[openssl] master update
tmraz at fedoraproject.org
tmraz at fedoraproject.org
Tue Jan 5 15:44:43 UTC 2021
The branch master has been updated
via b043c41c0059786eb78492fb64217053272ef37d (commit)
via b2d14651533897b709208e633d4b4f590e0eff1c (commit)
from 2c61a670ebf2f1923a3bd2ef0ee4b2fa6261eaeb (commit)
- Log -----------------------------------------------------------------
commit b043c41c0059786eb78492fb64217053272ef37d
Author: Etienne Millon <me at emillon.org>
Date: Mon Jan 4 11:33:55 2021 +0100
28-seclevel.cnf.in: fix typo in algo name
CLA: trivial
Reviewed-by: Matt Caswell <matt at openssl.org>
Reviewed-by: Tomas Mraz <tmraz at fedoraproject.org>
(Merged from https://github.com/openssl/openssl/pull/13768)
commit b2d14651533897b709208e633d4b4f590e0eff1c
Author: Etienne Millon <me at emillon.org>
Date: Mon Jan 4 11:28:36 2021 +0100
EVP_SIGNATURE-ED25519.pod: fix typo in algo name
CLA: trivial
Reviewed-by: Matt Caswell <matt at openssl.org>
Reviewed-by: Tomas Mraz <tmraz at fedoraproject.org>
(Merged from https://github.com/openssl/openssl/pull/13768)
-----------------------------------------------------------------------
Summary of changes:
doc/man7/EVP_SIGNATURE-ED25519.pod | 2 +-
test/ssl-tests/28-seclevel.cnf.in | 4 ++--
2 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/doc/man7/EVP_SIGNATURE-ED25519.pod b/doc/man7/EVP_SIGNATURE-ED25519.pod
index bb91ae2434..e2fc31f724 100644
--- a/doc/man7/EVP_SIGNATURE-ED25519.pod
+++ b/doc/man7/EVP_SIGNATURE-ED25519.pod
@@ -15,7 +15,7 @@ one-shot digest sign and digest verify using PureEdDSA and B<Ed25519> or B<Ed448
(see RFC8032). It has associated private and public key formats compatible with
RFC 8410.
-=head2 ED25591 and ED448 Signature Parameters
+=head2 ED25519 and ED448 Signature Parameters
No additional parameters can be set during one-shot signing or verification.
In particular, because PureEdDSA is used, a digest must B<NOT> be specified when
diff --git a/test/ssl-tests/28-seclevel.cnf.in b/test/ssl-tests/28-seclevel.cnf.in
index ebb082c0af..b7b96e87b7 100644
--- a/test/ssl-tests/28-seclevel.cnf.in
+++ b/test/ssl-tests/28-seclevel.cnf.in
@@ -34,7 +34,7 @@ our @tests_ec = (
test => { "ExpectedResult" => "Success" },
},
{
- # The Ed488 signature algorithm will not be enabled.
+ # The Ed448 signature algorithm will not be enabled.
# Because of the config order, the certificate is first loaded, and
# then the security level is chaged. If you try this with s_server
# the order will be reversed and it will instead fail to load the key.
@@ -47,7 +47,7 @@ our @tests_ec = (
test => { "ExpectedResult" => "ServerFail" },
},
{
- # The client will not sent the Ed488 signature algorithm, so the server
+ # The client will not sent the Ed448 signature algorithm, so the server
# doesn't have a useable signature algorithm for the certificate.
name => "SECLEVEL 5 client with ED448 key",
server => { "CipherString" => "DEFAULT:\@SECLEVEL=4",
More information about the openssl-commits
mailing list