aboutsummaryrefslogtreecommitdiffstats
path: root/doc/apps
diff options
context:
space:
mode:
authorUlf Möller <ulf@openssl.org>2001-09-07 06:13:40 +0000
committerUlf Möller <ulf@openssl.org>2001-09-07 06:13:40 +0000
commit3b80e3aa9e0c4543dbd8f7ef1794a1db0a2ec271 (patch)
tree26c2e740f12c129bb73c0efd64ba884c6bd1e7c0 /doc/apps
parent14cfde9c83ecfb36711930171ce129293463a83f (diff)
downloadopenssl-3b80e3aa9e0c4543dbd8f7ef1794a1db0a2ec271.tar.gz
ispell
Diffstat (limited to 'doc/apps')
-rw-r--r--doc/apps/enc.pod2
-rw-r--r--doc/apps/ocsp.pod14
-rw-r--r--doc/apps/pkcs12.pod2
-rw-r--r--doc/apps/pkcs7.pod2
-rw-r--r--doc/apps/rand.pod2
-rw-r--r--doc/apps/req.pod2
-rw-r--r--doc/apps/rsa.pod2
-rw-r--r--doc/apps/s_client.pod4
-rw-r--r--doc/apps/s_server.pod2
-rw-r--r--doc/apps/x509.pod4
10 files changed, 18 insertions, 18 deletions
diff --git a/doc/apps/enc.pod b/doc/apps/enc.pod
index 99b914789d..ddf081617f 100644
--- a/doc/apps/enc.pod
+++ b/doc/apps/enc.pod
@@ -160,7 +160,7 @@ padding: this allows a rudimentary integrity or password check to be
performed. However since the chance of random data passing the test is
better than 1 in 256 it isn't a very good test.
-If padding is disabled then the input data must be a muliple of the cipher
+If padding is disabled then the input data must be a multiple of the cipher
block length.
All RC2 ciphers have the same key and effective key length.
diff --git a/doc/apps/ocsp.pod b/doc/apps/ocsp.pod
index 4b6e5171e5..da201b95e6 100644
--- a/doc/apps/ocsp.pod
+++ b/doc/apps/ocsp.pod
@@ -93,7 +93,7 @@ a nonce is automatically added specifying B<no_nonce> overrides this.
=item B<-req_text>, B<-resp_text>, B<-text>
-print out the text form of the OCSP request, reponse or both respectively.
+print out the text form of the OCSP request, response or both respectively.
=item B<-reqout file>, B<-respout file>
@@ -124,14 +124,14 @@ the signature on the OCSP response.
file containing additional certificates to search when attempting to locate
the OCSP response signing certificate. Some responders omit the actual signer's
-certificate from the reponse: this option can be used to supply the neccesary
+certificate from the response: this option can be used to supply the necessary
certificate in such cases.
=item B<-trust_other>
the certificates specified by the B<-verify_certs> option should be explicitly
trusted and no additional checks will be performed on them. This is useful
-when the complete reponder certificate chain is not available or trusting a
+when the complete responder certificate chain is not available or trusting a
root CA is not appropriate.
=item B<-VAfile file>
@@ -154,11 +154,11 @@ with either the B<-verify_certs> or B<-VAfile> options.
=item B<-no_sig_verify>
don't check the signature on the OCSP response. Since this option tolerates invalid
-signatures on OCSP respondes it will normally only be used for testing purposes.
+signatures on OCSP responses it will normally only be used for testing purposes.
=item B<-no_cert_verify>
-don't verify the OCSP reponse signers certificate at all. Since this option allows
+don't verify the OCSP response signers certificate at all. Since this option allows
the OCSP response to be signed by any certificate it should only be used for
testing purposes.
@@ -171,7 +171,7 @@ certificates.
don't perform any additional checks on the OCSP response signers certificate.
That is do not make any checks to see if the signers certificate is authorised
-to provide the neccessary status information: as a result this option should
+to provide the necessary status information: as a result this option should
only be used for testing purposes.
=item B<-validity_period nsec>, B<-status_age age>
@@ -255,7 +255,7 @@ omitted meaning fresh revocation information is immediately available.
OCSP Response follows the rules specified in RFC2560.
Initially the OCSP responder certificate is located and the signature on
-the OCSP request checked using the reponder certificate's public key.
+the OCSP request checked using the responder certificate's public key.
Then a normal certificate verify is performed on the OCSP responder certificate
building up a certificate chain in the process. The locations of the trusted
diff --git a/doc/apps/pkcs12.pod b/doc/apps/pkcs12.pod
index 7e0307dda0..7d84146293 100644
--- a/doc/apps/pkcs12.pod
+++ b/doc/apps/pkcs12.pod
@@ -262,7 +262,7 @@ the one corresponding to the private key. Certain software which requires
a private key and certificate and assumes the first certificate in the
file is the one corresponding to the private key: this may not always
be the case. Using the B<-clcerts> option will solve this problem by only
-outputing the certificate corresponding to the private key. If the CA
+outputting the certificate corresponding to the private key. If the CA
certificates are required then they can be output to a separate file using
the B<-nokeys -cacerts> options to just output CA certificates.
diff --git a/doc/apps/pkcs7.pod b/doc/apps/pkcs7.pod
index 4e9bd6e46b..9871c0e0cd 100644
--- a/doc/apps/pkcs7.pod
+++ b/doc/apps/pkcs7.pod
@@ -78,7 +78,7 @@ The PEM PKCS#7 format uses the header and footer lines:
-----BEGIN PKCS7-----
-----END PKCS7-----
-For compatability with some CAs it will also accept:
+For compatibility with some CAs it will also accept:
-----BEGIN CERTIFICATE-----
-----END CERTIFICATE-----
diff --git a/doc/apps/rand.pod b/doc/apps/rand.pod
index cbf8768801..75745ca002 100644
--- a/doc/apps/rand.pod
+++ b/doc/apps/rand.pod
@@ -15,7 +15,7 @@ I<num>
=head1 DESCRIPTION
The B<rand> command outputs I<num> pseudo-random bytes after seeding
-the random number generater once. As in other B<openssl> command
+the random number generator once. As in other B<openssl> command
line tools, PRNG seeding uses the file I<$HOME/>B<.rnd> or B<.rnd>
in addition to the files given in the B<-rand> option. A new
I<$HOME>/B<.rnd> or B<.rnd> file will be written back if enough
diff --git a/doc/apps/req.pod b/doc/apps/req.pod
index c3226b3d27..edc2f60bd8 100644
--- a/doc/apps/req.pod
+++ b/doc/apps/req.pod
@@ -179,7 +179,7 @@ days to certify the certificate for. The default is 30 days.
=item B<-set_serial n>
-serial number to use when outputting a self signed certifcate. This
+serial number to use when outputting a self signed certificate. This
may be specified as a decimal value or a hex value if preceded by B<0x>.
It is possible to use negative serial numbers but this is not recommended.
diff --git a/doc/apps/rsa.pod b/doc/apps/rsa.pod
index f0e613ed05..ef74f1adff 100644
--- a/doc/apps/rsa.pod
+++ b/doc/apps/rsa.pod
@@ -136,7 +136,7 @@ and Microsoft IIS .key files, this uses unsalted RC4 for its encryption.
It is not very secure and so should only be used when necessary.
Some newer version of IIS have additional data in the exported .key
-files. To use thse with the utility view the file with a binary editor
+files. To use these with the utility, view the file with a binary editor
and look for the string "private-key", then trace back to the byte
sequence 0x30, 0x82 (this is an ASN1 SEQUENCE). Copy all the data
from this point onwards to another file and use that as the input
diff --git a/doc/apps/s_client.pod b/doc/apps/s_client.pod
index 8d2939a9da..275e886966 100644
--- a/doc/apps/s_client.pod
+++ b/doc/apps/s_client.pod
@@ -132,7 +132,7 @@ input.
=item B<-quiet>
-inhibit printing of session and certificate information. This implicitely
+inhibit printing of session and certificate information. This implicitly
turns on B<-ign_eof> as well.
=item B<-ssl2>, B<-ssl3>, B<-tls1>, B<-no_ssl2>, B<-no_ssl3>, B<-no_tls1>
@@ -180,7 +180,7 @@ all others.
If a connection is established with an SSL server then any data received
from the server is displayed and any key presses will be sent to the
server. When used interactively (which means neither B<-quiet> nor B<-ign_eof>
-have been given), the session will be renegociated if the line begins with an
+have been given), the session will be renegotiated if the line begins with an
B<R>, and if the line begins with a B<Q> or if end of file is reached, the
connection will be closed down.
diff --git a/doc/apps/s_server.pod b/doc/apps/s_server.pod
index d53b30fccb..f94d48e0e8 100644
--- a/doc/apps/s_server.pod
+++ b/doc/apps/s_server.pod
@@ -195,7 +195,7 @@ emulates a simple web server. Pages will be resolved relative to the
current directory, for example if the URL https://myhost/page.html is
requested the file ./page.html will be loaded. The files loaded are
assumed to contain a complete and correct HTTP response (lines that
-are part of the HTTP response line and headers must end wih CRLF).
+are part of the HTTP response line and headers must end with CRLF).
=item B<-engine id>
diff --git a/doc/apps/x509.pod b/doc/apps/x509.pod
index a584785b47..23367b7659 100644
--- a/doc/apps/x509.pod
+++ b/doc/apps/x509.pod
@@ -397,7 +397,7 @@ B<spc_eq>, B<lname> and B<align>.
=item B<esc_2253>
escape the "special" characters required by RFC2253 in a field That is
-B<,+"E<lt>E<gt>;>. Additionally B<#> is escaped at the beginnging of a string
+B<,+"E<lt>E<gt>;>. Additionally B<#> is escaped at the beginning of a string
and a space character at the beginning or end of a string.
=item B<esc_ctrl>
@@ -451,7 +451,7 @@ B<#XXXX...> format.
dump non character string types (for example OCTET STRING) if this
option is not set then non character string types will be displayed
-as though each content octet repesents a single character.
+as though each content octet represents a single character.
=item B<dump_all>