[openssl-commits] [openssl] master update

nic.tuv at gmail.com nic.tuv at gmail.com
Sun Sep 16 22:58:29 UTC 2018


The branch master has been updated
       via  01e04f444dfa9c431976761e3c62d2db7c16ffa3 (commit)
      from  8e593f0a0dbcb3193548ced3c2e78fbbd201b2db (commit)


- Log -----------------------------------------------------------------
commit 01e04f444dfa9c431976761e3c62d2db7c16ffa3
Author: Matt Eaton <agnosticdev at gmail.com>
Date:   Thu Sep 13 21:11:14 2018 -0500

    Update RAND_DRBG.pod
    
    Fixed a minor typo while reading the documentation.
    I agree that this contribution is trivial can be freely used.
    
    CLA: trivial
    
    Reviewed-by: Nicola Tuveri <nic.tuv at gmail.com>
    Reviewed-by: Kurt Roeckx <kurt at roeckx.be>
    (Merged from https://github.com/openssl/openssl/pull/7221)

-----------------------------------------------------------------------

Summary of changes:
 doc/man7/RAND_DRBG.pod | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/doc/man7/RAND_DRBG.pod b/doc/man7/RAND_DRBG.pod
index b89c30d..ba457f0 100644
--- a/doc/man7/RAND_DRBG.pod
+++ b/doc/man7/RAND_DRBG.pod
@@ -189,7 +189,7 @@ In addition to automatic reseeding, the caller can request an immediate
 reseeding of the DRBG with fresh entropy by setting the
 I<prediction resistance> parameter to 1 when calling L<RAND_DRBG_generate(3)>.
 
-The dcoument [NIST SP 800-90C] describes prediction resistance requests
+The document [NIST SP 800-90C] describes prediction resistance requests
 in detail and imposes strict conditions on the entropy sources that are
 approved for providing prediction resistance.
 Since the default DRBG implementation does not have access to such an approved


More information about the openssl-commits mailing list