_PKEY_keygen.pod b/src/lib/libcrypto/doc/EVP_PKEY_keygen.pod
index 05ea04be11..463c44170e 100644
--- a/src/lib/libcrypto/doc/EVP_PKEY_keygen.pod
+++ b/src/lib/libcrypto/doc/EVP_PKEY_keygen.pod
@@ -29,7 +29,7 @@ EVP_PKEY_CTX_get_app_data - key and parameter generation functions
29=head1 DESCRIPTION 29=head1 DESCRIPTION
30 30
31The EVP_PKEY_keygen_init() function initializes a public key algorithm 31The EVP_PKEY_keygen_init() function initializes a public key algorithm
32context using key B<pkey> for a key genration operation. 32context using key B<pkey> for a key generation operation.
33 33
34The EVP_PKEY_keygen() function performs a key generation operation, the 34The EVP_PKEY_keygen() function performs a key generation operation, the
35generated key is written to B<ppkey>. 35generated key is written to B<ppkey>.
@@ -47,7 +47,7 @@ parameters available is returned. Any non negative value returns the value of
47that parameter. EVP_PKEY_CTX_gen_keygen_info() with a non-negative value for 47that parameter. EVP_PKEY_CTX_gen_keygen_info() with a non-negative value for
48B<idx> should only be called within the generation callback. 48B<idx> should only be called within the generation callback.
49 49
50If the callback returns 0 then the key genration operation is aborted and an 50If the callback returns 0 then the key generation operation is aborted and an
51error occurs. This might occur during a time consuming operation where 51error occurs. This might occur during a time consuming operation where
52a user clicks on a "cancel" button. 52a user clicks on a "cancel" button.
53 53
@@ -67,7 +67,7 @@ once on the same context if several operations are performed using the same
67parameters. 67parameters.
68 68
69The meaning of the parameters passed to the callback will depend on the 69The meaning of the parameters passed to the callback will depend on the
70algorithm and the specifiic implementation of the algorithm. Some might not 70algorithm and the specific implementation of the algorithm. Some might not
71give any useful information at all during key or parameter generation. Others 71give any useful information at all during key or parameter generation. Others
72might not even call the callback. 72might not even call the callback.
73 73
diff --git a/src/lib/libcrypto/doc/OBJ_nid2obj.pod b/src/lib/libcrypto/doc/OBJ_nid2obj.pod
index 3656390ead..95949ac091 100644
--- a/src/lib/libcrypto/doc/OBJ_nid2obj.pod
+++ b/src/lib/libcrypto/doc/OBJ_nid2obj.pod
@@ -43,7 +43,7 @@ for the object B<o>, the long name <ln> or the short name <sn> respectively
43or NID_undef if an error occurred. 43or NID_undef if an error occurred.
44 44
45OBJ_txt2nid() returns NID corresponding to text string <s>. B<s> can be 45OBJ_txt2nid() returns NID corresponding to text string <s>. B<s> can be
46a long name, a short name or the numerical respresentation of an object. 46a long name, a short name or the numerical representation of an object.
47 47
48OBJ_txt2obj() converts the text string B<s> into an ASN1_OBJECT structure. 48OBJ_txt2obj() converts the text string B<s> into an ASN1_OBJECT structure.
49If B<no_name> is 0 then long names and short names will be interpreted 49If B<no_name> is 0 then long names and short names will be interpreted
diff --git a/src/lib/libcrypto/doc/PKCS12_create.pod b/src/lib/libcrypto/doc/PKCS12_create.pod
index 12fbd20b8a..3b27c11a10 100644
--- a/src/lib/libcrypto/doc/PKCS12_create.pod
+++ b/src/lib/libcrypto/doc/PKCS12_create.pod
@@ -17,11 +17,11 @@ PKCS12_create - create a PKCS#12 structure
17PKCS12_create() creates a PKCS#12 structure. 17PKCS12_create() creates a PKCS#12 structure.
18 18
19B<pass> is the passphrase to use. B<name> is the B<friendlyName> to use for 19B<pass> is the passphrase to use. B<name> is the B<friendlyName> to use for
20the supplied certifictate and key. B<pkey> is the private key to include in 20the supplied certificate and key. B<pkey> is the private key to include in
21the structure and B<cert> its corresponding certificates. B<ca> is an optional 21the structure and B<cert> its corresponding certificates. B<ca> is an optional
22set of certificates to also include in the structure. 22set of certificates to also include in the structure.
23Either B<pkey>, B<cert> or both can be B<NULL> to indicate that no key or 23Either B<pkey>, B<cert> or both can be B<NULL> to indicate that no key or
24certficate is required. 24certificate is required.
25 25
26B<nid_key> and B<nid_cert> are the encryption algorithms that should be used 26B<nid_key> and B<nid_cert> are the encryption algorithms that should be used
27for the key and certificate respectively. If either B<nid_key> or B<nid_cert> 27for the key and certificate respectively. If either B<nid_key> or B<nid_cert>
diff --git a/src/lib/libcrypto/doc/PKCS7_sign.pod b/src/lib/libcrypto/doc/PKCS7_sign.pod
index 9a4f5b173e..64a3036c0a 100644
--- a/src/lib/libcrypto/doc/PKCS7_sign.pod
+++ b/src/lib/libcrypto/doc/PKCS7_sign.pod
@@ -13,7 +13,7 @@ PKCS7_sign - create a PKCS#7 signedData structure
13=head1 DESCRIPTION 13=head1 DESCRIPTION
14 14
15PKCS7_sign() creates and returns a PKCS#7 signedData structure. B<signcert> is 15PKCS7_sign() creates and returns a PKCS#7 signedData structure. B<signcert> is
16the certificate to sign with, B<pkey> is the corresponsding private key. 16the certificate to sign with, B<pkey> is the corresponding private key.
17B<certs> is an optional additional set of certificates to include in the PKCS#7 17B<certs> is an optional additional set of certificates to include in the PKCS#7
18structure (for example any intermediate CAs in the chain). 18structure (for example any intermediate CAs in the chain).
19 19
@@ -46,7 +46,7 @@ required by the S/MIME specifications) if B<PKCS7_BINARY> is set no translation
46occurs. This option should be used if the supplied data is in binary format 46occurs. This option should be used if the supplied data is in binary format
47otherwise the translation will corrupt it. 47otherwise the translation will corrupt it.
48 48
49The signedData structure includes several PKCS#7 autenticatedAttributes 49The signedData structure includes several PKCS#7 authenticatedAttributes
50including the signing time, the PKCS#7 content type and the supported list of 50including the signing time, the PKCS#7 content type and the supported list of
51ciphers in an SMIMECapabilities attribute. If B<PKCS7_NOATTR> is set then no 51ciphers in an SMIMECapabilities attribute. If B<PKCS7_NOATTR> is set then no
52authenticatedAttributes will be used. If B<PKCS7_NOSMIMECAP> is set then just 52authenticatedAttributes will be used. If B<PKCS7_NOSMIMECAP> is set then just
diff --git a/src/lib/libcrypto/doc/PKCS7_sign_add_signer.pod b/src/lib/libcrypto/doc/PKCS7_sign_add_signer.pod
index afe8ad97cd..280455d476 100644
--- a/src/lib/libcrypto/doc/PKCS7_sign_add_signer.pod
+++ b/src/lib/libcrypto/doc/PKCS7_sign_add_signer.pod
@@ -40,7 +40,7 @@ Any of the following flags (ored together) can be passed in the B<flags>
40parameter. 40parameter.
41 41
42If B<PKCS7_REUSE_DIGEST> is set then an attempt is made to copy the content 42If B<PKCS7_REUSE_DIGEST> is set then an attempt is made to copy the content
43digest value from the PKCS7 struture: to add a signer to an existing structure. 43digest value from the PKCS7 structure: to add a signer to an existing structure.
44An error occurs if a matching digest value cannot be found to copy. The 44An error occurs if a matching digest value cannot be found to copy. The
45returned PKCS7 structure will be valid and finalized when this flag is set. 45returned PKCS7 structure will be valid and finalized when this flag is set.
46 46
@@ -55,7 +55,7 @@ B<signcert> parameter though. This can reduce the size of the signature if the
55signers certificate can be obtained by other means: for example a previously 55signers certificate can be obtained by other means: for example a previously
56signed message. 56signed message.
57 57
58The signedData structure includes several PKCS#7 autenticatedAttributes 58The signedData structure includes several PKCS#7 authenticatedAttributes
59including the signing time, the PKCS#7 content type and the supported list of 59including the signing time, the PKCS#7 content type and the supported list of
60ciphers in an SMIMECapabilities attribute. If B<PKCS7_NOATTR> is set then no 60ciphers in an SMIMECapabilities attribute. If B<PKCS7_NOATTR> is set then no
61authenticatedAttributes will be used. If B<PKCS7_NOSMIMECAP> is set then just 61authenticatedAttributes will be used. If B<PKCS7_NOSMIMECAP> is set then just
diff --git a/src/lib/libcrypto/doc/PKCS7_verify.pod b/src/lib/libcrypto/doc/PKCS7_verify.pod
index 781c6108a9..059fbff8e9 100644
--- a/src/lib/libcrypto/doc/PKCS7_verify.pod
+++ b/src/lib/libcrypto/doc/PKCS7_verify.pod
@@ -16,7 +16,7 @@ PKCS7_verify, PKCS7_get0_signers - verify a PKCS#7 signedData structure
16 16
17PKCS7_verify() verifies a PKCS#7 signedData structure. B<p7> is the PKCS7 17PKCS7_verify() verifies a PKCS#7 signedData structure. B<p7> is the PKCS7
18structure to verify. B<certs> is a set of certificates in which to search for 18structure to verify. B<certs> is a set of certificates in which to search for
19the signer's certificate. B<store> is a trusted certficate store (used for 19the signer's certificate. B<store> is a trusted certificate store (used for
20chain verification). B<indata> is the signed data if the content is not 20chain verification). B<indata> is the signed data if the content is not
21present in B<p7> (that is it is detached). The content is written to B<out> 21present in B<p7> (that is it is detached). The content is written to B<out>
22if it is not NULL. 22if it is not NULL.
diff --git a/src/lib/libcrypto/doc/SMIME_write_PKCS7.pod b/src/lib/libcrypto/doc/SMIME_write_PKCS7.pod
index ca6bd02763..4a7cd08c42 100644
--- a/src/lib/libcrypto/doc/SMIME_write_PKCS7.pod
+++ b/src/lib/libcrypto/doc/SMIME_write_PKCS7.pod
@@ -40,7 +40,7 @@ the data must be read twice: once to compute the signature in PKCS7_sign()
40and once to output the S/MIME message. 40and once to output the S/MIME message.
41 41
42If streaming is performed the content is output in BER format using indefinite 42If streaming is performed the content is output in BER format using indefinite
43length constructuted encoding except in the case of signed data with detached 43length constructed encoding except in the case of signed data with detached
44content where the content is absent and DER format is used. 44content where the content is absent and DER format is used.
45 45
46=head1 BUGS 46=head1 BUGS
diff --git a/src/lib/libcrypto/doc/X509_NAME_add_entry_by_txt.pod b/src/lib/libcrypto/doc/X509_NAME_add_entry_by_txt.pod
index c6442b947f..f97e05e683 100644
--- a/src/lib/libcrypto/doc/X509_NAME_add_entry_by_txt.pod
+++ b/src/lib/libcrypto/doc/X509_NAME_add_entry_by_txt.pod
@@ -45,7 +45,7 @@ B<loc>. The deleted entry is returned and must be freed up.
45=head1 NOTES 45=head1 NOTES
46 46
47The use of string types such as B<MBSTRING_ASC> or B<MBSTRING_UTF8> 47The use of string types such as B<MBSTRING_ASC> or B<MBSTRING_UTF8>
48is strongly recommened for the B<type> parameter. This allows the 48is strongly recommended for the B<type> parameter. This allows the
49internal code to correctly determine the type of the field and to 49internal code to correctly determine the type of the field and to
50apply length checks according to the relevant standards. This is 50apply length checks according to the relevant standards. This is
51done using ASN1_STRING_set_by_NID(). 51done using ASN1_STRING_set_by_NID().
diff --git a/src/lib/libcrypto/doc/X509_NAME_get_index_by_NID.pod b/src/lib/libcrypto/doc/X509_NAME_get_index_by_NID.pod
index 988fd7bdaf..48510890e8 100644
--- a/src/lib/libcrypto/doc/X509_NAME_get_index_by_NID.pod
+++ b/src/lib/libcrypto/doc/X509_NAME_get_index_by_NID.pod
@@ -51,7 +51,7 @@ X509_NAME_get_text_by_NID() and X509_NAME_get_text_by_OBJ() are
51legacy functions which have various limitations which make them 51legacy functions which have various limitations which make them
52of minimal use in practice. They can only find the first matching 52of minimal use in practice. They can only find the first matching
53entry and will copy the contents of the field verbatim: this can 53entry and will copy the contents of the field verbatim: this can
54be highly confusing if the target is a muticharacter string type 54be highly confusing if the target is a multicharacter string type
55like a BMPString or a UTF8String. 55like a BMPString or a UTF8String.
56 56
57For a more general solution X509_NAME_get_index_by_NID() or 57For a more general solution X509_NAME_get_index_by_NID() or
diff --git a/src/lib/libcrypto/doc/X509_STORE_CTX_get_error.pod b/src/lib/libcrypto/doc/X509_STORE_CTX_get_error.pod
index e4339dc28f..270b265ce5 100644
--- a/src/lib/libcrypto/doc/X509_STORE_CTX_get_error.pod
+++ b/src/lib/libcrypto/doc/X509_STORE_CTX_get_error.pod
@@ -35,7 +35,7 @@ checks.
35 35
36X509_STORE_CTX_get_error_depth() returns the B<depth> of the error. This is a 36X509_STORE_CTX_get_error_depth() returns the B<depth> of the error. This is a
37non-negative integer representing where in the certificate chain the error 37non-negative integer representing where in the certificate chain the error
38occurred. If it is zero it occured in the end entity certificate, one if 38occurred. If it is zero it occurred in the end entity certificate, one if
39it is the certificate which signed the end entity certificate and so on. 39it is the certificate which signed the end entity certificate and so on.
40 40
41X509_STORE_CTX_get_current_cert() returns the certificate in B<ctx> which 41X509_STORE_CTX_get_current_cert() returns the certificate in B<ctx> which
@@ -58,7 +58,7 @@ X509_STORE_CTX_get_error() returns B<X509_V_OK> or an error code.
58 58
59X509_STORE_CTX_get_error_depth() returns a non-negative error depth. 59X509_STORE_CTX_get_error_depth() returns a non-negative error depth.
60 60
61X509_STORE_CTX_get_current_cert() returns the cerificate which caused the 61X509_STORE_CTX_get_current_cert() returns the certificate which caused the
62error or B<NULL> if no certificate is relevant to the error. 62error or B<NULL> if no certificate is relevant to the error.
63 63
64X509_verify_cert_error_string() returns a human readable error string for 64X509_verify_cert_error_string() returns a human readable error string for
@@ -265,11 +265,11 @@ Some feature of a certificate extension is not supported. Unused.
265 265
266=item B<X509_V_ERR_PERMITTED_VIOLATION: permitted subtree violation> 266=item B<X509_V_ERR_PERMITTED_VIOLATION: permitted subtree violation>
267 267
268A name constraint violation occured in the permitted subtrees. 268A name constraint violation occurred in the permitted subtrees.
269 269
270=item B<X509_V_ERR_EXCLUDED_VIOLATION: excluded subtree violation> 270=item B<X509_V_ERR_EXCLUDED_VIOLATION: excluded subtree violation>
271 271
272A name constraint violation occured in the excluded subtrees. 272A name constraint violation occurred in the excluded subtrees.
273 273
274=item B<X509_V_ERR_SUBTREE_MINMAX: name constraints minimum and maximum not 274=item B<X509_V_ERR_SUBTREE_MINMAX: name constraints minimum and maximum not
275supported> 275supported>
@@ -292,7 +292,7 @@ a garbage extension or some new feature not currently supported.
292 292
293=item B<X509_V_ERR_CRL_PATH_VALIDATION_ERROR: CRL path validation error> 293=item B<X509_V_ERR_CRL_PATH_VALIDATION_ERROR: CRL path validation error>
294 294
295An error occured when attempting to verify the CRL path. This error can only 295An error occurred when attempting to verify the CRL path. This error can only
296happen if extended CRL checking is enabled. 296happen if extended CRL checking is enabled.
297 297
298=item B<X509_V_ERR_APPLICATION_VERIFICATION: application verification failure> 298=item B<X509_V_ERR_APPLICATION_VERIFICATION: application verification failure>
diff --git a/src/lib/libcrypto/doc/X509_STORE_CTX_new.pod b/src/lib/libcrypto/doc/X509_STORE_CTX_new.pod
index 8f602274ee..66c0da04d2 100644
--- a/src/lib/libcrypto/doc/X509_STORE_CTX_new.pod
+++ b/src/lib/libcrypto/doc/X509_STORE_CTX_new.pod
@@ -52,7 +52,7 @@ X509_STORE_CTX_trusted_stack() sets the set of trusted certificates of B<ctx>
52to B<sk>. This is an alternative way of specifying trusted certificates 52to B<sk>. This is an alternative way of specifying trusted certificates
53instead of using an B<X509_STORE>. 53instead of using an B<X509_STORE>.
54 54
55X509_STORE_CTX_set_cert() sets the certificate to be vertified in B<ctx> to 55X509_STORE_CTX_set_cert() sets the certificate to be verified in B<ctx> to
56B<x>. 56B<x>.
57 57
58X509_STORE_CTX_set_chain() sets the additional certificate chain used by B<ctx> 58X509_STORE_CTX_set_chain() sets the additional certificate chain used by B<ctx>
@@ -64,10 +64,10 @@ enabled in the associated B<X509_VERIFY_PARAM> structure. This might be
64used where additional "useful" CRLs are supplied as part of a protocol, 64used where additional "useful" CRLs are supplied as part of a protocol,
65for example in a PKCS#7 structure. 65for example in a PKCS#7 structure.
66 66
67X509_VERIFY_PARAM *X509_STORE_CTX_get0_param() retrieves an intenal pointer 67X509_VERIFY_PARAM *X509_STORE_CTX_get0_param() retrieves an internal pointer
68to the verification parameters associated with B<ctx>. 68to the verification parameters associated with B<ctx>.
69 69
70X509_STORE_CTX_set0_param() sets the intenal verification parameter pointer 70X509_STORE_CTX_set0_param() sets the internal verification parameter pointer
71to B<param>. After this call B<param> should not be used. 71to B<param>. After this call B<param> should not be used.
72 72
73X509_STORE_CTX_set_default() looks up and sets the default verification 73X509_STORE_CTX_set_default() looks up and sets the default verification
diff --git a/src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod b/src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod
index 6acdd71e72..6c88aec49e 100644
--- a/src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod
+++ b/src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod
@@ -126,7 +126,7 @@ If B<X509_V_FLAG_USE_DELTAS> ise set delta CRLs (if present) are used to
126determine certificate status. If not set deltas are ignored. 126determine certificate status. If not set deltas are ignored.
127 127
128B<X509_V_FLAG_CHECK_SS_SIGNATURE> enables checking of the root CA self signed 128B<X509_V_FLAG_CHECK_SS_SIGNATURE> enables checking of the root CA self signed
129cerificate signature. By default this check is disabled because it doesn't 129certificate signature. By default this check is disabled because it doesn't
130add any additional security but in some cases applications might want to 130add any additional security but in some cases applications might want to
131check the signature anyway. A side effect of not checking the root CA 131check the signature anyway. A side effect of not checking the root CA
132signature is that disabled or unsupported message digests on the root CA 132signature is that disabled or unsupported message digests on the root CA
diff --git a/src/lib/libcrypto/doc/X509_verify_cert.pod b/src/lib/libcrypto/doc/X509_verify_cert.pod
index 5253bdcd70..f05edd8333 100644
--- a/src/lib/libcrypto/doc/X509_verify_cert.pod
+++ b/src/lib/libcrypto/doc/X509_verify_cert.pod
@@ -2,7 +2,7 @@
2 2
3=head1 NAME 3=head1 NAME
4 4
5X509_verify_cert - discover and verify X509 certificte chain 5X509_verify_cert - discover and verify X509 certificate chain
6 6
7=head1 SYNOPSIS 7=head1 SYNOPSIS
8 8
@@ -40,7 +40,7 @@ for <= 0 return value on error.
40=head1 BUGS 40=head1 BUGS
41 41
42This function uses the header B<x509.h> as opposed to most chain verification 42This function uses the header B<x509.h> as opposed to most chain verification
43functiosn which use B<x509_vfy.h>. 43functions which use B<x509_vfy.h>.
44 44
45=head1 SEE ALSO 45=head1 SEE ALSO
46 46
diff --git a/src/lib/libcrypto/doc/d2i_DSAPublicKey.pod b/src/lib/libcrypto/doc/d2i_DSAPublicKey.pod
index eeb96c485f..10c49e3ad2 100644
--- a/src/lib/libcrypto/doc/d2i_DSAPublicKey.pod
+++ b/src/lib/libcrypto/doc/d2i_DSAPublicKey.pod
@@ -68,7 +68,7 @@ If B<write_params> is zero then only the B<pub_key> field is encoded as an
68B<INTEGER>. If B<write_params> is 1 then a B<SEQUENCE> consisting of the 68B<INTEGER>. If B<write_params> is 1 then a B<SEQUENCE> consisting of the
69B<p>, B<q>, B<g> and B<pub_key> respectively fields are encoded. 69B<p>, B<q>, B<g> and B<pub_key> respectively fields are encoded.
70 70
71The B<DSAPrivateKey> functions also use a non standard structure consiting 71The B<DSAPrivateKey> functions also use a non standard structure consisting
72consisting of a SEQUENCE containing the B<p>, B<q>, B<g> and B<pub_key> and 72consisting of a SEQUENCE containing the B<p>, B<q>, B<g> and B<pub_key> and
73B<priv_key> fields respectively. 73B<priv_key> fields respectively.
74 74
diff --git a/src/lib/libcrypto/doc/engine.pod b/src/lib/libcrypto/doc/engine.pod
index 8020112835..e305a73271 100644
--- a/src/lib/libcrypto/doc/engine.pod
+++ b/src/lib/libcrypto/doc/engine.pod
@@ -181,7 +181,7 @@ to use the pointer value at all, as this kind of reference is a guarantee
181that the structure can not be deallocated until the reference is released. 181that the structure can not be deallocated until the reference is released.
182 182
183However, a structural reference provides no guarantee that the ENGINE is 183However, a structural reference provides no guarantee that the ENGINE is
184initiliased and able to use any of its cryptographic 184initialised and able to use any of its cryptographic
185implementations. Indeed it's quite possible that most ENGINEs will not 185implementations. Indeed it's quite possible that most ENGINEs will not
186initialise at all in typical environments, as ENGINEs are typically used to 186initialise at all in typical environments, as ENGINEs are typically used to
187support specialised hardware. To use an ENGINE's functionality, you need a 187support specialised hardware. To use an ENGINE's functionality, you need a
@@ -573,7 +573,7 @@ for any higher-level ENGINE functions such as ENGINE_ctrl_cmd_string().
573by applications, administrations, users, etc. These can support arbitrary 573by applications, administrations, users, etc. These can support arbitrary
574operations via ENGINE_ctrl(), including passing to and/or from the control 574operations via ENGINE_ctrl(), including passing to and/or from the control
575commands data of any arbitrary type. These commands are supported in the 575commands data of any arbitrary type. These commands are supported in the
576discovery mechanisms simply to allow applications determinie if an ENGINE 576discovery mechanisms simply allow applications to determine if an ENGINE
577supports certain specific commands it might want to use (eg. application "foo" 577supports certain specific commands it might want to use (eg. application "foo"
578might query various ENGINEs to see if they implement "FOO_GET_VENDOR_LOGO_GIF" - 578might query various ENGINEs to see if they implement "FOO_GET_VENDOR_LOGO_GIF" -
579and ENGINE could therefore decide whether or not to support this "foo"-specific 579and ENGINE could therefore decide whether or not to support this "foo"-specific
diff --git a/src/lib/libcrypto/man/ASN1_generate_nconf.3 b/src/lib/libcrypto/man/ASN1_generate_nconf.3
index af5b1c8a5d..abea69c056 100644
--- a/src/lib/libcrypto/man/ASN1_generate_nconf.3
+++ b/src/lib/libcrypto/man/ASN1_generate_nconf.3
@@ -1,4 +1,4 @@
1.Dd $Mdocdate: September 9 2015 $ 1.Dd $Mdocdate: September 22 2015 $
2.Dt ASN1_GENERATE_NCONF 3 2.Dt ASN1_GENERATE_NCONF 3
3.Os 3.Os
4.Sh NAME 4.Sh NAME
@@ -251,7 +251,7 @@ A BITSTRING with bits 1 and 5 set and all others zero:
251.Dl FORMAT:BITLIST,BITSTRING:1,5 251.Dl FORMAT:BITLIST,BITSTRING:1,5
252.Pp 252.Pp
253A more complex example using a config file to produce a 253A more complex example using a config file to produce a
254SEQUENCE consiting of a BOOL an OID and a UTF8String: 254SEQUENCE consisting of a BOOL an OID and a UTF8String:
255.Bd -literal -offset indent 255.Bd -literal -offset indent
256asn1 = SEQUENCE:seq_section 256asn1 = SEQUENCE:seq_section
257 257
diff --git a/src/lib/libcrypto/man/BUF_MEM_new.3 b/src/lib/libcrypto/man/BUF_MEM_new.3
index a423d4e0bc..f87e4f8257 100644
--- a/src/lib/libcrypto/man/BUF_MEM_new.3
+++ b/src/lib/libcrypto/man/BUF_MEM_new.3
@@ -1,4 +1,4 @@
1.Dd $Mdocdate: May 24 2015 $ 1.Dd $Mdocdate: September 22 2015 $
2.Dt BUF_MEM_NEW 3 2.Dt BUF_MEM_NEW 3
3.Os 3.Os
4.Sh NAME 4.Sh NAME
@@ -76,7 +76,7 @@ will accept a
76argument and will return 76argument and will return
77.Dv NULL 77.Dv NULL
78in that case. 78in that case.
79Its use in new programes is discouraged. 79Its use in new programs is discouraged.
80.Pp 80.Pp
81The memory allocated from 81The memory allocated from
82.Fn BUF_strdup 82.Fn BUF_strdup
diff --git a/src/lib/libssl/src/doc/crypto/CONF_modules_load_file.pod b/src/lib/libssl/src/doc/crypto/CONF_modules_load_file.pod
index c7994560c0..e663ac5bc9 100644
--- a/src/lib/libssl/src/doc/crypto/CONF_modules_load_file.pod
+++ b/src/lib/libssl/src/doc/crypto/CONF_modules_load_file.pod
@@ -19,9 +19,9 @@ The function CONF_modules_load_file() configures OpenSSL using file
19B<filename> and application name B<appname>. If B<filename> is NULL 19B<filename> and application name B<appname>. If B<filename> is NULL
20the standard OpenSSL configuration file is used. If B<appname> is 20the standard OpenSSL configuration file is used. If B<appname> is
21NULL the standard OpenSSL application name B<openssl_conf> is used. 21NULL the standard OpenSSL application name B<openssl_conf> is used.
22The behaviour can be cutomized using B<flags>. 22The behaviour can be customized using B<flags>.
23 23
24CONF_modules_load() is idential to CONF_modules_load_file() except it 24CONF_modules_load() is identical to CONF_modules_load_file() except it
25read configuration information from B<cnf>. 25read configuration information from B<cnf>.
26 26
27=head1 NOTES 27=head1 NOTES
diff --git a/src/lib/libssl/src/doc/crypto/EC_GROUP_copy.pod b/src/lib/libssl/src/doc/crypto/EC_GROUP_copy.pod
index 49dc01ced1..d4896af1d5 100644
--- a/src/lib/libssl/src/doc/crypto/EC_GROUP_copy.pod
+++ b/src/lib/libssl/src/doc/crypto/EC_GROUP_copy.pod
@@ -74,7 +74,7 @@ If the asn1_flag is 1 then this is a named curve with an associated ASN1 OID. If
74EC_GROUP_get_asn1_flag and EC_GROUP_set_asn1_flag get and set the status of the asn1_flag for the curve. If set then 74EC_GROUP_get_asn1_flag and EC_GROUP_set_asn1_flag get and set the status of the asn1_flag for the curve. If set then
75the curve_name must also be set. 75the curve_name must also be set.
76 76
77The point_coversion_form for a curve controls how EC_POINT data is encoded as ASN1 as defined in X9.62 (ECDSA). 77The point_conversion_form for a curve controls how EC_POINT data is encoded as ASN1 as defined in X9.62 (ECDSA).
78point_conversion_form_t is an enum defined as follows: 78point_conversion_form_t is an enum defined as follows:
79 79
80 typedef enum { 80 typedef enum {
@@ -135,7 +135,7 @@ or a pentanomial of the form:
135f(x) = x^m + x^k3 + x^k2 + x^k1 + 1 with m > k3 > k2 > k1 >= 1 135f(x) = x^m + x^k3 + x^k2 + x^k1 + 1 with m > k3 > k2 > k1 >= 1
136 136
137The function EC_GROUP_get_basis_type returns a NID identifying whether a trinomial or pentanomial is in use for the field. The 137The function EC_GROUP_get_basis_type returns a NID identifying whether a trinomial or pentanomial is in use for the field. The
138function EC_GROUP_get_trinomial_basis must only be called where f(x) is of the trinomial form, and returns the value of B<k>. Similary 138function EC_GROUP_get_trinomial_basis must only be called where f(x) is of the trinomial form, and returns the value of B<k>. Similarly
139the function EC_GROUP_get_pentanomial_basis must only be called where f(x) is of the pentanomial form, and returns the values of B<k1>, 139the function EC_GROUP_get_pentanomial_basis must only be called where f(x) is of the pentanomial form, and returns the values of B<k1>,
140B<k2> and B<k3> respectively. 140B<k2> and B<k3> respectively.
141 141
diff --git a/src/lib/libssl/src/doc/crypto/EC_GROUP_new.pod b/src/lib/libssl/src/doc/crypto/EC_GROUP_new.pod
index ff55bf33a3..9ab3566e65 100644
--- a/src/lib/libssl/src/doc/crypto/EC_GROUP_new.pod
+++ b/src/lib/libssl/src/doc/crypto/EC_GROUP_new.pod
@@ -48,8 +48,8 @@ EC_GROUP_set_curve_GFp sets the curve parameters B<p>, B<a> and B<b> for a curve
48EC_group_get_curve_GFp obtains the previously set curve parameters. 48EC_group_get_curve_GFp obtains the previously set curve parameters.
49 49
50EC_GROUP_set_curve_GF2m sets the equivalent curve parameters for a curve over F2^m. In this case B<p> represents 50EC_GROUP_set_curve_GF2m sets the equivalent curve parameters for a curve over F2^m. In this case B<p> represents
51the irreducible polybnomial - each bit represents a term in the polynomial. Therefore there will either be three 51the irreducible polynomial - each bit represents a term in the polynomial. Therefore there will either be three
52or five bits set dependant on whether the polynomial is a trinomial or a pentanomial. 52or five bits set dependent on whether the polynomial is a trinomial or a pentanomial.
53EC_group_get_curve_GF2m obtains the previously set curve parameters. 53EC_group_get_curve_GF2m obtains the previously set curve parameters.
54 54
55The functions EC_GROUP_new_curve_GFp and EC_GROUP_new_curve_GF2m are shortcuts for calling EC_GROUP_new and the 55The functions EC_GROUP_new_curve_GFp and EC_GROUP_new_curve_GF2m are shortcuts for calling EC_GROUP_new and the
diff --git a/src/lib/libssl/src/doc/crypto/EC_KEY_new.pod b/src/lib/libssl/src/doc/crypto/EC_KEY_new.pod
index 7f8f991ac7..02d7bac82c 100644
--- a/src/lib/libssl/src/doc/crypto/EC_KEY_new.pod
+++ b/src/lib/libssl/src/doc/crypto/EC_KEY_new.pod
@@ -40,7 +40,7 @@ EC_KEY_new, EC_KEY_get_flags, EC_KEY_set_flags, EC_KEY_clear_flags, EC_KEY_new_b
40 40
41=head1 DESCRIPTION 41=head1 DESCRIPTION
42 42
43An EC_KEY represents a public key and (optionaly) an associated private key. A new EC_KEY (with no associated curve) can be constructed by calling EC_KEY_new. 43An EC_KEY represents a public key and (optionally) an associated private key. A new EC_KEY (with no associated curve) can be constructed by calling EC_KEY_new.
44The reference count for the newly created EC_KEY is initially set to 1. A curve can be associated with the EC_KEY by calling 44The reference count for the newly created EC_KEY is initially set to 1. A curve can be associated with the EC_KEY by calling
45EC_KEY_set_group. 45EC_KEY_set_group.
46 46
@@ -77,7 +77,7 @@ along with the private key. If EC_PKEY_NO_PUBKEY is set then the public key is n
77The functions EC_KEY_get_conv_form and EC_KEY_set_conv_form get and set the point_conversion_form for the B<key>. For a description 77The functions EC_KEY_get_conv_form and EC_KEY_set_conv_form get and set the point_conversion_form for the B<key>. For a description
78of point_conversion_forms please refer to L<EC_POINT_new(3)|EC_POINT_new(3)>. 78of point_conversion_forms please refer to L<EC_POINT_new(3)|EC_POINT_new(3)>.
79 79
80EC_KEY_insert_key_method_data and EC_KEY_get_key_method_data enable the caller to associate arbitary additional data specific to the 80EC_KEY_insert_key_method_data and EC_KEY_get_key_method_data enable the caller to associate arbitrary additional data specific to the
81elliptic curve scheme being used with the EC_KEY object. This data is treated as a "black box" by the ec library. The data to be stored by EC_KEY_insert_key_method_data is provided in the B<data> parameter, which must have associated functions for duplicating, freeing and "clear_freeing" the data item. If a subsequent EC_KEY_get_key_method_data call is issued, the functions for duplicating, freeing and "clear_freeing" the data item must be provided again, and they must be the same as they were when the data item was inserted. 81elliptic curve scheme being used with the EC_KEY object. This data is treated as a "black box" by the ec library. The data to be stored by EC_KEY_insert_key_method_data is provided in the B<data> parameter, which must have associated functions for duplicating, freeing and "clear_freeing" the data item. If a subsequent EC_KEY_get_key_method_data call is issued, the functions for duplicating, freeing and "clear_freeing" the data item must be provided again, and they must be the same as they were when the data item was inserted.
82 82
83EC_KEY_set_flags sets the flags in the B<flags> parameter on the EC_KEY object. Any flags that are already set are left set. The currently defined standard flags are EC_FLAG_NON_FIPS_ALLOW and EC_FLAG_FIPS_CHECKED. In addition there is the flag EC_FLAG_COFACTOR_ECDH which is specific to ECDH and is defined in ecdh.h. EC_KEY_get_flags returns the current flags that are set for this EC_KEY. EC_KEY_clear_flags clears the flags indicated by the B<flags> parameter. All other flags are left in their existing state. 83EC_KEY_set_flags sets the flags in the B<flags> parameter on the EC_KEY object. Any flags that are already set are left set. The currently defined standard flags are EC_FLAG_NON_FIPS_ALLOW and EC_FLAG_FIPS_CHECKED. In addition there is the flag EC_FLAG_COFACTOR_ECDH which is specific to ECDH and is defined in ecdh.h. EC_KEY_get_flags returns the current flags that are set for this EC_KEY. EC_KEY_clear_flags clears the flags indicated by the B<flags> parameter. All other flags are left in their existing state.
diff --git a/src/lib/libssl/src/doc/crypto/EVP_BytesToKey.pod b/src/lib/libssl/src/doc/crypto/EVP_BytesToKey.pod
index a27146f5c9..2dffaa1efa 100644
--- a/src/lib/libssl/src/doc/crypto/EVP_BytesToKey.pod
+++ b/src/lib/libssl/src/doc/crypto/EVP_BytesToKey.pod
@@ -46,7 +46,7 @@ enough data is available for the key and IV. D_i is defined as:
46 46
47 D_i = HASH^count(D_(i-1) || data || salt) 47 D_i = HASH^count(D_(i-1) || data || salt)
48 48
49where || denotes concatentaion, D_0 is empty, HASH is the digest 49where || denotes concatenation, D_0 is empty, HASH is the digest
50algorithm in use, HASH^1(data) is simply HASH(data), HASH^2(data) 50algorithm in use, HASH^1(data) is simply HASH(data), HASH^2(data)
51is HASH(HASH(data)) and so on. 51is HASH(HASH(data)) and so on.
52 52
diff --git a/src/lib/libssl/src/doc/crypto/EVP_DigestSignInit.pod b/src/lib/libssl/src/doc/crypto/EVP_DigestSignInit.pod
index 7fd4c22e79..00205d2ae9 100644
--- a/src/lib/libssl/src/doc/crypto/EVP_DigestSignInit.pod
+++ b/src/lib/libssl/src/doc/crypto/EVP_DigestSignInit.pod
@@ -27,7 +27,7 @@ be used to set alternative signing options.
27EVP_DigestSignUpdate() hashes B<cnt> bytes of data at B<d> into the 27EVP_DigestSignUpdate() hashes B<cnt> bytes of data at B<d> into the
28signature context B<ctx>. This function can be called several times on the 28signature context B<ctx>. This function can be called several times on the
29same B<ctx> to include additional data. This function is currently implemented 29same B<ctx> to include additional data. This function is currently implemented
30usig a macro. 30using a macro.
31 31
32EVP_DigestSignFinal() signs the data in B<ctx> places the signature in B<sig>. 32EVP_DigestSignFinal() signs the data in B<ctx> places the signature in B<sig>.
33If B<sig> is B<NULL> then the maximum size of the output buffer is written to 33If B<sig> is B<NULL> then the maximum size of the output buffer is written to
diff --git a/src/lib/libssl/src/doc/crypto/EVP_EncryptInit.pod b/src/lib/libssl/src/doc/crypto/EVP_EncryptInit.pod
index a0a782e772..e9254de3d2 100644
--- a/src/lib/libssl/src/doc/crypto/EVP_EncryptInit.pod
+++ b/src/lib/libssl/src/doc/crypto/EVP_EncryptInit.pod
@@ -105,7 +105,7 @@ EVP_aes_192_ccm, EVP_aes_256_ccm - EVP cipher routines
105The EVP cipher routines are a high level interface to certain 105The EVP cipher routines are a high level interface to certain
106symmetric ciphers. 106symmetric ciphers.
107 107
108EVP_CIPHER_CTX_init() initializes cipher contex B<ctx>. 108EVP_CIPHER_CTX_init() initializes cipher context B<ctx>.
109 109
110EVP_EncryptInit_ex() sets up cipher context B<ctx> for encryption 110EVP_EncryptInit_ex() sets up cipher context B<ctx> for encryption
111with cipher B<type> from ENGINE B<impl>. B<ctx> must be initialized 111with cipher B<type> from ENGINE B<impl>. B<ctx> must be initialized
diff --git a/src/lib/libssl/src/doc/crypto/EVP_PKEY_CTX_ctrl.pod b/src/lib/libssl/src/doc/crypto/EVP_PKEY_CTX_ctrl.pod
index 91125da62e..e8776e1e67 100644
--- a/src/lib/libssl/src/doc/crypto/EVP_PKEY_CTX_ctrl.pod
+++ b/src/lib/libssl/src/doc/crypto/EVP_PKEY_CTX_ctrl.pod
@@ -90,7 +90,7 @@ B<PSS> block structure. If this macro is not called a salt length value of -2
90is used by default. 90is used by default.
91 91
92The EVP_PKEY_CTX_set_rsa_rsa_keygen_bits() macro sets the RSA key length for 92The EVP_PKEY_CTX_set_rsa_rsa_keygen_bits() macro sets the RSA key length for
93RSA key genration to B<bits>. If not specified 1024 bits is used. 93RSA key generation to B<bits>. If not specified 1024 bits is used.
94 94
95The EVP_PKEY_CTX_set_rsa_keygen_pubexp() macro sets the public exponent value 95The EVP_PKEY_CTX_set_rsa_keygen_pubexp() macro sets the public exponent value
96for RSA key generation to B<pubexp> currently it should be an odd integer. The 96for RSA key generation to B<pubexp> currently it should be an odd integer. The
diff --git a/src/lib/libssl/src/doc/crypto/EVP_PKEY_CTX_new.pod b/src/lib/libssl/src/doc/crypto/EVP_PKEY_CTX_new.pod
index 9822d6806f..60ad61e853 100644
--- a/src/lib/libssl/src/doc/crypto/EVP_PKEY_CTX_new.pod
+++ b/src/lib/libssl/src/doc/crypto/EVP_PKEY_CTX_new.pod
@@ -22,7 +22,7 @@ the algorithm specified in B<pkey> and ENGINE B<e>.
22The EVP_PKEY_CTX_new_id() function allocates public key algorithm context 22The EVP_PKEY_CTX_new_id() function allocates public key algorithm context
23using the algorithm specified by B<id> and ENGINE B<e>. It is normally used 23using the algorithm specified by B<id> and ENGINE B<e>. It is normally used
24when no B<EVP_PKEY> structure is associated with the operations, for example 24when no B<EVP_PKEY> structure is associated with the operations, for example
25during parameter generation of key genration for some algorithms. 25during parameter generation of key generation for some algorithms.
26 26
27EVP_PKEY_CTX_dup() duplicates the context B<ctx>. 27EVP_PKEY_CTX_dup() duplicates the context B<ctx>.
28 28
diff --git a/src/lib/libssl/src/doc/crypto/EVP_PKEY_cmp.pod b/src/lib/libssl/src/doc/crypto/EVP_PKEY_cmp.pod
index c389216086..7a690247bf 100644
--- a/src/lib/libssl/src/doc/crypto/EVP_PKEY_cmp.pod
+++ b/src/lib/libssl/src/doc/crypto/EVP_PKEY_cmp.pod
@@ -24,10 +24,10 @@ doesn't use parameters.
24The function EVP_PKEY_copy_parameters() copies the parameters from key 24The function EVP_PKEY_copy_parameters() copies the parameters from key
25B<from> to key B<to>. 25B<from> to key B<to>.
26 26
27The funcion EVP_PKEY_cmp_parameters() compares the parameters of keys 27The function EVP_PKEY_cmp_parameters() compares the parameters of keys
28B<a> and B<b>. 28B<a> and B<b>.
29 29
30The funcion EVP_PKEY_cmp() compares the public key components and paramters 30The function EVP_PKEY_cmp() compares the public key components and parameters
31(if present) of keys B<a> and B<b>. 31(if present) of keys B<a> and B<b>.
32 32
33=head1 NOTES 33=head1 NOTES
diff --git a/src/lib/libssl/src/doc/crypto/EVP_PKEY_keygen.pod b/src/lib/libssl/src/doc/crypto/EVP_PKEY_keygen.pod
index 05ea04be11..463c44170e 100644
--- a/src/lib/libssl/src/doc/crypto/EVP_PKEY_keygen.pod
+++ b/src/lib/libssl/src/doc/crypto/EVP_PKEY_keygen.pod
@@ -29,7 +29,7 @@ EVP_PKEY_CTX_get_app_data - key and parameter generation functions
29=head1 DESCRIPTION 29=head1 DESCRIPTION
30 30
31The EVP_PKEY_keygen_init() function initializes a public key algorithm 31The EVP_PKEY_keygen_init() function initializes a public key algorithm
32context using key B<pkey> for a key genration operation. 32context using key B<pkey> for a key generation operation.
33 33
34The EVP_PKEY_keygen() function performs a key generation operation, the 34The EVP_PKEY_keygen() function performs a key generation operation, the
35generated key is written to B<ppkey>. 35generated key is written to B<ppkey>.
@@ -47,7 +47,7 @@ parameters available is returned. Any non negative value returns the value of
47that parameter. EVP_PKEY_CTX_gen_keygen_info() with a non-negative value for 47that parameter. EVP_PKEY_CTX_gen_keygen_info() with a non-negative value for
48B<idx> should only be called within the generation callback. 48B<idx> should only be called within the generation callback.
49 49
50If the callback returns 0 then the key genration operation is aborted and an 50If the callback returns 0 then the key generation operation is aborted and an
51error occurs. This might occur during a time consuming operation where 51error occurs. This might occur during a time consuming operation where
52a user clicks on a "cancel" button. 52a user clicks on a "cancel" button.
53 53
@@ -67,7 +67,7 @@ once on the same context if several operations are performed using the same
67parameters. 67parameters.
68 68
69The meaning of the parameters passed to the callback will depend on the 69The meaning of the parameters passed to the callback will depend on the
70algorithm and the specifiic implementation of the algorithm. Some might not 70algorithm and the specific implementation of the algorithm. Some might not
71give any useful information at all during key or parameter generation. Others 71give any useful information at all during key or parameter generation. Others
72might not even call the callback. 72might not even call the callback.
73 73
diff --git a/src/lib/libssl/src/doc/crypto/OBJ_nid2obj.pod b/src/lib/libssl/src/doc/crypto/OBJ_nid2obj.pod
index 3656390ead..95949ac091 100644
--- a/src/lib/libssl/src/doc/crypto/OBJ_nid2obj.pod
+++ b/src/lib/libssl/src/doc/crypto/OBJ_nid2obj.pod
@@ -43,7 +43,7 @@ for the object B<o>, the long name <ln> or the short name <sn> respectively
43or NID_undef if an error occurred. 43or NID_undef if an error occurred.
44 44
45OBJ_txt2nid() returns NID corresponding to text string <s>. B<s> can be 45OBJ_txt2nid() returns NID corresponding to text string <s>. B<s> can be
46a long name, a short name or the numerical respresentation of an object. 46a long name, a short name or the numerical representation of an object.
47 47
48OBJ_txt2obj() converts the text string B<s> into an ASN1_OBJECT structure. 48OBJ_txt2obj() converts the text string B<s> into an ASN1_OBJECT structure.
49If B<no_name> is 0 then long names and short names will be interpreted 49If B<no_name> is 0 then long names and short names will be interpreted
diff --git a/src/lib/libssl/src/doc/crypto/PKCS12_create.pod b/src/lib/libssl/src/doc/crypto/PKCS12_create.pod
index 12fbd20b8a..3b27c11a10 100644
--- a/src/lib/libssl/src/doc/crypto/PKCS12_create.pod
+++ b/src/lib/libssl/src/doc/crypto/PKCS12_create.pod
@@ -17,11 +17,11 @@ PKCS12_create - create a PKCS#12 structure
17PKCS12_create() creates a PKCS#12 structure. 17PKCS12_create() creates a PKCS#12 structure.
18 18
19B<pass> is the passphrase to use. B<name> is the B<friendlyName> to use for 19B<pass> is the passphrase to use. B<name> is the B<friendlyName> to use for
20the supplied certifictate and key. B<pkey> is the private key to include in 20the supplied certificate and key. B<pkey> is the private key to include in
21the structure and B<cert> its corresponding certificates. B<ca> is an optional 21the structure and B<cert> its corresponding certificates. B<ca> is an optional
22set of certificates to also include in the structure. 22set of certificates to also include in the structure.
23Either B<pkey>, B<cert> or both can be B<NULL> to indicate that no key or 23Either B<pkey>, B<cert> or both can be B<NULL> to indicate that no key or
24certficate is required. 24certificate is required.
25 25
26B<nid_key> and B<nid_cert> are the encryption algorithms that should be used 26B<nid_key> and B<nid_cert> are the encryption algorithms that should be used
27for the key and certificate respectively. If either B<nid_key> or B<nid_cert> 27for the key and certificate respectively. If either B<nid_key> or B<nid_cert>
diff --git a/src/lib/libssl/src/doc/crypto/PKCS7_sign.pod b/src/lib/libssl/src/doc/crypto/PKCS7_sign.pod
index 9a4f5b173e..64a3036c0a 100644
--- a/src/lib/libssl/src/doc/crypto/PKCS7_sign.pod
+++ b/src/lib/libssl/src/doc/crypto/PKCS7_sign.pod
@@ -13,7 +13,7 @@ PKCS7_sign - create a PKCS#7 signedData structure
13=head1 DESCRIPTION 13=head1 DESCRIPTION
14 14
15PKCS7_sign() creates and returns a PKCS#7 signedData structure. B<signcert> is 15PKCS7_sign() creates and returns a PKCS#7 signedData structure. B<signcert> is
16the certificate to sign with, B<pkey> is the corresponsding private key. 16the certificate to sign with, B<pkey> is the corresponding private key.
17B<certs> is an optional additional set of certificates to include in the PKCS#7 17B<certs> is an optional additional set of certificates to include in the PKCS#7
18structure (for example any intermediate CAs in the chain). 18structure (for example any intermediate CAs in the chain).
19 19
@@ -46,7 +46,7 @@ required by the S/MIME specifications) if B<PKCS7_BINARY> is set no translation
46occurs. This option should be used if the supplied data is in binary format 46occurs. This option should be used if the supplied data is in binary format
47otherwise the translation will corrupt it. 47otherwise the translation will corrupt it.
48 48
49The signedData structure includes several PKCS#7 autenticatedAttributes 49The signedData structure includes several PKCS#7 authenticatedAttributes
50including the signing time, the PKCS#7 content type and the supported list of 50including the signing time, the PKCS#7 content type and the supported list of
51ciphers in an SMIMECapabilities attribute. If B<PKCS7_NOATTR> is set then no 51ciphers in an SMIMECapabilities attribute. If B<PKCS7_NOATTR> is set then no
52authenticatedAttributes will be used. If B<PKCS7_NOSMIMECAP> is set then just 52authenticatedAttributes will be used. If B<PKCS7_NOSMIMECAP> is set then just
diff --git a/src/lib/libssl/src/doc/crypto/PKCS7_sign_add_signer.pod b/src/lib/libssl/src/doc/crypto/PKCS7_sign_add_signer.pod
index afe8ad97cd..280455d476 100644
--- a/src/lib/libssl/src/doc/crypto/PKCS7_sign_add_signer.pod
+++ b/src/lib/libssl/src/doc/crypto/PKCS7_sign_add_signer.pod
@@ -40,7 +40,7 @@ Any of the following flags (ored together) can be passed in the B<flags>
40parameter. 40parameter.
41 41
42If B<PKCS7_REUSE_DIGEST> is set then an attempt is made to copy the content 42If B<PKCS7_REUSE_DIGEST> is set then an attempt is made to copy the content
43digest value from the PKCS7 struture: to add a signer to an existing structure. 43digest value from the PKCS7 structure: to add a signer to an existing structure.
44An error occurs if a matching digest value cannot be found to copy. The 44An error occurs if a matching digest value cannot be found to copy. The
45returned PKCS7 structure will be valid and finalized when this flag is set. 45returned PKCS7 structure will be valid and finalized when this flag is set.
46 46
@@ -55,7 +55,7 @@ B<signcert> parameter though. This can reduce the size of the signature if the
55signers certificate can be obtained by other means: for example a previously 55signers certificate can be obtained by other means: for example a previously
56signed message. 56signed message.
57 57
58The signedData structure includes several PKCS#7 autenticatedAttributes 58The signedData structure includes several PKCS#7 authenticatedAttributes
59including the signing time, the PKCS#7 content type and the supported list of 59including the signing time, the PKCS#7 content type and the supported list of
60ciphers in an SMIMECapabilities attribute. If B<PKCS7_NOATTR> is set then no 60ciphers in an SMIMECapabilities attribute. If B<PKCS7_NOATTR> is set then no
61authenticatedAttributes will be used. If B<PKCS7_NOSMIMECAP> is set then just 61authenticatedAttributes will be used. If B<PKCS7_NOSMIMECAP> is set then just
diff --git a/src/lib/libssl/src/doc/crypto/PKCS7_verify.pod b/src/lib/libssl/src/doc/crypto/PKCS7_verify.pod
index 781c6108a9..059fbff8e9 100644
--- a/src/lib/libssl/src/doc/crypto/PKCS7_verify.pod
+++ b/src/lib/libssl/src/doc/crypto/PKCS7_verify.pod
@@ -16,7 +16,7 @@ PKCS7_verify, PKCS7_get0_signers - verify a PKCS#7 signedData structure
16 16
17PKCS7_verify() verifies a PKCS#7 signedData structure. B<p7> is the PKCS7 17PKCS7_verify() verifies a PKCS#7 signedData structure. B<p7> is the PKCS7
18structure to verify. B<certs> is a set of certificates in which to search for 18structure to verify. B<certs> is a set of certificates in which to search for
19the signer's certificate. B<store> is a trusted certficate store (used for 19the signer's certificate. B<store> is a trusted certificate store (used for
20chain verification). B<indata> is the signed data if the content is not 20chain verification). B<indata> is the signed data if the content is not
21present in B<p7> (that is it is detached). The content is written to B<out> 21present in B<p7> (that is it is detached). The content is written to B<out>
22if it is not NULL. 22if it is not NULL.
diff --git a/src/lib/libssl/src/doc/crypto/SMIME_write_PKCS7.pod b/src/lib/libssl/src/doc/crypto/SMIME_write_PKCS7.pod
index ca6bd02763..4a7cd08c42 100644
--- a/src/lib/libssl/src/doc/crypto/SMIME_write_PKCS7.pod
+++ b/src/lib/libssl/src/doc/crypto/SMIME_write_PKCS7.pod
@@ -40,7 +40,7 @@ the data must be read twice: once to compute the signature in PKCS7_sign()
40and once to output the S/MIME message. 40and once to output the S/MIME message.
41 41
42If streaming is performed the content is output in BER format using indefinite 42If streaming is performed the content is output in BER format using indefinite
43length constructuted encoding except in the case of signed data with detached 43length constructed encoding except in the case of signed data with detached
44content where the content is absent and DER format is used. 44content where the content is absent and DER format is used.
45 45
46=head1 BUGS 46=head1 BUGS
diff --git a/src/lib/libssl/src/doc/crypto/X509_NAME_add_entry_by_txt.pod b/src/lib/libssl/src/doc/crypto/X509_NAME_add_entry_by_txt.pod
index c6442b947f..f97e05e683 100644
--- a/src/lib/libssl/src/doc/crypto/X509_NAME_add_entry_by_txt.pod
+++ b/src/lib/libssl/src/doc/crypto/X509_NAME_add_entry_by_txt.pod
@@ -45,7 +45,7 @@ B<loc>. The deleted entry is returned and must be freed up.
45=head1 NOTES 45=head1 NOTES
46 46
47The use of string types such as B<MBSTRING_ASC> or B<MBSTRING_UTF8> 47The use of string types such as B<MBSTRING_ASC> or B<MBSTRING_UTF8>
48is strongly recommened for the B<type> parameter. This allows the 48is strongly recommended for the B<type> parameter. This allows the
49internal code to correctly determine the type of the field and to 49internal code to correctly determine the type of the field and to
50apply length checks according to the relevant standards. This is 50apply length checks according to the relevant standards. This is
51done using ASN1_STRING_set_by_NID(). 51done using ASN1_STRING_set_by_NID().
diff --git a/src/lib/libssl/src/doc/crypto/X509_NAME_get_index_by_NID.pod b/src/lib/libssl/src/doc/crypto/X509_NAME_get_index_by_NID.pod
index 988fd7bdaf..48510890e8 100644
--- a/src/lib/libssl/src/doc/crypto/X509_NAME_get_index_by_NID.pod
+++ b/src/lib/libssl/src/doc/crypto/X509_NAME_get_index_by_NID.pod
@@ -51,7 +51,7 @@ X509_NAME_get_text_by_NID() and X509_NAME_get_text_by_OBJ() are
51legacy functions which have various limitations which make them 51legacy functions which have various limitations which make them
52of minimal use in practice. They can only find the first matching 52of minimal use in practice. They can only find the first matching
53entry and will copy the contents of the field verbatim: this can 53entry and will copy the contents of the field verbatim: this can
54be highly confusing if the target is a muticharacter string type 54be highly confusing if the target is a multicharacter string type
55like a BMPString or a UTF8String. 55like a BMPString or a UTF8String.
56 56
57For a more general solution X509_NAME_get_index_by_NID() or 57For a more general solution X509_NAME_get_index_by_NID() or
diff --git a/src/lib/libssl/src/doc/crypto/X509_STORE_CTX_get_error.pod b/src/lib/libssl/src/doc/crypto/X509_STORE_CTX_get_error.pod
index e4339dc28f..270b265ce5 100644
--- a/src/lib/libssl/src/doc/crypto/X509_STORE_CTX_get_error.pod
+++ b/src/lib/libssl/src/doc/crypto/X509_STORE_CTX_get_error.pod
@@ -35,7 +35,7 @@ checks.
35 35
36X509_STORE_CTX_get_error_depth() returns the B<depth> of the error. This is a 36X509_STORE_CTX_get_error_depth() returns the B<depth> of the error. This is a
37non-negative integer representing where in the certificate chain the error 37non-negative integer representing where in the certificate chain the error
38occurred. If it is zero it occured in the end entity certificate, one if 38occurred. If it is zero it occurred in the end entity certificate, one if
39it is the certificate which signed the end entity certificate and so on. 39it is the certificate which signed the end entity certificate and so on.
40 40
41X509_STORE_CTX_get_current_cert() returns the certificate in B<ctx> which 41X509_STORE_CTX_get_current_cert() returns the certificate in B<ctx> which
@@ -58,7 +58,7 @@ X509_STORE_CTX_get_error() returns B<X509_V_OK> or an error code.
58 58
59X509_STORE_CTX_get_error_depth() returns a non-negative error depth. 59X509_STORE_CTX_get_error_depth() returns a non-negative error depth.
60 60
61X509_STORE_CTX_get_current_cert() returns the cerificate which caused the 61X509_STORE_CTX_get_current_cert() returns the certificate which caused the
62error or B<NULL> if no certificate is relevant to the error. 62error or B<NULL> if no certificate is relevant to the error.
63 63
64X509_verify_cert_error_string() returns a human readable error string for 64X509_verify_cert_error_string() returns a human readable error string for
@@ -265,11 +265,11 @@ Some feature of a certificate extension is not supported. Unused.
265 265
266=item B<X509_V_ERR_PERMITTED_VIOLATION: permitted subtree violation> 266=item B<X509_V_ERR_PERMITTED_VIOLATION: permitted subtree violation>
267 267
268A name constraint violation occured in the permitted subtrees. 268A name constraint violation occurred in the permitted subtrees.
269 269
270=item B<X509_V_ERR_EXCLUDED_VIOLATION: excluded subtree violation> 270=item B<X509_V_ERR_EXCLUDED_VIOLATION: excluded subtree violation>
271 271
272A name constraint violation occured in the excluded subtrees. 272A name constraint violation occurred in the excluded subtrees.
273 273
274=item B<X509_V_ERR_SUBTREE_MINMAX: name constraints minimum and maximum not 274=item B<X509_V_ERR_SUBTREE_MINMAX: name constraints minimum and maximum not
275supported> 275supported>
@@ -292,7 +292,7 @@ a garbage extension or some new feature not currently supported.
292 292
293=item B<X509_V_ERR_CRL_PATH_VALIDATION_ERROR: CRL path validation error> 293=item B<X509_V_ERR_CRL_PATH_VALIDATION_ERROR: CRL path validation error>
294 294
295An error occured when attempting to verify the CRL path. This error can only 295An error occurred when attempting to verify the CRL path. This error can only
296happen if extended CRL checking is enabled. 296happen if extended CRL checking is enabled.
297 297
298=item B<X509_V_ERR_APPLICATION_VERIFICATION: application verification failure> 298=item B<X509_V_ERR_APPLICATION_VERIFICATION: application verification failure>
diff --git a/src/lib/libssl/src/doc/crypto/X509_STORE_CTX_new.pod b/src/lib/libssl/src/doc/crypto/X509_STORE_CTX_new.pod
index 8f602274ee..66c0da04d2 100644
--- a/src/lib/libssl/src/doc/crypto/X509_STORE_CTX_new.pod
+++ b/src/lib/libssl/src/doc/crypto/X509_STORE_CTX_new.pod
@@ -52,7 +52,7 @@ X509_STORE_CTX_trusted_stack() sets the set of trusted certificates of B<ctx>
52to B<sk>. This is an alternative way of specifying trusted certificates 52to B<sk>. This is an alternative way of specifying trusted certificates
53instead of using an B<X509_STORE>. 53instead of using an B<X509_STORE>.
54 54
55X509_STORE_CTX_set_cert() sets the certificate to be vertified in B<ctx> to 55X509_STORE_CTX_set_cert() sets the certificate to be verified in B<ctx> to
56B<x>. 56B<x>.
57 57
58X509_STORE_CTX_set_chain() sets the additional certificate chain used by B<ctx> 58X509_STORE_CTX_set_chain() sets the additional certificate chain used by B<ctx>
@@ -64,10 +64,10 @@ enabled in the associated B<X509_VERIFY_PARAM> structure. This might be
64used where additional "useful" CRLs are supplied as part of a protocol, 64used where additional "useful" CRLs are supplied as part of a protocol,
65for example in a PKCS#7 structure. 65for example in a PKCS#7 structure.
66 66
67X509_VERIFY_PARAM *X509_STORE_CTX_get0_param() retrieves an intenal pointer 67X509_VERIFY_PARAM *X509_STORE_CTX_get0_param() retrieves an internal pointer
68to the verification parameters associated with B<ctx>. 68to the verification parameters associated with B<ctx>.
69 69
70X509_STORE_CTX_set0_param() sets the intenal verification parameter pointer 70X509_STORE_CTX_set0_param() sets the internal verification parameter pointer
71to B<param>. After this call B<param> should not be used. 71to B<param>. After this call B<param> should not be used.
72 72
73X509_STORE_CTX_set_default() looks up and sets the default verification 73X509_STORE_CTX_set_default() looks up and sets the default verification
diff --git a/src/lib/libssl/src/doc/crypto/X509_VERIFY_PARAM_set_flags.pod b/src/lib/libssl/src/doc/crypto/X509_VERIFY_PARAM_set_flags.pod
index 6acdd71e72..6c88aec49e 100644
--- a/src/lib/libssl/src/doc/crypto/X509_VERIFY_PARAM_set_flags.pod
+++ b/src/lib/libssl/src/doc/crypto/X509_VERIFY_PARAM_set_flags.pod
@@ -126,7 +126,7 @@ If B<X509_V_FLAG_USE_DELTAS> ise set delta CRLs (if present) are used to
126determine certificate status. If not set deltas are ignored. 126determine certificate status. If not set deltas are ignored.
127 127
128B<X509_V_FLAG_CHECK_SS_SIGNATURE> enables checking of the root CA self signed 128B<X509_V_FLAG_CHECK_SS_SIGNATURE> enables checking of the root CA self signed
129cerificate signature. By default this check is disabled because it doesn't 129certificate signature. By default this check is disabled because it doesn't
130add any additional security but in some cases applications might want to 130add any additional security but in some cases applications might want to
131check the signature anyway. A side effect of not checking the root CA 131check the signature anyway. A side effect of not checking the root CA
132signature is that disabled or unsupported message digests on the root CA 132signature is that disabled or unsupported message digests on the root CA
diff --git a/src/lib/libssl/src/doc/crypto/X509_verify_cert.pod b/src/lib/libssl/src/doc/crypto/X509_verify_cert.pod
index 5253bdcd70..f05edd8333 100644
--- a/src/lib/libssl/src/doc/crypto/X509_verify_cert.pod
+++ b/src/lib/libssl/src/doc/crypto/X509_verify_cert.pod
@@ -2,7 +2,7 @@
2 2
3=head1 NAME 3=head1 NAME
4 4
5X509_verify_cert - discover and verify X509 certificte chain 5X509_verify_cert - discover and verify X509 certificate chain
6 6
7=head1 SYNOPSIS 7=head1 SYNOPSIS
8 8
@@ -40,7 +40,7 @@ for <= 0 return value on error.
40=head1 BUGS 40=head1 BUGS
41 41
42This function uses the header B<x509.h> as opposed to most chain verification 42This function uses the header B<x509.h> as opposed to most chain verification
43functiosn which use B<x509_vfy.h>. 43functions which use B<x509_vfy.h>.
44 44
45=head1 SEE ALSO 45=head1 SEE ALSO
46 46
diff --git a/src/lib/libssl/src/doc/crypto/d2i_DSAPublicKey.pod b/src/lib/libssl/src/doc/crypto/d2i_DSAPublicKey.pod
index eeb96c485f..10c49e3ad2 100644
--- a/src/lib/libssl/src/doc/crypto/d2i_DSAPublicKey.pod
+++ b/src/lib/libssl/src/doc/crypto/d2i_DSAPublicKey.pod
@@ -68,7 +68,7 @@ If B<write_params> is zero then only the B<pub_key> field is encoded as an
68B<INTEGER>. If B<write_params> is 1 then a B<SEQUENCE> consisting of the 68B<INTEGER>. If B<write_params> is 1 then a B<SEQUENCE> consisting of the
69B<p>, B<q>, B<g> and B<pub_key> respectively fields are encoded. 69B<p>, B<q>, B<g> and B<pub_key> respectively fields are encoded.
70 70
71The B<DSAPrivateKey> functions also use a non standard structure consiting 71The B<DSAPrivateKey> functions also use a non standard structure consisting
72consisting of a SEQUENCE containing the B<p>, B<q>, B<g> and B<pub_key> and 72consisting of a SEQUENCE containing the B<p>, B<q>, B<g> and B<pub_key> and
73B<priv_key> fields respectively. 73B<priv_key> fields respectively.
74 74
diff --git a/src/lib/libssl/src/doc/crypto/engine.pod b/src/lib/libssl/src/doc/crypto/engine.pod
index 8020112835..e305a73271 100644
--- a/src/lib/libssl/src/doc/crypto/engine.pod
+++ b/src/lib/libssl/src/doc/crypto/engine.pod
@@ -181,7 +181,7 @@ to use the pointer value at all, as this kind of reference is a guarantee
181that the structure can not be deallocated until the reference is released. 181that the structure can not be deallocated until the reference is released.
182 182
183However, a structural reference provides no guarantee that the ENGINE is 183However, a structural reference provides no guarantee that the ENGINE is
184initiliased and able to use any of its cryptographic 184initialised and able to use any of its cryptographic
185implementations. Indeed it's quite possible that most ENGINEs will not 185implementations. Indeed it's quite possible that most ENGINEs will not
186initialise at all in typical environments, as ENGINEs are typically used to 186initialise at all in typical environments, as ENGINEs are typically used to
187support specialised hardware. To use an ENGINE's functionality, you need a 187support specialised hardware. To use an ENGINE's functionality, you need a
@@ -573,7 +573,7 @@ for any higher-level ENGINE functions such as ENGINE_ctrl_cmd_string().
573by applications, administrations, users, etc. These can support arbitrary 573by applications, administrations, users, etc. These can support arbitrary
574operations via ENGINE_ctrl(), including passing to and/or from the control 574operations via ENGINE_ctrl(), including passing to and/or from the control
575commands data of any arbitrary type. These commands are supported in the 575commands data of any arbitrary type. These commands are supported in the
576discovery mechanisms simply to allow applications determinie if an ENGINE 576discovery mechanisms simply allow applications to determine if an ENGINE
577supports certain specific commands it might want to use (eg. application "foo" 577supports certain specific commands it might want to use (eg. application "foo"
578might query various ENGINEs to see if they implement "FOO_GET_VENDOR_LOGO_GIF" - 578might query various ENGINEs to see if they implement "FOO_GET_VENDOR_LOGO_GIF" -
579and ENGINE could therefore decide whether or not to support this "foo"-specific 579and ENGINE could therefore decide whether or not to support this "foo"-specific