Skip to content

Commit

Permalink
doc: remove end of line whitespace
Browse files Browse the repository at this point in the history
Reviewed-by: Tomas Mraz <[email protected]>
Reviewed-by: Shane Lontis <[email protected]>
(Merged from openssl#16641)
  • Loading branch information
paulidale committed Sep 22, 2021
1 parent 52dcc01 commit 57cd10d
Show file tree
Hide file tree
Showing 58 changed files with 91 additions and 91 deletions.
2 changes: 1 addition & 1 deletion doc/build.info.in
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ SUBDIRS = man1
map { $_ => 1 } glob catfile($sourcedir, "man$section", "img", "*.png");
my %podfiles =
map { $_ => 1 } glob catfile($sourcedir, "man$section", "*.pod");
my %podinfiles =
my %podinfiles =
map { $_ => 1 } glob catfile($sourcedir, "man$section", "*.pod.in");

foreach (keys %podinfiles) {
Expand Down
2 changes: 1 addition & 1 deletion doc/internal/man3/OPTIONS.pod
Original file line number Diff line number Diff line change
Expand Up @@ -189,7 +189,7 @@ B<OPT_PARAMETERS> macro:
OPT_PARAMETERS()
{OPT_PARAM_STR, 1, '-', "Parameters:\n"}

Every "option" after after this should contain the parameter and
Every "option" after after this should contain the parameter and
the help string:

{"text", 0, 0, "Words to display (optional)"},
Expand Down
2 changes: 1 addition & 1 deletion doc/internal/man3/cms_add1_signing_cert.pod
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ For a fuller description see L<openssl-cms(1)>).

=head1 RETURN VALUES

cms_add1_signing_cert() and cms_add1_signing_cert_v2() return 1 if attribute
cms_add1_signing_cert() and cms_add1_signing_cert_v2() return 1 if attribute
is added or 0 if an error occurred.

=head1 COPYRIGHT
Expand Down
2 changes: 1 addition & 1 deletion doc/internal/man3/evp_generic_fetch.pod
Original file line number Diff line number Diff line change
Expand Up @@ -37,7 +37,7 @@ I<libctx>, I<operation_id>, I<name>, and I<properties> and uses
it to create an EVP method with the help of the functions
I<new_method>, I<up_ref_method>, and I<free_method>.

evp_generic_fetch_by_number() does the same thing as evp_generic_fetch(),
evp_generic_fetch_by_number() does the same thing as evp_generic_fetch(),
but takes a numeric I<name_id> instead of a name.
I<name_id> must always be nonzero; as a matter of fact, it being zero
is considered a programming error.
Expand Down
2 changes: 1 addition & 1 deletion doc/internal/man3/ossl_lib_ctx_get_data.pod
Original file line number Diff line number Diff line change
Expand Up @@ -91,7 +91,7 @@ and a destructor to an index.
}

/*
* Include a reference to this in the methods table in context.c
* Include a reference to this in the methods table in context.c
* OSSL_LIB_CTX_FOO_INDEX should be added to internal/cryptlib.h
* Priorities can be OSSL_LIB_CTX_METHOD_DEFAULT_PRIORITY,
* OSSL_LIB_CTX_METHOD_PRIORITY_1, OSSL_LIB_CTX_METHOD_PRIORITY_2, etc.
Expand Down
2 changes: 1 addition & 1 deletion doc/internal/man3/ossl_provider_new.pod
Original file line number Diff line number Diff line change
Expand Up @@ -296,7 +296,7 @@ in a bitstring that's internal to I<provider>.

ossl_provider_test_operation_bit() checks if the bit operation I<bitnum>
is set (1) or not (0) in the internal I<provider> bitstring, and sets
I<*result> to 1 or 0 accorddingly.
I<*result> to 1 or 0 accorddingly.

ossl_provider_clear_all_operation_bits() clears all of the operation bits
to (0) for all providers in the library context I<libctx>.
Expand Down
2 changes: 1 addition & 1 deletion doc/internal/man7/DERlib.pod
Original file line number Diff line number Diff line change
Expand Up @@ -81,7 +81,7 @@ As a reminder, the AlgorithmIdentifier is specified like this:
-- From RFC 3280, section 4.1.1.2
AlgorithmIdentifier ::= SEQUENCE {
algorithm OBJECT IDENTIFIER,
parameters ANY DEFINED BY algorithm OPTIONAL }
parameters ANY DEFINED BY algorithm OPTIONAL }

And the RSASSA-PSS OID and parameters are specified like this:

Expand Down
2 changes: 1 addition & 1 deletion doc/internal/man7/build.info.pod
Original file line number Diff line number Diff line change
Expand Up @@ -574,7 +574,7 @@ appear in a linking command line (because of recursive dependencies
through other libraries), they will be ordered in such a way that this
dependency is maintained:

DEPEND[libfoo.a]{weak}=libfoo.a libcookie.a
DEPEND[libfoo.a]{weak}=libfoo.a libcookie.a

This is useful in complex dependency trees where two libraries can be
used as alternatives for each other. In this example, C<lib1.a> and
Expand Down
2 changes: 1 addition & 1 deletion doc/life-cycles/digest.dot
Original file line number Diff line number Diff line change
Expand Up @@ -30,4 +30,4 @@ digraph digest {
finaled -> initialised [label="EVP_DigestInit", style=dashed,
color="#034f84", fontcolor="#034f84"];
}

2 changes: 1 addition & 1 deletion doc/life-cycles/kdf.dot
Original file line number Diff line number Diff line change
Expand Up @@ -13,4 +13,4 @@ strict digraph kdf {
deriving -> newed [label="EVP_KDF_CTX_reset", style=dashed,
color="#034f84", fontcolor="#034f84"];
}

2 changes: 1 addition & 1 deletion doc/life-cycles/mac.dot
Original file line number Diff line number Diff line change
Expand Up @@ -25,4 +25,4 @@ digraph mac {
finaled -> initialised [label="EVP_MAC_init", style=dashed,
color="#034f84", fontcolor="#034f84"];
}

2 changes: 1 addition & 1 deletion doc/life-cycles/rand.dot
Original file line number Diff line number Diff line change
Expand Up @@ -14,4 +14,4 @@ strict digraph rand {
uninstantiated -> end [label="EVP_RAND_CTX_free"];
uninstantiated -> instantiated [label="EVP_RAND_instantiate", style=dashed, color="#034f84", fontcolor="#034f84"];
}

2 changes: 1 addition & 1 deletion doc/man1/openssl-cmp.pod.in
Original file line number Diff line number Diff line change
Expand Up @@ -835,7 +835,7 @@ have no effect on the certificate verification enabled via this option.

=item B<-tls_host> I<name>

Address to be checked during hostname validation.
Address to be checked during hostname validation.
This may be a DNS name or an IP address.
If not given it defaults to the B<-server> address.

Expand Down
2 changes: 1 addition & 1 deletion doc/man3/CMS_add1_recipient_cert.pod
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ CMS_add1_recipient, CMS_add1_recipient_cert, CMS_add0_recipient_key - add recipi
#include <openssl/cms.h>

CMS_RecipientInfo *CMS_add1_recipient(CMS_ContentInfo *cms, X509 *recip,
EVP_PKEY *originatorPrivKey,
EVP_PKEY *originatorPrivKey,
X509 *originator, unsigned int flags);

CMS_RecipientInfo *CMS_add1_recipient_cert(CMS_ContentInfo *cms,
Expand Down
2 changes: 1 addition & 1 deletion doc/man3/CMS_get0_RecipientInfos.pod
Original file line number Diff line number Diff line change
Expand Up @@ -140,7 +140,7 @@ L<ERR_get_error(3)>, L<CMS_decrypt(3)>

=head1 HISTORY

B<CMS_RecipientInfo_kari_set0_pkey_and_peer> and B<CMS_RecipientInfo_kari_set0_pkey>
B<CMS_RecipientInfo_kari_set0_pkey_and_peer> and B<CMS_RecipientInfo_kari_set0_pkey>
were added in OpenSSL 3.0.

=head1 COPYRIGHT
Expand Down
2 changes: 1 addition & 1 deletion doc/man3/CMS_verify.pod
Original file line number Diff line number Diff line change
Expand Up @@ -71,7 +71,7 @@ verified, unless CMS_CADES flag is also set.
If B<CMS_NO_ATTR_VERIFY> is set the signed attributes signature is not
verified, unless CMS_CADES flag is also set.

If B<CMS_CADES> is set, each signer certificate is checked against the
If B<CMS_CADES> is set, each signer certificate is checked against the
ESS signingCertificate or ESS signingCertificateV2 extension
that is required in the signed attributes of the signature.

Expand Down
2 changes: 1 addition & 1 deletion doc/man3/CRYPTO_get_ex_new_index.pod
Original file line number Diff line number Diff line change
Expand Up @@ -152,7 +152,7 @@ will fail.
CRYPTO_get_ex_new_index() returns a new index or -1 on failure.

CRYPTO_free_ex_index(), CRYPTO_alloc_ex_data() and CRYPTO_set_ex_data()
return 1 on success or 0 on failure.
return 1 on success or 0 on failure.

CRYPTO_get_ex_data() returns the application data or NULL on failure;
note that NULL may be a valid value.
Expand Down
4 changes: 2 additions & 2 deletions doc/man3/ERR_get_error.pod
Original file line number Diff line number Diff line change
Expand Up @@ -78,14 +78,14 @@ is valid until the respective entry is overwritten in the error queue.
ERR_peek_error_line() and ERR_peek_last_error_line() are the same as
ERR_peek_error() and ERR_peek_last_error(), but on success they additionally
store the filename and line number where the error occurred in *I<file> and
*I<line>, as far as they are not NULL.
*I<line>, as far as they are not NULL.
An unset filename is indicated as "", i.e., an empty string.
An unset line number is indicated as 0.

ERR_peek_error_func() and ERR_peek_last_error_func() are the same as
ERR_peek_error() and ERR_peek_last_error(), but on success they additionally
store the name of the function where the error occurred in *I<func>, unless
it is NULL.
it is NULL.
An unset function name is indicated as "".

ERR_peek_error_data() and ERR_peek_last_error_data() are the same as
Expand Down
2 changes: 1 addition & 1 deletion doc/man3/ERR_put_error.pod
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,7 @@ record.

ERR_raise_data() does the same thing as ERR_raise(), but also lets the
caller specify additional information as a format string B<fmt> and an
arbitrary number of values, which are processed with L<BIO_snprintf(3)>.
arbitrary number of values, which are processed with L<BIO_snprintf(3)>.

ERR_put_error() adds an error code to the thread's error queue. It
signals that the error of reason code B<reason> occurred in function
Expand Down
2 changes: 1 addition & 1 deletion doc/man3/EVP_EncryptInit.pod
Original file line number Diff line number Diff line change
Expand Up @@ -1330,7 +1330,7 @@ Sets the CCM B<L> value. If not set a default is used (8 for AES).

=item EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_IVLEN, ivlen, NULL)

Sets the CCM nonce (IV) length. This call can only be made before specifying a
Sets the CCM nonce (IV) length. This call can only be made before specifying a
nonce value. The nonce length is given by B<15 - L> so it is 7 by default for
AES.

Expand Down
2 changes: 1 addition & 1 deletion doc/man3/EVP_PKEY_copy_parameters.pod
Original file line number Diff line number Diff line change
Expand Up @@ -64,7 +64,7 @@ doesn't use parameters.
These functions EVP_PKEY_copy_parameters() returns 1 for success and 0 for
failure.

The functions EVP_PKEY_cmp_parameters(), EVP_PKEY_parameters_eq(),
The functions EVP_PKEY_cmp_parameters(), EVP_PKEY_parameters_eq(),
EVP_PKEY_cmp() and EVP_PKEY_eq() return 1 if their
inputs match, 0 if they don't match, -1 if the key types are different and
-2 if the operation is not supported.
Expand Down
2 changes: 1 addition & 1 deletion doc/man3/EVP_PKEY_encapsulate.pod
Original file line number Diff line number Diff line change
Expand Up @@ -75,7 +75,7 @@ Encapsulate an RSASVE key (for RSA keys).
/*
* The generated 'secret' can be used as key material.
* The encapsulated 'out' can be sent to another party who can
* decapsulate it using their private key to retrieve the 'secret'.
* decapsulate it using their private key to retrieve the 'secret'.
*/
if (EVP_PKEY_encapsulate(ctx, out, &outlen, secret, &secretlen) <= 0)
/* Error */
Expand Down
2 changes: 1 addition & 1 deletion doc/man3/EVP_PKEY_encrypt.pod
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

=head1 NAME

EVP_PKEY_encrypt_init_ex,
EVP_PKEY_encrypt_init_ex,
EVP_PKEY_encrypt_init, EVP_PKEY_encrypt - encrypt using a public key algorithm

=head1 SYNOPSIS
Expand Down
2 changes: 1 addition & 1 deletion doc/man3/EVP_PKEY_fromdata.pod
Original file line number Diff line number Diff line change
Expand Up @@ -80,7 +80,7 @@ public key and key parameters.
These functions only work with key management methods coming from a provider.
This is the mirror function to L<EVP_PKEY_todata(3)>.

=for comment We may choose to make this available for legacy methods too...
=for comment We may choose to make this available for legacy methods too...

=head1 RETURN VALUES

Expand Down
2 changes: 1 addition & 1 deletion doc/man3/OSSL_CMP_SRV_CTX_new.pod
Original file line number Diff line number Diff line change
Expand Up @@ -100,7 +100,7 @@ in the same way as L<OSSL_CMP_MSG_http_perform(3)>.
The B<OSSL_CMP_SRV_CTX> must be set as I<transfer_cb_arg> of I<client_ctx>.

OSSL_CMP_SRV_CTX_new() creates and initializes an B<OSSL_CMP_SRV_CTX> structure
associated with the library context I<libctx> and property query string
associated with the library context I<libctx> and property query string
I<propq>, both of which may be NULL to select the defaults.

OSSL_CMP_SRV_CTX_free() deletes the given I<srv_ctx>.
Expand Down
2 changes: 1 addition & 1 deletion doc/man3/OSSL_DECODER_CTX.pod
Original file line number Diff line number Diff line change
Expand Up @@ -159,7 +159,7 @@ OSSL_DECODER_CTX_set_cleanup() respectively.

OSSL_DECODER_export() is a fallback function for constructors that cannot
use the data they get directly for diverse reasons. It takes the same
decode instance I<decoder_inst> that the constructor got and an object
decode instance I<decoder_inst> that the constructor got and an object
I<reference>, unpacks the object which it refers to, and exports it by
creating an L<OSSL_PARAM(3)> array that it then passes to I<export_cb>,
along with I<export_arg>.
Expand Down
4 changes: 2 additions & 2 deletions doc/man3/PKCS12_SAFEBAG_create_cert.pod
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
=head1 NAME

PKCS12_SAFEBAG_create_cert, PKCS12_SAFEBAG_create_crl,
PKCS12_SAFEBAG_create_secret, PKCS12_SAFEBAG_create0_p8inf,
PKCS12_SAFEBAG_create_secret, PKCS12_SAFEBAG_create0_p8inf,
PKCS12_SAFEBAG_create0_pkcs8, PKCS12_SAFEBAG_create_pkcs8_encrypt,
PKCS12_SAFEBAG_create_pkcs8_encrypt_ex - Create PKCS#12 safeBag objects

Expand Down Expand Up @@ -52,7 +52,7 @@ containing the supplied PKCS8 structure.
PKCS12_SAFEBAG_create0_pkcs8() creates a new B<PKCS12_SAFEBAG> of type
B<NID_pkcs8ShroudedKeyBag> containing the supplied PKCS8 structure.

PKCS12_SAFEBAG_create_pkcs8_encrypt() creates a new B<PKCS12_SAFEBAG> of type
PKCS12_SAFEBAG_create_pkcs8_encrypt() creates a new B<PKCS12_SAFEBAG> of type
B<NID_pkcs8ShroudedKeyBag> by encrypting the supplied PKCS8 I<p8inf>.
If I<pbe_nid> is 0, a default encryption algorithm is used. I<pass> is the
passphrase and I<iter> is the iteration count. If I<iter> is zero then a default
Expand Down
6 changes: 3 additions & 3 deletions doc/man3/PKCS12_SAFEBAG_get0_attrs.pod
Original file line number Diff line number Diff line change
Expand Up @@ -16,18 +16,18 @@ PKCS12_SAFEBAG_get0_attrs, PKCS12_get_attr_gen

=head1 DESCRIPTION

PKCS12_SAFEBAG_get0_attrs() retrieves the stack of B<X509_ATTRIBUTE>s from a
PKCS12_SAFEBAG_get0_attrs() retrieves the stack of B<X509_ATTRIBUTE>s from a
PKCS#12 safeBag. I<bag> is the B<PKCS12_SAFEBAG> to retrieve the attributes from.

PKCS12_get_attr_gen() retrieves an attribute by NID from a stack of
B<X509_ATTRIBUTE>s. I<attr_nid> is the NID of the attribute to retrieve.

=head1 RETURN VALUES

PKCS12_SAFEBAG_get0_attrs() returns the stack of B<X509_ATTRIBUTE>s from a
PKCS12_SAFEBAG_get0_attrs() returns the stack of B<X509_ATTRIBUTE>s from a
PKCS#12 safeBag, which could be empty.

PKCS12_get_attr_gen() returns an B<ASN1_TYPE> object containing the attribute,
PKCS12_get_attr_gen() returns an B<ASN1_TYPE> object containing the attribute,
or NULL if the attribute was either not present or an error occurred.

PKCS12_get_attr_gen() does not allocate a new attribute. The returned attribute
Expand Down
2 changes: 1 addition & 1 deletion doc/man3/PKCS12_SAFEBAG_get1_cert.pod
Original file line number Diff line number Diff line change
Expand Up @@ -48,7 +48,7 @@ PKCS12_SAFEBAG_get0_p8inf() and PKCS12_SAFEBAG_get0_pkcs8() return the PKCS8 obj
from a PKCS8shroudedKeyBag or a keyBag.

PKCS12_SAFEBAG_get0_safes() retrieves the set of B<safeBags> contained within a
safeContentsBag.
safeContentsBag.

=head1 RETURN VALUES

Expand Down
2 changes: 1 addition & 1 deletion doc/man3/PKCS12_decrypt_skey.pod
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ decrypt functions
PKCS12_decrypt_skey() Decrypt the PKCS#8 shrouded keybag contained within I<bag>
using the supplied password I<pass> of length I<passlen>.

PKCS12_decrypt_skey_ex() is similar to the above but allows for a library contex
PKCS12_decrypt_skey_ex() is similar to the above but allows for a library contex
I<ctx> and property query I<propq> to be used to select algorithm implementations.

=head1 RETURN VALUES
Expand Down
2 changes: 1 addition & 1 deletion doc/man3/SSL_set_async_callback.pod
Original file line number Diff line number Diff line change
Expand Up @@ -55,7 +55,7 @@ An example of the above functions would be the following:

=item 1.

Application sets the async callback and callback data on an SSL connection
Application sets the async callback and callback data on an SSL connection
by calling SSL_set_async_callback().

=item 2.
Expand Down
2 changes: 1 addition & 1 deletion doc/man3/SSL_set_bio.pod
Original file line number Diff line number Diff line change
Expand Up @@ -78,7 +78,7 @@ and no references are consumed for the B<wbio>.
If the B<rbio> and B<wbio> parameters are different and the B<wbio>
is the same as the
previously set value and the old B<rbio> and B<wbio> values were different
to each other, then one reference is consumed for the B<rbio> and one
to each other, then one reference is consumed for the B<rbio> and one
reference is consumed for the B<wbio>.

=back
Expand Down
4 changes: 2 additions & 2 deletions doc/man3/X509_get0_signature.pod
Original file line number Diff line number Diff line change
Expand Up @@ -3,8 +3,8 @@
=head1 NAME

X509_get0_signature, X509_REQ_set0_signature, X509_REQ_set1_signature_algo,
X509_get_signature_nid, X509_get0_tbs_sigalg, X509_REQ_get0_signature,
X509_REQ_get_signature_nid, X509_CRL_get0_signature, X509_CRL_get_signature_nid,
X509_get_signature_nid, X509_get0_tbs_sigalg, X509_REQ_get0_signature,
X509_REQ_get_signature_nid, X509_CRL_get0_signature, X509_CRL_get_signature_nid,
X509_get_signature_info, X509_SIG_INFO_get, X509_SIG_INFO_set - signature information

=head1 SYNOPSIS
Expand Down
14 changes: 7 additions & 7 deletions doc/man3/d2i_RSAPrivateKey.pod
Original file line number Diff line number Diff line change
Expand Up @@ -172,13 +172,13 @@ There are two migration paths:
=item *

Replace
b<d2i_I<TYPE>PrivateKey()> with L<d2i_PrivateKey(3)>,
b<d2i_I<TYPE>PublicKey()> with L<d2i_PublicKey(3)>,
b<d2i_I<TYPE>params()> with L<d2i_KeyParams(3)>,
b<d2i_I<TYPE>_PUBKEY()> with L<d2i_PUBKEY(3)>,
b<i2d_I<TYPE>PrivateKey()> with L<i2d_PrivateKey(3)>,
b<i2d_I<TYPE>PublicKey()> with L<i2d_PublicKey(3)>,
b<i2d_I<TYPE>params()> with L<i2d_KeyParams(3)>,
b<d2i_I<TYPE>PrivateKey()> with L<d2i_PrivateKey(3)>,
b<d2i_I<TYPE>PublicKey()> with L<d2i_PublicKey(3)>,
b<d2i_I<TYPE>params()> with L<d2i_KeyParams(3)>,
b<d2i_I<TYPE>_PUBKEY()> with L<d2i_PUBKEY(3)>,
b<i2d_I<TYPE>PrivateKey()> with L<i2d_PrivateKey(3)>,
b<i2d_I<TYPE>PublicKey()> with L<i2d_PublicKey(3)>,
b<i2d_I<TYPE>params()> with L<i2d_KeyParams(3)>,
b<i2d_I<TYPE>_PUBKEY()> with L<i2d_PUBKEY(3)>.
A caveat is that L<i2d_PrivateKey(3)> may output a DER encoded PKCS#8
outermost structure instead of the type specific structure, and that
Expand Down
4 changes: 2 additions & 2 deletions doc/man5/x509v3_config.pod
Original file line number Diff line number Diff line change
Expand Up @@ -289,8 +289,8 @@ B<access_id;location>, where B<access_id> is an object identifier
syntax as subject alternative name (except that B<email:copy> is not supported).

Possible values for access_id include B<OCSP> (OCSP responder),
B<caIssuers> (CA Issuers),
B<ad_timestamping> (AD Time Stamping),
B<caIssuers> (CA Issuers),
B<ad_timestamping> (AD Time Stamping),
B<AD_DVCS> (ad dvcs),
B<caRepository> (CA Repository).

Expand Down
2 changes: 1 addition & 1 deletion doc/man7/EVP_KEYEXCH-ECDH.pod
Original file line number Diff line number Diff line change
Expand Up @@ -74,7 +74,7 @@ Keys for the host and peer must be generated as shown in
L<EVP_PKEY-EC(7)/Examples> using the same curve name.

The code to generate a shared secret for the normal case is identical to
L<EVP_KEYEXCH-DH(7)/Examples>.
L<EVP_KEYEXCH-DH(7)/Examples>.

To derive a shared secret on the host using the host's key and the peer's public
key but also using X963KDF with a user key material:
Expand Down
2 changes: 1 addition & 1 deletion doc/man7/EVP_PKEY-DH.pod
Original file line number Diff line number Diff line change
Expand Up @@ -74,7 +74,7 @@ See EVP_PKEY_set1_encoded_public_key() and EVP_PKEY_get1_encoded_public_key().
Used for DH generation of safe primes using the old safe prime generator code.
The default value is 2.
It is recommended to use a named safe prime group instead, if domain parameter
validation is required.
validation is required.

Randomly generated safe primes are not allowed by FIPS, so setting this value
for the OpenSSL FIPS provider will instead choose a named safe prime group
Expand Down
2 changes: 1 addition & 1 deletion doc/man7/EVP_PKEY-EC.pod
Original file line number Diff line number Diff line change
Expand Up @@ -71,7 +71,7 @@ I<order> multiplied by the I<cofactor> gives the number of points on the curve.
=item "decoded-from-explicit" (B<OSSL_PKEY_PARAM_EC_DECODED_FROM_EXPLICIT_PARAMS>) <integer>

Gets a flag indicating wether the key or parameters were decoded from explicit
curve parameters. Set to 1 if so or 0 if a named curve was used.
curve parameters. Set to 1 if so or 0 if a named curve was used.

=item "use-cofactor-flag" (B<OSSL_PKEY_PARAM_USE_COFACTOR_ECDH>) <integer>

Expand Down
2 changes: 1 addition & 1 deletion doc/man7/EVP_PKEY-FFC.pod
Original file line number Diff line number Diff line change
Expand Up @@ -92,7 +92,7 @@ of I<p>. This value must be saved if domain parameter validation is required.

=item "hindex" (B<OSSL_PKEY_PARAM_FFC_H>) <integer>

For unverifiable generation of the generator I<g> this value is output during
For unverifiable generation of the generator I<g> this value is output during
generation of I<g>. Its value is the first integer larger than one that
satisfies g = h^j mod p (where g != 1 and "j" is the cofactor).

Expand Down
2 changes: 1 addition & 1 deletion doc/man7/EVP_SIGNATURE-DSA.pod
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ See L<EVP_PKEY-DSA(7)> for information related to DSA keys.

The following signature parameters can be set using EVP_PKEY_CTX_set_params().
This may be called after EVP_PKEY_sign_init() or EVP_PKEY_verify_init(),
and before calling EVP_PKEY_sign() or EVP_PKEY_verify().
and before calling EVP_PKEY_sign() or EVP_PKEY_verify().

=over 4

Expand Down
Loading

0 comments on commit 57cd10d

Please sign in to comment.