summaryrefslogtreecommitdiff
path: root/doc/emacs/misc.texi
diff options
context:
space:
mode:
authorLars Ingebrigtsen <larsi@gnus.org>2018-06-25 18:56:55 +0200
committerLars Ingebrigtsen <larsi@gnus.org>2018-06-25 18:56:55 +0200
commit27a21970f6faa9baf42823f731b7842b075e86eb (patch)
tree6e646af3d631a79ba34105a409943a7ca534f76c /doc/emacs/misc.texi
parent71e4a4b7e5d55981f813929ba488a51238187a94 (diff)
downloademacs-27a21970f6faa9baf42823f731b7842b075e86eb.tar.gz
Fix spelling of "intermediate" (it's not "intermediary")
* doc/emacs/misc.texi (Network Security): Ditto. * lisp/net/nsm.el (network-security-protocol-checks): Fix spelling on "intermediate". (nsm-protocol-check--intermediate-sha1): Ditto.
Diffstat (limited to 'doc/emacs/misc.texi')
-rw-r--r--doc/emacs/misc.texi4
1 files changed, 2 insertions, 2 deletions
diff --git a/doc/emacs/misc.texi b/doc/emacs/misc.texi
index 0a15df41206..692f1fd6504 100644
--- a/doc/emacs/misc.texi
+++ b/doc/emacs/misc.texi
@@ -361,8 +361,8 @@ third parties. If this number is too low, you will be warned.
The @acronym{RC4} stream cipher is believed to be of low quality and
may allow eavesdropping by third parties.
-@item @acronym{SHA1} in the host certificate or in intermediary certificates
-It is believed that if an intermediary certificate uses
+@item @acronym{SHA1} in the host certificate or in intermediate certificates
+It is believed that if an intermediate certificate uses
the @acronym{SHA1} hashing algorithm, then third parties can issue
certificates pretending to be that issuing instance. These
connections are therefore vulnerable to man-in-the-middle attacks.