summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/doc/EVP_BytesToKey.pod
diff options
context:
space:
mode:
authormiod <>2015-08-18 20:19:32 +0000
committermiod <>2015-08-18 20:19:32 +0000
commit2d67b447a2fe41a8268632aadfe110ab61201211 (patch)
treeb1b6a57041a5f2860e0b426b99e1fd63969817ec /src/lib/libcrypto/doc/EVP_BytesToKey.pod
parent7a749bef0fb3bbe4be7688ac4a1b106a77880445 (diff)
downloadopenbsd-2d67b447a2fe41a8268632aadfe110ab61201211.tar.gz
openbsd-2d67b447a2fe41a8268632aadfe110ab61201211.tar.bz2
openbsd-2d67b447a2fe41a8268632aadfe110ab61201211.zip
typos
Diffstat (limited to 'src/lib/libcrypto/doc/EVP_BytesToKey.pod')
-rw-r--r--src/lib/libcrypto/doc/EVP_BytesToKey.pod2
1 files changed, 1 insertions, 1 deletions
diff --git a/src/lib/libcrypto/doc/EVP_BytesToKey.pod b/src/lib/libcrypto/doc/EVP_BytesToKey.pod
index fe4c0a9194..a27146f5c9 100644
--- a/src/lib/libcrypto/doc/EVP_BytesToKey.pod
+++ b/src/lib/libcrypto/doc/EVP_BytesToKey.pod
@@ -29,7 +29,7 @@ A typical application of this function is to derive keying material for an
29encryption algorithm from a password in the B<data> parameter. 29encryption algorithm from a password in the B<data> parameter.
30 30
31Increasing the B<count> parameter slows down the algorithm which makes it 31Increasing the B<count> parameter slows down the algorithm which makes it
32harder for an attacker to peform a brute force attack using a large number 32harder for an attacker to perform a brute force attack using a large number
33of candidate passwords. 33of candidate passwords.
34 34
35If the total key and IV length is less than the digest length and 35If the total key and IV length is less than the digest length and