diff options
author | Josh Soref <jsoref@users.noreply.github.com> | 2017-05-19 02:16:38 +0200 |
---|---|---|
committer | Rich Salz <rsalz@openssl.org> | 2017-06-11 22:21:33 +0200 |
commit | 27b138e9db91bdfa1e3c55b0c3c9b2f02b5c0bf1 (patch) | |
tree | c28e9a7d78b810de21c8661c143f12cf007a7db3 /doc/man3/SSL_read_early_data.pod | |
parent | If-guard to avoid null ptr deref in statem_srvr.c (diff) | |
download | openssl-27b138e9db91bdfa1e3c55b0c3c9b2f02b5c0bf1.tar.xz openssl-27b138e9db91bdfa1e3c55b0c3c9b2f02b5c0bf1.zip |
Fix spelling errors in manpages
spelling: algorithm
spelling: anyway
spelling: assigned
spelling: authenticated
spelling: callback
spelling: certificate
spelling: compatibility
spelling: configuration
spelling: digest
spelling: encrypted
spelling: function
spelling: output
spelling: receive
spelling: renegotiation
spelling: signing
spelling: similar
spelling: string
(Merged from https://github.com/openssl/openssl/pull/3580)Reviewed-by: Rich Salz <rsalz@openssl.org>
Reviewed-by: Kurt Roeckx <kurt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/3580)
Diffstat (limited to 'doc/man3/SSL_read_early_data.pod')
-rw-r--r-- | doc/man3/SSL_read_early_data.pod | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/doc/man3/SSL_read_early_data.pod b/doc/man3/SSL_read_early_data.pod index dd57cefefb..38dffe5652 100644 --- a/doc/man3/SSL_read_early_data.pod +++ b/doc/man3/SSL_read_early_data.pod @@ -30,7 +30,7 @@ SSL_get_early_data_status =head1 DESCRIPTION -These functions are used to send and recieve early data where TLSv1.3 has been +These functions are used to send and receive early data where TLSv1.3 has been negotiated. Early data can be sent by the client immediately after its initial ClientHello without having to wait for the server to complete the handshake. Early data can only be sent if a session has previously been established with @@ -152,7 +152,7 @@ connection immediately without further need to call a function such as L<SSL_accept(3)>. This can happen if the client is using a protocol version less than TLSv1.3. Applications can test for this by calling L<SSL_is_init_finished(3)>. Alternatively, applications may choose to call -L<SSL_accept(3)> anway. Such a call will successfully return immediately with no +L<SSL_accept(3)> anyway. Such a call will successfully return immediately with no further action taken. When a session is created between a server and a client the server will specify |