diff options
Diffstat (limited to 'doc/crypto/des.pod')
-rw-r--r-- | doc/crypto/des.pod | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/doc/crypto/des.pod b/doc/crypto/des.pod index ab3e26e9ec..c553210ef2 100644 --- a/doc/crypto/des.pod +++ b/doc/crypto/des.pod @@ -130,7 +130,7 @@ earlier versions of the library, des_random_key() did not generate secure keys. Before a DES key can be used, it must be converted into the -architecture dependent I<des_key_schedule> via the +architecture dependant I<des_key_schedule> via the des_set_key_checked() or des_set_key_unchecked() function. des_set_key_checked() will check that the key passed is of odd parity @@ -200,7 +200,7 @@ reusing I<ks1> for the final encryption. C<C=E(ks1,D(ks2,E(ks1,M)))>. This form of Triple-DES is used by the RSAREF library. des_pcbc_encrypt() encrypt/decrypts using the propagating cipher block -chaining mode used by Kerberos v4. Its parameters are the same as +chaing mode used by Kerberos v4. Its parameters are the same as des_ncbc_encrypt(). des_cfb_encrypt() encrypt/decrypts using cipher feedback mode. This @@ -241,7 +241,7 @@ compatibility with the MIT Kerberos library. des_read_pw_string() is also available under the name EVP_read_pw_string(). des_read_pw_string() writes the string specified by I<prompt> to -standard output, turns echo off and reads in input string from the +standarf output, turns echo off and reads in input string from the terminal. The string is returned in I<buf>, which must have space for at least I<length> bytes. If I<verify> is set, the user is asked for the password twice and unless the two copies match, an error is @@ -268,9 +268,9 @@ input, depending on I<out_count>, 1, 2, 3 or 4 times. If I<output> is non-NULL, the 8 bytes generated by each pass are written into I<output>. -The following are DES-based transformations: +The following are DES-based tranformations: -des_fcrypt() is a fast version of the Unix crypt(3) function. This +des_fcrypt() is a fast version of the unix crypt(3) function. This version takes only a small amount of space relative to other fast crypt() implementations. This is different to the normal crypt in that the third parameter is the buffer that the return value is |