summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/doc/EVP_BytesToKey.pod
diff options
context:
space:
mode:
authormiod <>2015-08-18 20:19:32 +0000
committermiod <>2015-08-18 20:19:32 +0000
commit13757ff35aab44e1c38d969b3e78d8029b01eb32 (patch)
treeb1b6a57041a5f2860e0b426b99e1fd63969817ec /src/lib/libcrypto/doc/EVP_BytesToKey.pod
parent2ea8009a06abaf0096774d1fa3d0d7f6d2f98cf5 (diff)
downloadopenbsd-13757ff35aab44e1c38d969b3e78d8029b01eb32.tar.gz
openbsd-13757ff35aab44e1c38d969b3e78d8029b01eb32.tar.bz2
openbsd-13757ff35aab44e1c38d969b3e78d8029b01eb32.zip
typos
Diffstat (limited to 'src/lib/libcrypto/doc/EVP_BytesToKey.pod')
-rw-r--r--src/lib/libcrypto/doc/EVP_BytesToKey.pod2
1 files changed, 1 insertions, 1 deletions
diff --git a/src/lib/libcrypto/doc/EVP_BytesToKey.pod b/src/lib/libcrypto/doc/EVP_BytesToKey.pod
index fe4c0a9194..a27146f5c9 100644
--- a/src/lib/libcrypto/doc/EVP_BytesToKey.pod
+++ b/src/lib/libcrypto/doc/EVP_BytesToKey.pod
@@ -29,7 +29,7 @@ A typical application of this function is to derive keying material for an
29encryption algorithm from a password in the B<data> parameter. 29encryption algorithm from a password in the B<data> parameter.
30 30
31Increasing the B<count> parameter slows down the algorithm which makes it 31Increasing the B<count> parameter slows down the algorithm which makes it
32harder for an attacker to peform a brute force attack using a large number 32harder for an attacker to perform a brute force attack using a large number
33of candidate passwords. 33of candidate passwords.
34 34
35If the total key and IV length is less than the digest length and 35If the total key and IV length is less than the digest length and