summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorPauli <paul.dale@oracle.com>2019-09-25 20:30:09 +1000
committerPauli <paul.dale@oracle.com>2019-09-26 07:10:41 +1000
commit560ac83b0bfc6f871075c5891f96c5817b06f7b8 (patch)
tree4c4d2a61da8ace0198efd9a1246eca288dd94888
parentf49a65d09c09b3309b711518664b8ee973ec4b96 (diff)
KDF section 3 clean up
Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/10011)
-rw-r--r--doc/man3/EVP_KDF.pod2
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/man3/EVP_KDF.pod b/doc/man3/EVP_KDF.pod
index afd4b6cc6c..9fa9a17d48 100644
--- a/doc/man3/EVP_KDF.pod
+++ b/doc/man3/EVP_KDF.pod
@@ -198,7 +198,7 @@ The length must never exceed what can be given with a B<size_t>.
Memory-hard password-based KDF algorithms, such as scrypt, use an amount of
memory that depends on the load factors provided as input.
-For those KDF implementations that support it, this uint64_t parameter sets
+For those KDF implementations that support it, this B<uint64_t> parameter sets
an upper limit on the amount of memory that may be consumed while performing
a key derivation.
If this memory usage limit is exceeded because the load factors are chosen