diff options
Diffstat (limited to 'src/lib/libssl/src/doc/crypto/des.pod')
-rw-r--r-- | src/lib/libssl/src/doc/crypto/des.pod | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/src/lib/libssl/src/doc/crypto/des.pod b/src/lib/libssl/src/doc/crypto/des.pod index 1ca6bfb78f..99080391b1 100644 --- a/src/lib/libssl/src/doc/crypto/des.pod +++ b/src/lib/libssl/src/doc/crypto/des.pod | |||
@@ -130,7 +130,7 @@ earlier versions of the library, des_random_key() did not generate | |||
130 | secure keys. | 130 | secure keys. |
131 | 131 | ||
132 | Before a DES key can be used, it must be converted into the | 132 | Before a DES key can be used, it must be converted into the |
133 | architecture dependant I<des_key_schedule> via the | 133 | architecture dependent I<des_key_schedule> via the |
134 | des_set_key_checked() or des_set_key_unchecked() function. | 134 | des_set_key_checked() or des_set_key_unchecked() function. |
135 | 135 | ||
136 | des_set_key_checked() will check that the key passed is of odd parity | 136 | des_set_key_checked() will check that the key passed is of odd parity |
@@ -200,7 +200,7 @@ reusing I<ks1> for the final encryption. C<C=E(ks1,D(ks2,E(ks1,M)))>. | |||
200 | This form of Triple-DES is used by the RSAREF library. | 200 | This form of Triple-DES is used by the RSAREF library. |
201 | 201 | ||
202 | des_pcbc_encrypt() encrypt/decrypts using the propagating cipher block | 202 | des_pcbc_encrypt() encrypt/decrypts using the propagating cipher block |
203 | chaing mode used by Kerberos v4. Its parameters are the same as | 203 | chaining mode used by Kerberos v4. Its parameters are the same as |
204 | des_ncbc_encrypt(). | 204 | des_ncbc_encrypt(). |
205 | 205 | ||
206 | des_cfb_encrypt() encrypt/decrypts using cipher feedback mode. This | 206 | des_cfb_encrypt() encrypt/decrypts using cipher feedback mode. This |
@@ -241,7 +241,7 @@ compatibility with the MIT Kerberos library. des_read_pw_string() | |||
241 | is also available under the name EVP_read_pw_string(). | 241 | is also available under the name EVP_read_pw_string(). |
242 | 242 | ||
243 | des_read_pw_string() writes the string specified by I<prompt> to | 243 | des_read_pw_string() writes the string specified by I<prompt> to |
244 | standarf output, turns echo off and reads in input string from the | 244 | standard output, turns echo off and reads in input string from the |
245 | terminal. The string is returned in I<buf>, which must have space for | 245 | terminal. The string is returned in I<buf>, which must have space for |
246 | at least I<length> bytes. If I<verify> is set, the user is asked for | 246 | at least I<length> bytes. If I<verify> is set, the user is asked for |
247 | the password twice and unless the two copies match, an error is | 247 | the password twice and unless the two copies match, an error is |
@@ -268,9 +268,9 @@ input, depending on I<out_count>, 1, 2, 3 or 4 times. If I<output> is | |||
268 | non-NULL, the 8 bytes generated by each pass are written into | 268 | non-NULL, the 8 bytes generated by each pass are written into |
269 | I<output>. | 269 | I<output>. |
270 | 270 | ||
271 | The following are DES-based tranformations: | 271 | The following are DES-based transformations: |
272 | 272 | ||
273 | des_fcrypt() is a fast version of the unix crypt(3) function. This | 273 | des_fcrypt() is a fast version of the Unix crypt(3) function. This |
274 | version takes only a small amount of space relative to other fast | 274 | version takes only a small amount of space relative to other fast |
275 | crypt() implementations. This is different to the normal crypt in | 275 | crypt() implementations. This is different to the normal crypt in |
276 | that the third parameter is the buffer that the return value is | 276 | that the third parameter is the buffer that the return value is |