diff options
Diffstat (limited to 'src/lib/libcrypto/doc')
| -rw-r--r-- | src/lib/libcrypto/doc/EVP_BytesToKey.pod | 2 | ||||
| -rw-r--r-- | src/lib/libcrypto/doc/PKCS5_PBKDF2_HMAC.pod | 2 | ||||
| -rw-r--r-- | src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod | 2 |
3 files changed, 3 insertions, 3 deletions
diff --git a/src/lib/libcrypto/doc/EVP_BytesToKey.pod b/src/lib/libcrypto/doc/EVP_BytesToKey.pod index fe4c0a9194..a27146f5c9 100644 --- a/src/lib/libcrypto/doc/EVP_BytesToKey.pod +++ b/src/lib/libcrypto/doc/EVP_BytesToKey.pod | |||
| @@ -29,7 +29,7 @@ A typical application of this function is to derive keying material for an | |||
| 29 | encryption algorithm from a password in the B<data> parameter. | 29 | encryption algorithm from a password in the B<data> parameter. |
| 30 | 30 | ||
| 31 | Increasing the B<count> parameter slows down the algorithm which makes it | 31 | Increasing the B<count> parameter slows down the algorithm which makes it |
| 32 | harder for an attacker to peform a brute force attack using a large number | 32 | harder for an attacker to perform a brute force attack using a large number |
| 33 | of candidate passwords. | 33 | of candidate passwords. |
| 34 | 34 | ||
| 35 | If the total key and IV length is less than the digest length and | 35 | If the total key and IV length is less than the digest length and |
diff --git a/src/lib/libcrypto/doc/PKCS5_PBKDF2_HMAC.pod b/src/lib/libcrypto/doc/PKCS5_PBKDF2_HMAC.pod index 7a2b8e6187..0c164a0ed6 100644 --- a/src/lib/libcrypto/doc/PKCS5_PBKDF2_HMAC.pod +++ b/src/lib/libcrypto/doc/PKCS5_PBKDF2_HMAC.pod | |||
| @@ -49,7 +49,7 @@ encryption algorithm from a password in the B<pass>, a salt in B<salt>, | |||
| 49 | and an iteration count. | 49 | and an iteration count. |
| 50 | 50 | ||
| 51 | Increasing the B<iter> parameter slows down the algorithm which makes it | 51 | Increasing the B<iter> parameter slows down the algorithm which makes it |
| 52 | harder for an attacker to peform a brute force attack using a large number | 52 | harder for an attacker to perform a brute force attack using a large number |
| 53 | of candidate passwords. | 53 | of candidate passwords. |
| 54 | 54 | ||
| 55 | =head1 RETURN VALUES | 55 | =head1 RETURN VALUES |
diff --git a/src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod b/src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod index 27af442b69..6acdd71e72 100644 --- a/src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod +++ b/src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod | |||
| @@ -104,7 +104,7 @@ certificates and makes the verification strictly apply B<X509> rules. | |||
| 104 | B<X509_V_FLAG_ALLOW_PROXY_CERTS> enables proxy certificate verification. | 104 | B<X509_V_FLAG_ALLOW_PROXY_CERTS> enables proxy certificate verification. |
| 105 | 105 | ||
| 106 | B<X509_V_FLAG_POLICY_CHECK> enables certificate policy checking, by default | 106 | B<X509_V_FLAG_POLICY_CHECK> enables certificate policy checking, by default |
| 107 | no policy checking is peformed. Additional information is sent to the | 107 | no policy checking is performed. Additional information is sent to the |
| 108 | verification callback relating to policy checking. | 108 | verification callback relating to policy checking. |
| 109 | 109 | ||
| 110 | B<X509_V_FLAG_EXPLICIT_POLICY>, B<X509_V_FLAG_INHIBIT_ANY> and | 110 | B<X509_V_FLAG_EXPLICIT_POLICY>, B<X509_V_FLAG_INHIBIT_ANY> and |
