summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@gnutls.org>2017-03-30 19:58:22 +0200
committerNikos Mavrogiannopoulos <nmav@gnutls.org>2017-03-30 19:59:00 +0200
commitcb97d214c877830f2928410252dd2bb5074923df (patch)
treec356d126b27f0b97106c0b6ac882c1857aeefc5b
parent74772e191768765fef12d2ef6ae46915af440ac1 (diff)
downloadgnutls-cb97d214c877830f2928410252dd2bb5074923df.tar.gz
doc update [ci skip]
Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
-rw-r--r--doc/cha-tokens.texi2
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/cha-tokens.texi b/doc/cha-tokens.texi
index a5c647d0d3..78d0bc8734 100644
--- a/doc/cha-tokens.texi
+++ b/doc/cha-tokens.texi
@@ -1,5 +1,5 @@
@node Hardware security modules and abstract key types
-@chapter Abstract keys types and Hardware security modules
+@chapter Abstract key types and Hardware security modules
In several cases storing the long term cryptographic keys in a hard disk or
even in memory poses a significant risk. Once the system they are stored