diff options
author | Gustaf Neumann <neumann@wu-wien.ac.at> | 2020-06-29 21:13:07 +0200 |
---|---|---|
committer | Dr. Matthias St. Pierre <matthias.st.pierre@ncp-e.com> | 2020-07-05 01:49:20 +0200 |
commit | 8c1cbc72105ffd493b48e65f8f5fd3657dedb28c (patch) | |
tree | b1437e0210f80d7de45d8d33903a2f28fe1b82da /doc/man1/openssl-pkcs8.pod.in | |
parent | 3a19f1a9dd16f5855a7e2a42cd3e7f136f849bd3 (diff) |
Fix typos and repeated words
CLA: trivial
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matthias St. Pierre <Matthias.St.Pierre@ncp-e.com>
(Merged from https://github.com/openssl/openssl/pull/12320)
Diffstat (limited to 'doc/man1/openssl-pkcs8.pod.in')
-rw-r--r-- | doc/man1/openssl-pkcs8.pod.in | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/man1/openssl-pkcs8.pod.in b/doc/man1/openssl-pkcs8.pod.in index 0729302053..719e3d9168 100644 --- a/doc/man1/openssl-pkcs8.pod.in +++ b/doc/man1/openssl-pkcs8.pod.in @@ -248,7 +248,7 @@ one million iterations of the password: Test vectors from this PKCS#5 v2.0 implementation were posted to the pkcs-tng mailing list using triple DES, DES and RC2 with high iteration counts, several people confirmed that they could decrypt the private -keys produced and Therefore it can be assumed that the PKCS#5 v2.0 +keys produced and therefore, it can be assumed that the PKCS#5 v2.0 implementation is reasonably accurate at least as far as these algorithms are concerned. |