From 115e480924633e9d71d6847ed403cc54c7d71f8c Mon Sep 17 00:00:00 2001 From: Matt Caswell Date: Thu, 19 Jun 2014 23:45:21 +0100 Subject: [PATCH] Fix minor typos --- doc/apps/verify.pod | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/doc/apps/verify.pod b/doc/apps/verify.pod index bf640685a3..1e9680286b 100644 --- a/doc/apps/verify.pod +++ b/doc/apps/verify.pod @@ -179,7 +179,7 @@ Limit the maximum depth of the certificate chain to B certificates. =item B<-verify_email email> Verify if the B matches the email address in Subject Alternative Name or -the email the subject Distinguished Name. +the email in the subject Distinguished Name. =item B<-verify_hostname hostname> @@ -450,7 +450,7 @@ an application specific error. Unused. Although the issuer checks are a considerable improvement over the old technique they still suffer from limitations in the underlying X509_LOOKUP API. One consequence of this is that trusted certificates with matching subject name must either appear in a file (as specified by the -B<-CAfile> option) or a directory (as specified by B<-CApath>. If they occur in both then only +B<-CAfile> option) or a directory (as specified by B<-CApath>). If they occur in both then only the certificates in the file will be recognised. Previous versions of OpenSSL assume certificates with matching subject name are identical and -- 2.25.1