Removed extra spaces in documentation

Reviewed-by: Richard Levitte <levitte@openssl.org>
Reviewed-by: Hugo Landau <hlandau@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/22968)
This commit is contained in:
slontis 2023-12-07 10:54:34 +10:00 committed by Tomas Mraz
parent d4d6694aa7
commit f02d33118b
8 changed files with 11 additions and 11 deletions

View File

@ -5,7 +5,7 @@
OSSL_METHOD_STORE, ossl_method_store_new, ossl_method_store_free,
ossl_method_store_init, ossl_method_store_cleanup,
ossl_method_store_add, ossl_method_store_fetch,
ossl_method_store_remove, ossl_method_store_remove_all_provided,
ossl_method_store_remove, ossl_method_store_remove_all_provided,
ossl_method_store_cache_get, ossl_method_store_cache_set,
ossl_method_store_cache_flush_all
- implementation method store and query

View File

@ -47,8 +47,8 @@ OSSL_DECODER_INSTANCE_get_input_structure
int OSSL_DECODER_CTX_set_input_structure(OSSL_DECODER_CTX *ctx,
const char *input_structure);
int OSSL_DECODER_CTX_add_decoder(OSSL_DECODER_CTX *ctx, OSSL_DECODER *decoder);
int OSSL_DECODER_CTX_add_extra(OSSL_DECODER_CTX *ctx,
OSSL_LIB_CTX *libctx,
int OSSL_DECODER_CTX_add_extra(OSSL_DECODER_CTX *ctx,
OSSL_LIB_CTX *libctx,
const char *propq);
int OSSL_DECODER_CTX_get_num_decoders(OSSL_DECODER_CTX *ctx);

View File

@ -187,11 +187,11 @@ modes> and L</Sender-authenticated HPKE Modes>.
=head2 HPKE Roles
HPKE contexts have a role - either sender or receiver. This is used
HPKE contexts have a role - either sender or receiver. This is used
to control which functions can be called and so that senders do not
reuse a key and nonce with different plaintexts.
OSSL_HPKE_CTX_free(), OSSL_HPKE_export(), OSSL_HPKE_CTX_set1_psk(),
OSSL_HPKE_CTX_free(), OSSL_HPKE_export(), OSSL_HPKE_CTX_set1_psk(),
and OSSL_HPKE_CTX_get_seq() can be called regardless of role.
=over 4
@ -199,7 +199,7 @@ and OSSL_HPKE_CTX_get_seq() can be called regardless of role.
=item B<OSSL_HPKE_ROLE_SENDER>, 0
An I<OSSL_HPKE_CTX> with this role can be used with
OSSL_HPKE_encap(), OSSL_HPKE_seal(), OSSL_HPKE_CTX_set1_ikme() and
OSSL_HPKE_encap(), OSSL_HPKE_seal(), OSSL_HPKE_CTX_set1_ikme() and
OSSL_HPKE_CTX_set1_authpriv().
=item B<OSSL_HPKE_ROLE_RECEIVER>, 1

View File

@ -18,7 +18,7 @@ PKCS#12 safeBag. I<bag> is the B<PKCS12_SAFEBAG> to assign the attributes to.
=head1 RETURN VALUES
PKCS12_SAFEBAG_set0_attrs() does not return a value.
PKCS12_SAFEBAG_set0_attrs() does not return a value.
=head1 COPYRIGHT

View File

@ -42,7 +42,7 @@ PKCS12_create_ex() is identical to PKCS12_create() but allows for a library cont
I<ctx> and property query I<propq> to be used to select algorithm implementations.
PKCS12_create_ex2() is identical to PKCS12_create_ex() but allows for a user defined
callback I<cb> of type B<PKCS12_create_cb> to be specified and also allows for an
callback I<cb> of type B<PKCS12_create_cb> to be specified and also allows for an
optional argument I<cbarg> to be passed back to the callback.
The I<cb> if specified will be called for every safebag added to the

View File

@ -156,7 +156,7 @@ To connect to this server, set the client SSL_CTX and SSL as follows:
/* Do SSL_connect() handshake and handle errors here */
/* Optional: verify the peer RPK */
/* Optional: verify the peer RPK */
verify_result = SSL_get_verify_result(ssl);
if (verify_result == X509_V_OK) {
/* The server's raw public key matched the TLSA record */

View File

@ -39,7 +39,7 @@ with the B<X509_STORE_CTX> to call the SSL_set_retry_verify() function:
/* this should not happen but check anyway */
if (idx < 0
|| (ssl = X509_STORE_CTX_get_ex_data(ctx, idx)) == NULL)
|| (ssl = X509_STORE_CTX_get_ex_data(ctx, idx)) == NULL)
return 0;
if (/* we need to retry verification callback */)

View File

@ -407,7 +407,7 @@ Key Derivation Function tests used with the "KAT_KDF" type.
DRBG tests used with the "DRBG" type.
= item "RNG" (B<OSSL_SELF_TEST_DESC_RNG>)
=item "RNG" (B<OSSL_SELF_TEST_DESC_RNG>)
"Continuous_RNG_Test" uses this.