diff options
author | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2017-03-30 19:58:22 +0200 |
---|---|---|
committer | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2017-03-30 19:59:00 +0200 |
commit | cb97d214c877830f2928410252dd2bb5074923df (patch) | |
tree | c356d126b27f0b97106c0b6ac882c1857aeefc5b | |
parent | 74772e191768765fef12d2ef6ae46915af440ac1 (diff) | |
download | gnutls-cb97d214c877830f2928410252dd2bb5074923df.tar.gz |
doc update [ci skip]
Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
-rw-r--r-- | doc/cha-tokens.texi | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/cha-tokens.texi b/doc/cha-tokens.texi index a5c647d0d3..78d0bc8734 100644 --- a/doc/cha-tokens.texi +++ b/doc/cha-tokens.texi @@ -1,5 +1,5 @@ @node Hardware security modules and abstract key types -@chapter Abstract keys types and Hardware security modules +@chapter Abstract key types and Hardware security modules In several cases storing the long term cryptographic keys in a hard disk or even in memory poses a significant risk. Once the system they are stored |