[openssl] openssl-3.0 update

Dr. Paul Dale pauli at openssl.org
Thu Feb 24 00:22:40 UTC 2022


The branch openssl-3.0 has been updated
       via  e19edf7361b952674135b8500144df6afec18319 (commit)
      from  6f4a98ce2157aca169709c80ea579e80e39011b6 (commit)


- Log -----------------------------------------------------------------
commit e19edf7361b952674135b8500144df6afec18319
Author: Carlo Teubner <435950+c4rlo at users.noreply.github.com>
Date:   Fri Feb 18 10:00:52 2022 +0000

    X509_VERIFY_PARAM_set_flags.pod: fix typos
    
    CLA: trivial
    
    Reviewed-by: Tomas Mraz <tomas at openssl.org>
    Reviewed-by: Paul Dale <pauli at openssl.org>
    (Merged from https://github.com/openssl/openssl/pull/17731)
    
    (cherry picked from commit cbb6f4dbf0ce42b4cc4385d7b95236710504068d)

-----------------------------------------------------------------------

Summary of changes:
 doc/man3/X509_VERIFY_PARAM_set_flags.pod | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/doc/man3/X509_VERIFY_PARAM_set_flags.pod b/doc/man3/X509_VERIFY_PARAM_set_flags.pod
index 1213627be7..55bdf877b3 100644
--- a/doc/man3/X509_VERIFY_PARAM_set_flags.pod
+++ b/doc/man3/X509_VERIFY_PARAM_set_flags.pod
@@ -249,8 +249,8 @@ certificate. An error occurs if a suitable CRL cannot be found.
 B<X509_V_FLAG_CRL_CHECK_ALL> enables CRL checking for the entire certificate
 chain.
 
-B<X509_V_FLAG_IGNORE_CRITICAL> disabled critical extension checking. By default
-any unhandled critical extensions in certificates or (if checked) CRLs results
+B<X509_V_FLAG_IGNORE_CRITICAL> disables critical extension checking. By default
+any unhandled critical extensions in certificates or (if checked) CRLs result
 in a fatal error. If this flag is set unhandled critical extensions are
 ignored. B<WARNING> setting this option for anything other than debugging
 purposes can be a security risk. Finer control over which extensions are


More information about the openssl-commits mailing list