From dd7ab33558af2512e14a4aa8fbb164c785e2d754 Mon Sep 17 00:00:00 2001
From: jmc <>
Date: Sat, 12 Jun 2021 17:04:41 +0000
Subject: space between macro args and punctuation;

---
 src/lib/libcrypto/man/X509_check_purpose.3 |  6 +++---
 src/lib/libssl/man/SSL_CTX_set_verify.3    | 20 ++++++++++----------
 2 files changed, 13 insertions(+), 13 deletions(-)

(limited to 'src/lib')

diff --git a/src/lib/libcrypto/man/X509_check_purpose.3 b/src/lib/libcrypto/man/X509_check_purpose.3
index b74ea50bef..8e98a62239 100644
--- a/src/lib/libcrypto/man/X509_check_purpose.3
+++ b/src/lib/libcrypto/man/X509_check_purpose.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: X509_check_purpose.3,v 1.1 2019/08/22 15:15:35 schwarze Exp $
+.\" $OpenBSD: X509_check_purpose.3,v 1.2 2021/06/12 17:04:41 jmc Exp $
 .\" Copyright (c) 2019 Ingo Schwarze <schwarze@openbsd.org>
 .\"
 .\" Permission to use, copy, modify, and distribute this software for any
@@ -13,7 +13,7 @@
 .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
 .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
 .\"
-.Dd $Mdocdate: August 22 2019 $
+.Dd $Mdocdate: June 12 2021 $
 .Dt X509_CHECK_PURPOSE 3
 .Os
 .Sh NAME
@@ -362,7 +362,7 @@ is non-zero, the following values can also be returned:
 .Fa certificate
 can be used as a CA for the
 .Fa purpose .
-.It 3 Ta Success Ta The Fa certificate No is a version 1 CA.
+.It 3 Ta Success Ta The Fa certificate No is a version 1 CA .
 .It 4 Ta Success Ta The Key Usage allows Dv keyCertSign .
 .It 5 Ta Success Ta A Netscape Cert Type allows usage as a CA.
 .El
diff --git a/src/lib/libssl/man/SSL_CTX_set_verify.3 b/src/lib/libssl/man/SSL_CTX_set_verify.3
index 5b137358ab..1ed86407e9 100644
--- a/src/lib/libssl/man/SSL_CTX_set_verify.3
+++ b/src/lib/libssl/man/SSL_CTX_set_verify.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: SSL_CTX_set_verify.3,v 1.8 2020/09/17 08:04:22 schwarze Exp $
+.\" $OpenBSD: SSL_CTX_set_verify.3,v 1.9 2021/06/12 16:59:53 jmc Exp $
 .\" full merge up to: OpenSSL 9b86974e Aug 17 15:21:33 2015 -0400
 .\" selective merge up to: OpenSSL 1cb7eff4 Sep 10 13:56:40 2019 +0100
 .\"
@@ -50,7 +50,7 @@
 .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
 .\" OF THE POSSIBILITY OF SUCH DAMAGE.
 .\"
-.Dd $Mdocdate: September 17 2020 $
+.Dd $Mdocdate: June 12 2021 $
 .Dt SSL_CTX_SET_VERIFY 3
 .Os
 .Sh NAME
@@ -146,11 +146,11 @@ The verification of certificates can be controlled by a set of bitwise ORed
 flags:
 .Bl -tag -width Ds
 .It Dv SSL_VERIFY_NONE
-.Em Server mode:
+.Em Server mode :
 the server will not send a client certificate request to the client,
 so the client will not send a certificate.
 .Pp
-.Em Client mode:
+.Em Client mode :
 if not using an anonymous cipher (by default disabled),
 the server will send a certificate which will be checked.
 The result of the certificate verification process can be checked after the
@@ -159,7 +159,7 @@ TLS/SSL handshake using the
 function.
 The handshake will be continued regardless of the verification result.
 .It Dv SSL_VERIFY_PEER
-.Em Server mode:
+.Em Server mode :
 the server sends a client certificate request to the client.
 The certificate returned (if any) is checked.
 If the verification process fails,
@@ -171,7 +171,7 @@ and
 .Dv SSL_VERIFY_CLIENT_ONCE
 flags.
 .Pp
-.Em Client mode:
+.Em Client mode :
 the server certificate is verified.
 If the verification process fails,
 the TLS/SSL handshake is immediately terminated with an alert message
@@ -180,7 +180,7 @@ If no server certificate is sent, because an anonymous cipher is used,
 .Dv SSL_VERIFY_PEER
 is ignored.
 .It Dv SSL_VERIFY_FAIL_IF_NO_PEER_CERT
-.Em Server mode:
+.Em Server mode :
 if the client did not return a certificate, the TLS/SSL
 handshake is immediately terminated with a
 .Dq handshake failure
@@ -188,16 +188,16 @@ alert.
 This flag must be used together with
 .Dv SSL_VERIFY_PEER .
 .Pp
-.Em Client mode:
+.Em Client mode :
 ignored
 .It Dv SSL_VERIFY_CLIENT_ONCE
-.Em Server mode:
+.Em Server mode :
 only request a client certificate on the initial TLS/SSL handshake.
 Do not ask for a client certificate again in case of a renegotiation.
 This flag must be used together with
 .Dv SSL_VERIFY_PEER .
 .Pp
-.Em Client mode:
+.Em Client mode :
 ignored
 .El
 .Pp
-- 
cgit v1.2.3-55-g6feb