diff options
author | Lars Ingebrigtsen <larsi@gnus.org> | 2018-06-25 18:56:55 +0200 |
---|---|---|
committer | Lars Ingebrigtsen <larsi@gnus.org> | 2018-06-25 18:56:55 +0200 |
commit | 27a21970f6faa9baf42823f731b7842b075e86eb (patch) | |
tree | 6e646af3d631a79ba34105a409943a7ca534f76c /doc/emacs/misc.texi | |
parent | 71e4a4b7e5d55981f813929ba488a51238187a94 (diff) | |
download | emacs-27a21970f6faa9baf42823f731b7842b075e86eb.tar.gz |
Fix spelling of "intermediate" (it's not "intermediary")
* doc/emacs/misc.texi (Network Security): Ditto.
* lisp/net/nsm.el (network-security-protocol-checks): Fix spelling
on "intermediate".
(nsm-protocol-check--intermediate-sha1): Ditto.
Diffstat (limited to 'doc/emacs/misc.texi')
-rw-r--r-- | doc/emacs/misc.texi | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/doc/emacs/misc.texi b/doc/emacs/misc.texi index 0a15df41206..692f1fd6504 100644 --- a/doc/emacs/misc.texi +++ b/doc/emacs/misc.texi @@ -361,8 +361,8 @@ third parties. If this number is too low, you will be warned. The @acronym{RC4} stream cipher is believed to be of low quality and may allow eavesdropping by third parties. -@item @acronym{SHA1} in the host certificate or in intermediary certificates -It is believed that if an intermediary certificate uses +@item @acronym{SHA1} in the host certificate or in intermediate certificates +It is believed that if an intermediate certificate uses the @acronym{SHA1} hashing algorithm, then third parties can issue certificates pretending to be that issuing instance. These connections are therefore vulnerable to man-in-the-middle attacks. |