diff options
author | Matt Eaton <agnosticdev@gmail.com> | 2018-09-13 21:11:14 -0500 |
---|---|---|
committer | Nicola Tuveri <nic.tuv@gmail.com> | 2018-09-17 01:56:47 +0300 |
commit | 01e04f444dfa9c431976761e3c62d2db7c16ffa3 (patch) | |
tree | 61c076d056857444c45c786f99ec597cf0e3c132 /doc | |
parent | 8e593f0a0dbcb3193548ced3c2e78fbbd201b2db (diff) | |
download | openssl-new-01e04f444dfa9c431976761e3c62d2db7c16ffa3.tar.gz |
Update RAND_DRBG.pod
Fixed a minor typo while reading the documentation.
I agree that this contribution is trivial can be freely used.
CLA: trivial
Reviewed-by: Nicola Tuveri <nic.tuv@gmail.com>
Reviewed-by: Kurt Roeckx <kurt@roeckx.be>
(Merged from https://github.com/openssl/openssl/pull/7221)
Diffstat (limited to 'doc')
-rw-r--r-- | doc/man7/RAND_DRBG.pod | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/man7/RAND_DRBG.pod b/doc/man7/RAND_DRBG.pod index b89c30d43e..ba457f0504 100644 --- a/doc/man7/RAND_DRBG.pod +++ b/doc/man7/RAND_DRBG.pod @@ -189,7 +189,7 @@ In addition to automatic reseeding, the caller can request an immediate reseeding of the DRBG with fresh entropy by setting the I<prediction resistance> parameter to 1 when calling L<RAND_DRBG_generate(3)>. -The dcoument [NIST SP 800-90C] describes prediction resistance requests +The document [NIST SP 800-90C] describes prediction resistance requests in detail and imposes strict conditions on the entropy sources that are approved for providing prediction resistance. Since the default DRBG implementation does not have access to such an approved |