[openssl-dev] [openssl.org #4219] [typos] DANE related docs

Claus Assmann via RT rt at openssl.org
Wed Jan 6 17:15:58 UTC 2016


diff --git a/doc/ssl/SSL_CTX_dane_enable.pod b/doc/ssl/SSL_CTX_dane_enable.pod
index 66eb1b3..29fc4db 100644
--- a/doc/ssl/SSL_CTX_dane_enable.pod
+++ b/doc/ssl/SSL_CTX_dane_enable.pod
@@ -40,7 +40,7 @@ SSL_CTX_dane_mtype_set() may then be called zero or more times to
 to adjust the supported digest algorithms.  This must be done before
 any SSL handles are created for the context.
 
-The B<mtype> argument specifies a DANE TLSA matching type and the
+The B<mtype> argument specifies a DANE TLSA matching type and
 the B<md> argument specifies the associated digest algorithm handle.
 The B<ord> argument specifies a strength ordinal.  Algorithms with
 a larger strength ordinal are considered more secure.  Strength
@@ -181,7 +181,7 @@ the lifetime of the SSL connection.
     }
 
     ret = SSL_dane_tlsa_add(ssl, usage, selector, mtype, data, len);
-    /* free data as approriate */
+    /* free data as appropriate */
 
     if (ret < 0)
         /* handle SSL library internal error */
diff --git a/doc/ssl/SSL_set1_host.pod b/doc/ssl/SSL_set1_host.pod
index b008a5f..0ef2448 100644
--- a/doc/ssl/SSL_set1_host.pod
+++ b/doc/ssl/SSL_set1_host.pod
@@ -35,7 +35,7 @@ that can match the peer's certificate.  Any previous names set via
 SSL_set1_host() or SSL_add1_host() are retained, no change is made
 if B<name> is NULL or empty.  When multiple names are configured,
 the peer is considered verified when any name matches.  This function
-is required for DANE TLA in the presence of service name indirection
+is required for DANE TLSA in the presence of service name indirection
 via CNAME, MX or SRV records as specified in RFC7671, RFC7672 or
 RFC7673.
 

_______________________________________________
openssl-bugs-mod mailing list
openssl-bugs-mod at openssl.org
https://mta.openssl.org/mailman/listinfo/openssl-bugs-mod



More information about the openssl-dev mailing list