[openssl-commits] [openssl] master update
nic.tuv at gmail.com
nic.tuv at gmail.com
Sun Sep 16 22:58:29 UTC 2018
The branch master has been updated
via 01e04f444dfa9c431976761e3c62d2db7c16ffa3 (commit)
from 8e593f0a0dbcb3193548ced3c2e78fbbd201b2db (commit)
- Log -----------------------------------------------------------------
commit 01e04f444dfa9c431976761e3c62d2db7c16ffa3
Author: Matt Eaton <agnosticdev at gmail.com>
Date: Thu Sep 13 21:11:14 2018 -0500
Update RAND_DRBG.pod
Fixed a minor typo while reading the documentation.
I agree that this contribution is trivial can be freely used.
CLA: trivial
Reviewed-by: Nicola Tuveri <nic.tuv at gmail.com>
Reviewed-by: Kurt Roeckx <kurt at roeckx.be>
(Merged from https://github.com/openssl/openssl/pull/7221)
-----------------------------------------------------------------------
Summary of changes:
doc/man7/RAND_DRBG.pod | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/doc/man7/RAND_DRBG.pod b/doc/man7/RAND_DRBG.pod
index b89c30d..ba457f0 100644
--- a/doc/man7/RAND_DRBG.pod
+++ b/doc/man7/RAND_DRBG.pod
@@ -189,7 +189,7 @@ In addition to automatic reseeding, the caller can request an immediate
reseeding of the DRBG with fresh entropy by setting the
I<prediction resistance> parameter to 1 when calling L<RAND_DRBG_generate(3)>.
-The dcoument [NIST SP 800-90C] describes prediction resistance requests
+The document [NIST SP 800-90C] describes prediction resistance requests
in detail and imposes strict conditions on the entropy sources that are
approved for providing prediction resistance.
Since the default DRBG implementation does not have access to such an approved
More information about the openssl-commits
mailing list