Hi Theo,

Theo Buehler wrote on Wed, Jul 08, 2015 at 10:28:56AM +0200:

> While dabbling with J. Friedl's script for detecting doubled words in his
> "Mastering Regular Expressions" book, I found these four instances of
> doubled words.
> 
> Three of these are completely straightforward:
> 
> EC_GROUP_copy.pod: the the
> EC_KEY_new.pod: have have
> d2i_X509_NAME.pod: the the
> 
> However, the doubled 'not' in EVP_DigestVerifyInit.pod reverses the
> meaning of the sentence.  The context indicates that the word
> doubling is unintended.

Committed, thanks.
  Ingo


> Index: lib/libssl/src/doc/crypto/EC_GROUP_copy.pod
> ===================================================================
> RCS file: /cvs/src/lib/libssl/src/doc/crypto/EC_GROUP_copy.pod,v
> retrieving revision 1.1
> diff -u -p -r1.1 EC_GROUP_copy.pod
> --- lib/libssl/src/doc/crypto/EC_GROUP_copy.pod       11 Jul 2014 16:18:14 
> -0000      1.1
> +++ lib/libssl/src/doc/crypto/EC_GROUP_copy.pod       8 Jul 2015 08:21:24 
> -0000
> @@ -158,7 +158,7 @@ EC_GROUP_get0_seed returns a pointer to 
>  specified. EC_GROUP_get_seed_len returns the length of the seed or 0 if the 
> seed is not specified.
>  
>  EC_GROUP_set_seed returns the length of the seed that has been set. If the 
> supplied seed is NULL, or the supplied seed length is
> -0, the the return value will be 1. On error 0 is returned.
> +0, the return value will be 1. On error 0 is returned.
>  
>  EC_GROUP_cmp returns 0 if the curves are equal, 1 if they are not equal, or 
> -1 on error.
>  
> Index: lib/libssl/src/doc/crypto/EC_KEY_new.pod
> ===================================================================
> RCS file: /cvs/src/lib/libssl/src/doc/crypto/EC_KEY_new.pod,v
> retrieving revision 1.1
> diff -u -p -r1.1 EC_KEY_new.pod
> --- lib/libssl/src/doc/crypto/EC_KEY_new.pod  11 Jul 2014 16:18:14 -0000      
> 1.1
> +++ lib/libssl/src/doc/crypto/EC_KEY_new.pod  8 Jul 2015 08:21:24 -0000
> @@ -78,7 +78,7 @@ The functions EC_KEY_get_conv_form and E
>  of point_conversion_forms please refer to L<EC_POINT_new(3)|EC_POINT_new(3)>.
>  
>  EC_KEY_insert_key_method_data and EC_KEY_get_key_method_data enable the 
> caller to associate arbitary additional data specific to the
> -elliptic curve scheme being used with the EC_KEY object. This data is 
> treated as a "black box" by the ec library. The data to be stored by 
> EC_KEY_insert_key_method_data is provided in the B<data> parameter, which 
> must have have associated functions for duplicating, freeing and 
> "clear_freeing" the data item. If a subsequent EC_KEY_get_key_method_data 
> call is issued, the functions for duplicating, freeing and "clear_freeing" 
> the data item must be provided again, and they must be the same as they were 
> when the data item was inserted.
> +elliptic curve scheme being used with the EC_KEY object. This data is 
> treated as a "black box" by the ec library. The data to be stored by 
> EC_KEY_insert_key_method_data is provided in the B<data> parameter, which 
> must have associated functions for duplicating, freeing and "clear_freeing" 
> the data item. If a subsequent EC_KEY_get_key_method_data call is issued, the 
> functions for duplicating, freeing and "clear_freeing" the data item must be 
> provided again, and they must be the same as they were when the data item was 
> inserted.
>  
>  EC_KEY_set_flags sets the flags in the B<flags> parameter on the EC_KEY 
> object. Any flags that are already set are left set. The currently defined 
> standard flags are EC_FLAG_NON_FIPS_ALLOW and EC_FLAG_FIPS_CHECKED. In 
> addition there is the flag EC_FLAG_COFACTOR_ECDH which is specific to ECDH 
> and is defined in ecdh.h. EC_KEY_get_flags returns the current flags that are 
> set for this EC_KEY. EC_KEY_clear_flags clears the flags indicated by the 
> B<flags> parameter. All other flags are left in their existing state.
>  
> Index: lib/libssl/src/doc/crypto/EVP_DigestVerifyInit.pod
> ===================================================================
> RCS file: /cvs/src/lib/libssl/src/doc/crypto/EVP_DigestVerifyInit.pod,v
> retrieving revision 1.5
> diff -u -p -r1.5 EVP_DigestVerifyInit.pod
> --- lib/libssl/src/doc/crypto/EVP_DigestVerifyInit.pod        20 Jun 2015 
> 01:07:25 -0000      1.5
> +++ lib/libssl/src/doc/crypto/EVP_DigestVerifyInit.pod        8 Jul 2015 
> 08:21:24 -0000
> @@ -39,7 +39,7 @@ or a negative value for failure. In part
>  the operation is not supported by the public key algorithm.
>  
>  Unlike other functions the return value 0 from EVP_DigestVerifyFinal() only
> -indicates that the signature did not not verify successfully (that is tbs did
> +indicates that the signature did not verify successfully (that is tbs did
>  not match the original data or the signature was of invalid form) it is not 
> an
>  indication of a more serious error.
>  
> Index: lib/libssl/src/doc/crypto/d2i_X509_NAME.pod
> ===================================================================
> RCS file: /cvs/src/lib/libssl/src/doc/crypto/d2i_X509_NAME.pod,v
> retrieving revision 1.2
> diff -u -p -r1.2 d2i_X509_NAME.pod
> --- lib/libssl/src/doc/crypto/d2i_X509_NAME.pod       10 Jul 2014 13:53:11 
> -0000      1.2
> +++ lib/libssl/src/doc/crypto/d2i_X509_NAME.pod       8 Jul 2015 08:21:24 
> -0000
> @@ -14,7 +14,7 @@ d2i_X509_NAME, i2d_X509_NAME - X509_NAME
>  =head1 DESCRIPTION
>  
>  These functions decode and encode an B<X509_NAME> structure which is the
> -the same as the B<Name> type defined in RFC2459 (and elsewhere) and used
> +same as the B<Name> type defined in RFC2459 (and elsewhere) and used
>  for example in certificate subject and issuer names.
>  
>  Othewise the functions behave in a similar way to d2i_X509() and i2d_X509()
> 

Reply via email to