From f5f72324dc1750bb849edda895afc6a5986d4ff6 Mon Sep 17 00:00:00 2001
From: Magnus Henoch
Date: Tue, 1 Dec 2015 16:00:54 +0000
Subject: Fix typos in ssl.xml
---
lib/ssl/doc/src/ssl.xml | 22 +++++++++++-----------
1 file changed, 11 insertions(+), 11 deletions(-)
diff --git a/lib/ssl/doc/src/ssl.xml b/lib/ssl/doc/src/ssl.xml
index bf87644116..aaf03d1cd8 100644
--- a/lib/ssl/doc/src/ssl.xml
+++ b/lib/ssl/doc/src/ssl.xml
@@ -221,7 +221,7 @@
RFC 5746.
By default secure_renegotiate is set to false,
that is, secure renegotiation is used if possible,
- but it fallback to unsecure renegotiation if the peer
+ but it falls back to insecure renegotiation if the peer
does not support
RFC 5746.
@@ -307,7 +307,7 @@ atom()}} |
unknown_ca
No trusted CA was found in the trusted store. The trusted CA is
normally a so called ROOT CA, which is a self-signed certificate. Trust can
- be claimed for an intermediat CA (trusted anchor does not have to be
+ be claimed for an intermediate CA (trusted anchor does not have to be
self-signed according to X-509) by using option partial_chain.
@@ -352,7 +352,7 @@ marker="public_key:public_key#pkix_path_validation-3">public_key:pkix_path_valid
{http, timeout()}
Enables fetching of CRLs specified as http URIs in X509 cerificate extensions.
+ marker="public_key:public_key_records"> X509 certificate extensions.
Requires the OTP inets application.
@@ -611,14 +611,14 @@ fun(srp, Username :: string(), UserState :: term()) ->
{sni_hosts, [{hostname(), ssloptions()}]}
If the server receives a SNI (Server Name Indication) from the client
- matching a host listed in the sni_hosts option, the speicific options for
+ matching a host listed in the sni_hosts option, the specific options for
that host will override previously specified options.
The option sni_fun, and sni_hosts are mutually exclusive.
{sni_fun, SNIfun::fun()}
If the server receives a SNI (Server Name Indication) from the client,
- the given function will be called to retrive ssloptions() for indicated server.
+ the given function will be called to retrieve ssloptions() for the indicated server.
These options will be merged into predefined ssloptions().
The function should be defined as:
@@ -632,7 +632,7 @@ fun(srp, Username :: string(), UserState :: term()) ->
of resources of such an operation is higher for the server than the
client. This can act as a vector for denial of service attacks. The SSL
application already takes measures to counter-act such attempts,
- but client-initiated renegotiation can be stricly disabled by setting
+ but client-initiated renegotiation can be strictly disabled by setting
this option to false. The default value is true.
Note that disabling renegotiation can result in long-lived connections
becoming unusable due to limits on the number of messages the underlying
@@ -748,10 +748,10 @@ fun(srp, Username :: string(), UserState :: term()) ->
How = timeout() | {NewController::pid(), timeout()}
Reason = term()
- Closes or downgrades an SSL connection, in the later case the transport
- connection will be handed over to the NewController process after reciving
- the TLS close alert from the peer. The retuned transport socket will have
- the following options set [{active, false}, {packet, 0}, {mode, binary}].
+ Closes or downgrades an SSL connection. In the latter case the transport
+ connection will be handed over to the NewController process after receiving
+ the TLS close alert from the peer. The returned transport socket will have
+ the following options set: [{active, false}, {packet, 0}, {mode, binary}]
@@ -818,7 +818,7 @@ fun(srp, Username :: string(), UserState :: term()) ->
Reason = term()
Returns the connection information you requested. The connection information you can request contains protocol, cipher_suite, and sni_hostname.
- {ok, Info} will be returned if it executes sucessfully. The Info is a proplists containing the information you requested.
+ {ok, Info} will be returned if it executes successfully. Info is a proplist containing the information you requested.
Otherwise, {error, Reason} will be returned.
--
cgit v1.2.3
From fb3b718e11c8478c1fcaa2a3afc3f13ee5e10097 Mon Sep 17 00:00:00 2001
From: Magnus Henoch
Date: Tue, 8 Dec 2015 18:12:08 +0000
Subject: Fix public_key documentation typos
---
lib/public_key/doc/src/public_key.xml | 10 +++++-----
lib/public_key/doc/src/public_key_records.xml | 6 +++---
2 files changed, 8 insertions(+), 8 deletions(-)
diff --git a/lib/public_key/doc/src/public_key.xml b/lib/public_key/doc/src/public_key.xml
index 258e7cd1b9..16a7497a22 100644
--- a/lib/public_key/doc/src/public_key.xml
+++ b/lib/public_key/doc/src/public_key.xml
@@ -114,8 +114,8 @@
pem_entry () =
- {pki_asn1_type(), binary(), %% DER or encrypted DER not_encrypted
- | cipher_info()}
+ {pki_asn1_type(), binary(), %% DER or encrypted DER
+ not_encrypted | cipher_info()}
cipher_info() =
{"RC2-CBC" | "DES-CBC" | "DES-EDE3-CBC", crypto:rand_bytes(8)
@@ -786,13 +786,13 @@ fun(#'DistributionPoint'{}, #'CertificateList'{},
Decodes an SSH file-binary.
SshBin = binary()
- Example {ok, SshBin} = file:read_file("known_hosts").
+ Example {ok, SshBin} = file:read_file("known_hosts").
Type = public_key | ssh_file()
If Type is public_key the binary can be either
an RFC4716 public key or an OpenSSH public key.
- Decodes an SSH file-binary. In the case of know_hosts or
+
Decodes an SSH file-binary. In the case of known_hosts or
auth_keys, the binary can include one or more lines of the
file. Returns a list of public keys and their attributes, possible
attribute values depends on the file type represented by the
@@ -842,7 +842,7 @@ fun(#'DistributionPoint'{}, #'CertificateList'{},
Key = rsa_public_key() | dsa_public_key() | ec_public_key()
- Veryfies a digital signature.
+ Verifies a digital signature.
diff --git a/lib/public_key/doc/src/public_key_records.xml b/lib/public_key/doc/src/public_key_records.xml
index fb03da3150..d34f3ed9a3 100644
--- a/lib/public_key/doc/src/public_key_records.xml
+++ b/lib/public_key/doc/src/public_key_records.xml
@@ -57,9 +57,9 @@
time() =
- uct_time() | general_time()
+ utc_time() | general_time()
- uct_time() =
+ utc_time() =
{utcTime, "YYMMDDHHMMSSZ"}
general_time() =
@@ -144,7 +144,7 @@
DSA
- Erlang representation of Digigital Signature Algorithm (DSA) keys
+ Erlang representation of Digital Signature Algorithm (DSA) keys
#'DSAPrivateKey',{
version, % integer()
--
cgit v1.2.3