Loading apps/apps.h +3 −3 Original line number Diff line number Diff line Loading @@ -113,9 +113,9 @@ int has_stdin_waiting(void); { "explicit_policy", OPT_V_EXPLICIT_POLICY, '-', \ "set policy variable require-explicit-policy"}, \ { "inhibit_any", OPT_V_INHIBIT_ANY, '-', \ "set policy variable inihibit-any-policy"}, \ "set policy variable inhibit-any-policy"}, \ { "inhibit_map", OPT_V_INHIBIT_MAP, '-', \ "set policy variable inihibit-policy-mapping"}, \ "set policy variable inhibit-policy-mapping"}, \ { "x509_strict", OPT_V_X509_STRICT, '-', \ "disable certificate compatibility work-arounds"}, \ { "extended_crl", OPT_V_EXTENDED_CRL, '-', \ Loading Loading @@ -187,7 +187,7 @@ int has_stdin_waiting(void); { "xcertform", OPT_X_CERTFORM, 'F', \ "format of Extended certificate (PEM or DER) PEM default " }, \ { "xkeyform", OPT_X_KEYFORM, 'F', \ "format of Exnteded certificate's key (PEM or DER) PEM default"} "format of Extended certificate's key (PEM or DER) PEM default"} # define OPT_X_CASES \ OPT_X__FIRST: case OPT_X__LAST: break; \ Loading apps/ocsp.c +1 −1 Original line number Diff line number Diff line Loading @@ -165,7 +165,7 @@ OPTIONS ocsp_options[] = { "Number of requests to accept (default unlimited)"}, {"ndays", OPT_NDAYS, 'p', "Number of days before next update"}, {"rsigner", OPT_RSIGNER, '<', "Sesponder certificate to sign responses with"}, "Responder certificate to sign responses with"}, {"rkey", OPT_RKEY, '<', "Responder key to sign responses with"}, {"rother", OPT_ROTHER, '<', "Other certificates to include in response"}, {"rmd", OPT_RMD, 's', "Digest Algorithm to use in signature of OCSP response"}, Loading apps/opt.c +2 −2 Original line number Diff line number Diff line Loading @@ -74,7 +74,7 @@ char *opt_progname(const char *argv0) { const char *p, *q; /* Find last special charcter sys:[foo.bar]openssl */ /* Find last special character sys:[foo.bar]openssl */ for (p = argv0 + strlen(argv0); --p > argv0;) if (*p == ':' || *p == ']' || *p == '>') { p++; Loading Loading @@ -857,7 +857,7 @@ void opt_help(const OPTIONS *list) start[sizeof start - 1] = '\0'; if (o->name == OPT_MORE_STR) { /* Continuation of previous line; padd and print. */ /* Continuation of previous line; pad and print. */ start[width] = '\0'; BIO_printf(bio_err, "%s %s\n", start, help); continue; Loading crypto/x509v3/pcy_data.c +2 −2 Original line number Diff line number Diff line Loading @@ -28,9 +28,9 @@ void policy_data_free(X509_POLICY_DATA *data) } /* * Create a data based on an existing policy. If 'id' is NULL use the oid in * Create a data based on an existing policy. If 'id' is NULL use the OID in * the policy, otherwise use 'id'. This behaviour covers the two types of * data in RFC3280: data with from a CertificatePolcies extension and * data in RFC3280: data with from a CertificatePolicies extension and * additional data with just the qualifiers of anyPolicy and ID from another * source. */ Loading doc/apps/s_client.pod +1 −1 Original line number Diff line number Diff line Loading @@ -355,7 +355,7 @@ L<SSL_CTX_set_split_send_fragment(3)> for further information. The maximum number of encrypt/decrypt pipelines to be used. This will only have an effect if an engine has been loaded that supports pipelining (e.g. the dasync engine) and a suiteable ciphersuite has been negotiated. The default value is 1. engine) and a suitable ciphersuite has been negotiated. The default value is 1. See L<SSL_CTX_set_max_pipelines(3)> for further information. =item B<-read_buf int> Loading Loading
apps/apps.h +3 −3 Original line number Diff line number Diff line Loading @@ -113,9 +113,9 @@ int has_stdin_waiting(void); { "explicit_policy", OPT_V_EXPLICIT_POLICY, '-', \ "set policy variable require-explicit-policy"}, \ { "inhibit_any", OPT_V_INHIBIT_ANY, '-', \ "set policy variable inihibit-any-policy"}, \ "set policy variable inhibit-any-policy"}, \ { "inhibit_map", OPT_V_INHIBIT_MAP, '-', \ "set policy variable inihibit-policy-mapping"}, \ "set policy variable inhibit-policy-mapping"}, \ { "x509_strict", OPT_V_X509_STRICT, '-', \ "disable certificate compatibility work-arounds"}, \ { "extended_crl", OPT_V_EXTENDED_CRL, '-', \ Loading Loading @@ -187,7 +187,7 @@ int has_stdin_waiting(void); { "xcertform", OPT_X_CERTFORM, 'F', \ "format of Extended certificate (PEM or DER) PEM default " }, \ { "xkeyform", OPT_X_KEYFORM, 'F', \ "format of Exnteded certificate's key (PEM or DER) PEM default"} "format of Extended certificate's key (PEM or DER) PEM default"} # define OPT_X_CASES \ OPT_X__FIRST: case OPT_X__LAST: break; \ Loading
apps/ocsp.c +1 −1 Original line number Diff line number Diff line Loading @@ -165,7 +165,7 @@ OPTIONS ocsp_options[] = { "Number of requests to accept (default unlimited)"}, {"ndays", OPT_NDAYS, 'p', "Number of days before next update"}, {"rsigner", OPT_RSIGNER, '<', "Sesponder certificate to sign responses with"}, "Responder certificate to sign responses with"}, {"rkey", OPT_RKEY, '<', "Responder key to sign responses with"}, {"rother", OPT_ROTHER, '<', "Other certificates to include in response"}, {"rmd", OPT_RMD, 's', "Digest Algorithm to use in signature of OCSP response"}, Loading
apps/opt.c +2 −2 Original line number Diff line number Diff line Loading @@ -74,7 +74,7 @@ char *opt_progname(const char *argv0) { const char *p, *q; /* Find last special charcter sys:[foo.bar]openssl */ /* Find last special character sys:[foo.bar]openssl */ for (p = argv0 + strlen(argv0); --p > argv0;) if (*p == ':' || *p == ']' || *p == '>') { p++; Loading Loading @@ -857,7 +857,7 @@ void opt_help(const OPTIONS *list) start[sizeof start - 1] = '\0'; if (o->name == OPT_MORE_STR) { /* Continuation of previous line; padd and print. */ /* Continuation of previous line; pad and print. */ start[width] = '\0'; BIO_printf(bio_err, "%s %s\n", start, help); continue; Loading
crypto/x509v3/pcy_data.c +2 −2 Original line number Diff line number Diff line Loading @@ -28,9 +28,9 @@ void policy_data_free(X509_POLICY_DATA *data) } /* * Create a data based on an existing policy. If 'id' is NULL use the oid in * Create a data based on an existing policy. If 'id' is NULL use the OID in * the policy, otherwise use 'id'. This behaviour covers the two types of * data in RFC3280: data with from a CertificatePolcies extension and * data in RFC3280: data with from a CertificatePolicies extension and * additional data with just the qualifiers of anyPolicy and ID from another * source. */ Loading
doc/apps/s_client.pod +1 −1 Original line number Diff line number Diff line Loading @@ -355,7 +355,7 @@ L<SSL_CTX_set_split_send_fragment(3)> for further information. The maximum number of encrypt/decrypt pipelines to be used. This will only have an effect if an engine has been loaded that supports pipelining (e.g. the dasync engine) and a suiteable ciphersuite has been negotiated. The default value is 1. engine) and a suitable ciphersuite has been negotiated. The default value is 1. See L<SSL_CTX_set_max_pipelines(3)> for further information. =item B<-read_buf int> Loading