diff options
-rw-r--r-- | lib/ssl/doc/src/using_ssl.xml | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/lib/ssl/doc/src/using_ssl.xml b/lib/ssl/doc/src/using_ssl.xml index fae2ca80e7..257f260d31 100644 --- a/lib/ssl/doc/src/using_ssl.xml +++ b/lib/ssl/doc/src/using_ssl.xml @@ -169,7 +169,7 @@ ok</code> </code> <p>In OTP 20 it is desirable to remove all cipher suites - that uses rsa kexchange (removed from default in 21) </p> + that uses rsa key exchange (removed from default in 21) </p> <code type="erl">2> NoRSA = ssl:filter_cipher_suites(Default, [{key_exchange, fun(rsa) -> false; @@ -354,7 +354,7 @@ ok <p>Step 3 - Explicit Session Reuse </p> <code type="erl"> -%% Preform a full handshake and the session will not be saved for reuse +%% Perform a full handshake and the session will not be saved for reuse 12> {ok, C9} = ssl:connect("localhost", 9999, [{verify, verify_peer}, {versions, ['tlsv1.2']}, {cacertfile, "cacerts.pem"}, @@ -433,7 +433,7 @@ ok <seeguide marker="ssl:using_ssl#anti-replay-protection-in-tls-1.3"> Anti-Replay Protection in TLS 1.3</seeguide> </p> - <p>Session tickets are sent by servers on newly estalished TLS connections. + <p>Session tickets are sent by servers on newly established TLS connections. The number of tickets sent and their lifetime are configurable by application variables. See also <seeapp marker="ssl:ssl_app#configuration"> SSL's configuration</seeapp>.</p> <p>Session tickets are protected by application traffic keys, and in stateless |