summaryrefslogtreecommitdiffstats
path: root/doc/man3/SSL_read_early_data.pod
diff options
context:
space:
mode:
authorJosh Soref <jsoref@users.noreply.github.com>2017-05-19 02:16:38 +0200
committerRich Salz <rsalz@openssl.org>2017-06-11 22:21:33 +0200
commit27b138e9db91bdfa1e3c55b0c3c9b2f02b5c0bf1 (patch)
treec28e9a7d78b810de21c8661c143f12cf007a7db3 /doc/man3/SSL_read_early_data.pod
parentIf-guard to avoid null ptr deref in statem_srvr.c (diff)
downloadopenssl-27b138e9db91bdfa1e3c55b0c3c9b2f02b5c0bf1.tar.xz
openssl-27b138e9db91bdfa1e3c55b0c3c9b2f02b5c0bf1.zip
Fix spelling errors in manpages
spelling: algorithm spelling: anyway spelling: assigned spelling: authenticated spelling: callback spelling: certificate spelling: compatibility spelling: configuration spelling: digest spelling: encrypted spelling: function spelling: output spelling: receive spelling: renegotiation spelling: signing spelling: similar spelling: string (Merged from https://github.com/openssl/openssl/pull/3580)Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Kurt Roeckx <kurt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/3580)
Diffstat (limited to 'doc/man3/SSL_read_early_data.pod')
-rw-r--r--doc/man3/SSL_read_early_data.pod4
1 files changed, 2 insertions, 2 deletions
diff --git a/doc/man3/SSL_read_early_data.pod b/doc/man3/SSL_read_early_data.pod
index dd57cefefb..38dffe5652 100644
--- a/doc/man3/SSL_read_early_data.pod
+++ b/doc/man3/SSL_read_early_data.pod
@@ -30,7 +30,7 @@ SSL_get_early_data_status
=head1 DESCRIPTION
-These functions are used to send and recieve early data where TLSv1.3 has been
+These functions are used to send and receive early data where TLSv1.3 has been
negotiated. Early data can be sent by the client immediately after its initial
ClientHello without having to wait for the server to complete the handshake.
Early data can only be sent if a session has previously been established with
@@ -152,7 +152,7 @@ connection immediately without further need to call a function such as
L<SSL_accept(3)>. This can happen if the client is using a protocol version less
than TLSv1.3. Applications can test for this by calling
L<SSL_is_init_finished(3)>. Alternatively, applications may choose to call
-L<SSL_accept(3)> anway. Such a call will successfully return immediately with no
+L<SSL_accept(3)> anyway. Such a call will successfully return immediately with no
further action taken.
When a session is created between a server and a client the server will specify