[openssl-commits] [openssl] OpenSSL_1_1_1-stable update

nic.tuv at gmail.com nic.tuv at gmail.com
Sun Sep 16 23:01:20 UTC 2018


The branch OpenSSL_1_1_1-stable has been updated
       via  9b977afc0b25f57021f9e4721cb56bd63548c838 (commit)
      from  00f561ab9c70dec128467fb2b4f3eb952829c4c4 (commit)


- Log -----------------------------------------------------------------
commit 9b977afc0b25f57021f9e4721cb56bd63548c838
Author: Matt Eaton <agnosticdev at gmail.com>
Date:   Thu Sep 13 21:11:14 2018 -0500

    Update RAND_DRBG.pod
    
    Fixed a minor typo while reading the documentation.
    I agree that this contribution is trivial can be freely used.
    
    CLA: trivial
    
    Reviewed-by: Nicola Tuveri <nic.tuv at gmail.com>
    Reviewed-by: Kurt Roeckx <kurt at roeckx.be>
    (Merged from https://github.com/openssl/openssl/pull/7221)

-----------------------------------------------------------------------

Summary of changes:
 doc/man7/RAND_DRBG.pod | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/doc/man7/RAND_DRBG.pod b/doc/man7/RAND_DRBG.pod
index b89c30d..ba457f0 100644
--- a/doc/man7/RAND_DRBG.pod
+++ b/doc/man7/RAND_DRBG.pod
@@ -189,7 +189,7 @@ In addition to automatic reseeding, the caller can request an immediate
 reseeding of the DRBG with fresh entropy by setting the
 I<prediction resistance> parameter to 1 when calling L<RAND_DRBG_generate(3)>.
 
-The dcoument [NIST SP 800-90C] describes prediction resistance requests
+The document [NIST SP 800-90C] describes prediction resistance requests
 in detail and imposes strict conditions on the entropy sources that are
 approved for providing prediction resistance.
 Since the default DRBG implementation does not have access to such an approved


More information about the openssl-commits mailing list