summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/doc/EVP_BytesToKey.pod
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libcrypto/doc/EVP_BytesToKey.pod')
-rw-r--r--src/lib/libcrypto/doc/EVP_BytesToKey.pod2
1 files changed, 1 insertions, 1 deletions
diff --git a/src/lib/libcrypto/doc/EVP_BytesToKey.pod b/src/lib/libcrypto/doc/EVP_BytesToKey.pod
index fe4c0a9194..a27146f5c9 100644
--- a/src/lib/libcrypto/doc/EVP_BytesToKey.pod
+++ b/src/lib/libcrypto/doc/EVP_BytesToKey.pod
@@ -29,7 +29,7 @@ A typical application of this function is to derive keying material for an
29encryption algorithm from a password in the B<data> parameter. 29encryption algorithm from a password in the B<data> parameter.
30 30
31Increasing the B<count> parameter slows down the algorithm which makes it 31Increasing the B<count> parameter slows down the algorithm which makes it
32harder for an attacker to peform a brute force attack using a large number 32harder for an attacker to perform a brute force attack using a large number
33of candidate passwords. 33of candidate passwords.
34 34
35If the total key and IV length is less than the digest length and 35If the total key and IV length is less than the digest length and