diff options
author | Beat Bolli <dev@drbeat.li> | 2021-07-30 18:40:27 +0200 |
---|---|---|
committer | Pauli <pauli@openssl.org> | 2021-08-04 15:02:27 +1000 |
commit | da496bc159361b0bc22df2432fb07b1cd7491ac2 (patch) | |
tree | c9f99db219f868f32c50ab7b71c87907eb7752e5 /doc/man7/migration_guide.pod | |
parent | 2fc02378ffcd9a266077eeea224890c534b7aaef (diff) | |
download | openssl-new-da496bc159361b0bc22df2432fb07b1cd7491ac2.tar.gz |
doc: replace markdown backticks with perlpod syntax
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Paul Dale <pauli@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/16190)
Diffstat (limited to 'doc/man7/migration_guide.pod')
-rw-r--r-- | doc/man7/migration_guide.pod | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/doc/man7/migration_guide.pod b/doc/man7/migration_guide.pod index 8f1fd1b1ad..462ef9f122 100644 --- a/doc/man7/migration_guide.pod +++ b/doc/man7/migration_guide.pod @@ -369,8 +369,8 @@ curve ones. Validation of SM2 keys has been separated from the validation of regular EC keys, allowing to improve the SM2 validation process to reject loaded private keys that are not conforming to the SM2 ISO standard. -In particular, a private scalar `k` outside the range `1 <= k < n-1` is now -correctly rejected. +In particular, a private scalar I<k> outside the range I<< 1 <= k < n-1 >> is +now correctly rejected. =head4 EVP_PKEY_set_alias_type() method has been removed @@ -2324,7 +2324,7 @@ The security strength of SHA1 and MD5 based signatures in TLS has been reduced. This results in SSL 3, TLS 1.0, TLS 1.1 and DTLS 1.0 no longer working at the default security level of 1 and instead requires security level 0. The security level can be changed either using the cipher string -with `C<@SECLEVEL>, or calling L<SSL_CTX_set_security_level(3)>. This also means +with C<@SECLEVEL>, or calling L<SSL_CTX_set_security_level(3)>. This also means that where the signature algorithms extension is missing from a ClientHello then the handshake will fail in TLS 1.2 at security level 1. This is because, although this extension is optional, failing to provide one means that |