提交 8acdd759 编写于 作者: B Bodo Möller

Clarifications.

上级 46b3bd54
......@@ -25,9 +25,13 @@ the appropriate cipherlist.
=item B<-v>
verbose option. List ciphers with a complete description of the authentication,
key exchange, encryption and mac algorithms used along with any key size
verbose option. List ciphers with a complete description of
protocol version (SSLv2 or SSLv3; the latter includes TLS), key exchange,
authentication, encryption and mac algorithms used along with any key size
restrictions and whether the algorithm is classed as an "export" cipher.
Note that without the B<-v> option, ciphers may seem to appear twice
in a cipher list; this is when similar ciphers are available for
SSL v2 and for SSL v3/TLS v1.
=item B<-ssl3>
......
......@@ -49,7 +49,7 @@ the result in B<r>.
BN_from_montgomery() performs the Montgomery reduction B<r> = B<a>*R^-1.
BN_to_montgomery() computes Mont(B<a>,R^2).
BN_to_montgomery() computes Mont(B<a>,R^2), i.e. B<a>*R.
For all functions, B<ctx> is a previously allocated B<BN_CTX> used for
temporary variables.
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册