diff --git a/doc/crypto/EVP_EncryptInit.pod b/doc/crypto/EVP_EncryptInit.pod
index 1b39e8396..b42b64c17 100644
--- a/doc/crypto/EVP_EncryptInit.pod
+++ b/doc/crypto/EVP_EncryptInit.pod
@@ -384,13 +384,13 @@ bits and 12 rounds.
AES Galois Counter Mode (GCM) for 128, 192 and 256 bit keys respectively.
These ciphers require additional control operations to function correctly: see
-the L section below for details.
+the L section below for details.
=item EVP_aes_128_ocb(void), EVP_aes_192_ocb(void), EVP_aes_256_ocb(void)
Offest Codebook Mode (OCB) for 128, 192 and 256 bit keys respectively.
These ciphers require additional control operations to function correctly: see
-the L section below for details.
+the L section below for details.
=item EVP_aes_128_ccm(), EVP_aes_192_ccm(), EVP_aes_256_ccm()
@@ -441,7 +441,7 @@ length can only be set before specifying an IV. If not called a default tag
length is used. For OCB AES the default is 16 (i.e. 128 bits). This is also the
maximum tag length for OCB.
-See L below for an example of the use of GCM mode.
+See L below for an example of the use of GCM mode.
=head1 CCM Mode
diff --git a/doc/crypto/X509_LOOKUP_hash_dir.pod b/doc/crypto/X509_LOOKUP_hash_dir.pod
index e863ab5a8..dfb9e214e 100644
--- a/doc/crypto/X509_LOOKUP_hash_dir.pod
+++ b/doc/crypto/X509_LOOKUP_hash_dir.pod
@@ -47,7 +47,7 @@ B.
Constant B with NULL filename causes these functions
to load default certificate store file (see
-L.
+L.
Functions return number of objects loaded from file or 0 in case of
diff --git a/doc/ssl/SSL_CTX_set_read_ahead.pod b/doc/ssl/SSL_CTX_set_read_ahead.pod
index f7d8c4335..771d59d60 100644
--- a/doc/ssl/SSL_CTX_set_read_ahead.pod
+++ b/doc/ssl/SSL_CTX_set_read_ahead.pod
@@ -39,7 +39,7 @@ ahead has been set or not.
These functions have no impact when used with DTLS. The return values for
SSL_CTX_get_read_head() and SSL_get_read_ahead() are undefined for DTLS. Setting
B can impact the behaviour of the SSL_pending() function
-(see L).
+(see L).
=head1 RETURN VALUES
diff --git a/doc/ssl/SSL_CTX_set_tlsext_ticket_key_cb.pod b/doc/ssl/SSL_CTX_set_tlsext_ticket_key_cb.pod
index e8b973f23..b660b21a9 100644
--- a/doc/ssl/SSL_CTX_set_tlsext_ticket_key_cb.pod
+++ b/doc/ssl/SSL_CTX_set_tlsext_ticket_key_cb.pod
@@ -49,11 +49,12 @@ I, and set the cipher context I and the hash context I.
The I is 16 characters long and is used as a key identifier.
The I length is the length of the IV of the corresponding cipher. The
-maximum IV length is L bytes defined in B.
+maximum IV length is B bytes defined in B.
The initialization vector I should be a random value. The cipher context
I should use the initialisation vector I. The cipher context can be
-set using L. The hmac context can be set using L.
+set using L. The hmac context can be set using
+L.
When the client presents a session ticket, the callback function with be called
with I set to 0 indicating that the I function should retrieve a set
@@ -61,8 +62,8 @@ of parameters. In this case I and I have already been parsed out of
the session ticket. The OpenSSL library expects that the I will be used
to retrieve a cryptographic parameters and that the cryptographic context
I will be set with the retrieved parameters and the initialization vector
-I. using a function like L. The I needs to be set
-using L.
+I. using a function like L. The I needs to be
+set using L.
If the I is still valid but a renewal of the ticket is required the
callback function should return 2. The library will call the callback again