| Index: openssl/doc/ssleay.txt
|
| ===================================================================
|
| --- openssl/doc/ssleay.txt (revision 105093)
|
| +++ openssl/doc/ssleay.txt (working copy)
|
| @@ -20,7 +20,7 @@
|
| ==== readme ========================================================
|
|
|
| This is the old 0.6.6 docuementation. Most of the cipher stuff is still
|
| -relevent but I'm working (very slowly) on new docuemtation.
|
| +relevent but I'm working (very slowly) on new documentation.
|
| The current version can be found online at
|
|
|
| http://www.cryptsoft.com/ssleay/doc
|
| @@ -548,8 +548,8 @@
|
| can all be compiled independantly.
|
|
|
| ssleay has 3 modes of operation.
|
| -1) If the ssleay binaray has the name of one of its component programs, it
|
| -executes that program and then exits. This can be achieve by using hard or
|
| +1) If the ssleay binary has the name of one of its component programs, it
|
| +executes that program and then exits. This can be achieved by using hard or
|
| symbolic links, or failing that, just renaming the binary.
|
| 2) If the first argument to ssleay is the name of one of the component
|
| programs, that program runs that program and then exits.
|
| @@ -1185,7 +1185,7 @@
|
| example is for BIO_s_sock(). A socket needs to be
|
| assigned to the BIO before it can be used.
|
| - 'shutdown', this flag indicates if the underlying
|
| - comunication primative being used should be closed/freed
|
| + communication primitive being used should be closed/freed
|
| when the BIO is closed.
|
| - 'flags' is used to hold extra state. It is primarily used
|
| to hold information about why a non-blocking operation
|
| @@ -1799,7 +1799,7 @@
|
|
|
| unsigned long BN_get_word(BIGNUM *a);
|
| Returns 'a' in an unsigned long. Not remarkably, often 'a' will
|
| - be biger than a word, in which case 0xffffffffL is returned.
|
| + be bigger than a word, in which case 0xffffffffL is returned.
|
|
|
| Word Operations
|
| These functions are much more efficient that the normal bignum arithmetic
|
| @@ -2058,7 +2058,7 @@
|
| PEM_ASN1_write((int (*)())i2d_X509,PEM_STRING_X509,fp, \
|
| (char *)x, NULL,NULL,0,NULL)
|
| Don't do encryption normally. If you want to PEM encrypt your X509 structure,
|
| -either just call PEM_ASN1_write directly or just define you own
|
| +either just call PEM_ASN1_write directly or just define your own
|
| macro variant. As you can see, this macro just sets all encryption related
|
| parameters to NULL.
|
|
|
| @@ -5566,7 +5566,7 @@
|
|
|
| The SSL_CTX has a session_cache_mode which is by default,
|
| in SSL_SESS_CACHE_SERVER mode. What this means is that the library
|
| -will automatically add new session-id's to the cache apon sucsessful
|
| +will automatically add new session-id's to the cache upon successful
|
| SSL_accept() calls.
|
| If SSL_SESS_CACHE_CLIENT is set, then client certificates are also added
|
| to the cache.
|
| @@ -5580,12 +5580,12 @@
|
| If SSL_SESS_CACHE_NO_AUTO_CLEAR is set, old timed out sessions are
|
| not automatically removed each 255, SSL_connect()s or SSL_accept()s.
|
|
|
| -By default, apon every 255 successful SSL_connect() or SSL_accept()s,
|
| +By default, upon every 255 successful SSL_connect() or SSL_accept()s,
|
| the cache is flush. Please note that this could be expensive on
|
| a heavily loaded SSL server, in which case, turn this off and
|
| clear the cache of old entries 'manually' (with one of the functions
|
| listed below) every few hours. Perhaps I should up this number, it is hard
|
| -to say. Remember, the '255' new calls is just a mechanims to get called
|
| +to say. Remember, the '255' new calls is just a mechanism to get called
|
| every now and then, in theory at most 255 new session-id's will have been
|
| added but if 100 are added every minute, you would still have
|
| 500 in the cache before any would start being flushed (assuming a 3 minute
|
| @@ -5628,10 +5628,10 @@
|
| void SSL_CTX_sess_set_get_cb(ctx,cb) sets the callback and
|
| int (*cb)()SSL_CTX_sess_get_get_cb(ctx) returns the callback.
|
|
|
| -These callbacks are basically indended to be used by processes to
|
| +These callbacks are basically intended to be used by processes to
|
| send their session-id's to other processes. I currently have not implemented
|
| -non-blocking semantics for these callbacks, it is upto the appication
|
| -to make the callbacks effiecent if they require blocking (perhaps
|
| +non-blocking semantics for these callbacks, it is upto the application
|
| +to make the callbacks efficient if they require blocking (perhaps
|
| by 'saving' them and then 'posting them' when control returns from
|
| the SSL_accept().
|
|
|
| @@ -6589,7 +6589,7 @@
|
| condition has dissapeared.
|
|
|
| After the connection has been made, information can be retrived about the
|
| -SSL session and the session-id values that have been decided apon.
|
| +SSL session and the session-id values that have been decided upon.
|
| The 'peer' certificate can be retrieved.
|
|
|
| The session-id values include
|
|
|