summaryrefslogtreecommitdiff
path: root/doc/man7/migration_guide.pod
diff options
context:
space:
mode:
authorBeat Bolli <dev@drbeat.li>2021-07-30 18:40:27 +0200
committerPauli <pauli@openssl.org>2021-08-04 15:02:27 +1000
commitda496bc159361b0bc22df2432fb07b1cd7491ac2 (patch)
treec9f99db219f868f32c50ab7b71c87907eb7752e5 /doc/man7/migration_guide.pod
parent2fc02378ffcd9a266077eeea224890c534b7aaef (diff)
downloadopenssl-new-da496bc159361b0bc22df2432fb07b1cd7491ac2.tar.gz
doc: replace markdown backticks with perlpod syntax
Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16190)
Diffstat (limited to 'doc/man7/migration_guide.pod')
-rw-r--r--doc/man7/migration_guide.pod6
1 files changed, 3 insertions, 3 deletions
diff --git a/doc/man7/migration_guide.pod b/doc/man7/migration_guide.pod
index 8f1fd1b1ad..462ef9f122 100644
--- a/doc/man7/migration_guide.pod
+++ b/doc/man7/migration_guide.pod
@@ -369,8 +369,8 @@ curve ones.
Validation of SM2 keys has been separated from the validation of regular EC
keys, allowing to improve the SM2 validation process to reject loaded private
keys that are not conforming to the SM2 ISO standard.
-In particular, a private scalar `k` outside the range `1 <= k < n-1` is now
-correctly rejected.
+In particular, a private scalar I<k> outside the range I<< 1 <= k < n-1 >> is
+now correctly rejected.
=head4 EVP_PKEY_set_alias_type() method has been removed
@@ -2324,7 +2324,7 @@ The security strength of SHA1 and MD5 based signatures in TLS has been reduced.
This results in SSL 3, TLS 1.0, TLS 1.1 and DTLS 1.0 no longer
working at the default security level of 1 and instead requires security
level 0. The security level can be changed either using the cipher string
-with `C<@SECLEVEL>, or calling L<SSL_CTX_set_security_level(3)>. This also means
+with C<@SECLEVEL>, or calling L<SSL_CTX_set_security_level(3)>. This also means
that where the signature algorithms extension is missing from a ClientHello
then the handshake will fail in TLS 1.2 at security level 1. This is because,
although this extension is optional, failing to provide one means that