diff options
author | Gustaf Neumann <neumann@wu-wien.ac.at> | 2020-07-04 21:58:30 +0200 |
---|---|---|
committer | Dr. Matthias St. Pierre <matthias.st.pierre@ncp-e.com> | 2020-07-24 21:06:32 +0200 |
commit | 6328d3673fabc336e3064368d855c2d1153ef54c (patch) | |
tree | 1af1ce13e4be6582ac1a9039881953c378058b61 /doc/man1/pkcs8.pod | |
parent | 7a989af7386e97add7c759fda688c5d2e79e812e (diff) |
Fix typos and repeated words
Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Matthias St. Pierre <Matthias.St.Pierre@ncp-e.com>
(Merged from https://github.com/openssl/openssl/pull/12370)
Diffstat (limited to 'doc/man1/pkcs8.pod')
-rw-r--r-- | doc/man1/pkcs8.pod | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/man1/pkcs8.pod b/doc/man1/pkcs8.pod index b079885d2f..53367dc650 100644 --- a/doc/man1/pkcs8.pod +++ b/doc/man1/pkcs8.pod @@ -285,7 +285,7 @@ one million iterations of the password: Test vectors from this PKCS#5 v2.0 implementation were posted to the pkcs-tng mailing list using triple DES, DES and RC2 with high iteration counts, several people confirmed that they could decrypt the private -keys produced and Therefore it can be assumed that the PKCS#5 v2.0 +keys produced and therefore, it can be assumed that the PKCS#5 v2.0 implementation is reasonably accurate at least as far as these algorithms are concerned. |