diff options
author | Ingela Anderton Andin <[email protected]> | 2015-04-01 09:39:38 +0200 |
---|---|---|
committer | Ingela Anderton Andin <[email protected]> | 2015-04-09 09:08:38 +0200 |
commit | 3c49c9949feb45341f2cf85321d67b45c45abda9 (patch) | |
tree | 2a730155dc61d598efb898115e7e85b834763772 /lib | |
parent | 1776467988178ff24376499747fed836b1765e1d (diff) | |
download | otp-3c49c9949feb45341f2cf85321d67b45c45abda9.tar.gz otp-3c49c9949feb45341f2cf85321d67b45c45abda9.tar.bz2 otp-3c49c9949feb45341f2cf85321d67b45c45abda9.zip |
ssl: Technically clarify description
Change description proposed by technical writer to make better use
of technical terms. Also add some new language improvments discussed
with the technical writer.
Diffstat (limited to 'lib')
-rw-r--r-- | lib/ssl/doc/src/ssl_introduction.xml | 17 |
1 files changed, 8 insertions, 9 deletions
diff --git a/lib/ssl/doc/src/ssl_introduction.xml b/lib/ssl/doc/src/ssl_introduction.xml index 6138749b79..64607a393a 100644 --- a/lib/ssl/doc/src/ssl_introduction.xml +++ b/lib/ssl/doc/src/ssl_introduction.xml @@ -34,21 +34,20 @@ <section> <title>Purpose</title> <p>Transport Layer Security (TLS) and its predecessor, the Secure - Sockets Layer (SSL) are cryptographic protocols designed to - provide communications security over a computer network. They - use x.509 certificates and hence asymmetric cryptography to - authenticate the counterparty with whom they are communicating, - and to exchange a symmetric key. This session key is then used - to encrypt data flowing between the parties. This allows for - data/message confidentiality, and message authentication codes - for message integrity.</p> + Sockets Layer (SSL), are cryptographic protocols designed to + provide communications security over a computer network. The protocols use + use X.509 certificates and hence public key (asymmetric) cryptography to + authenticate the counterpart with whom they communicate, + and to exchange a symmetric key for payload encryption. The protocol provides + data/message confidentiality (encryption), integrity (through message authentication code checks) + and host verification (through certificate path validation).</p> </section> <section> <title>Prerequisites</title> <p>It is assumed that the reader is familiar with the Erlang programming language, the concepts of OTP, and has a basic - understanding of SSL/TSP.</p> + understanding of SSL/TLS.</p> </section> </chapter> |