[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[PATCH] doc: Fix a typo in curve25519-sha256@xxxxxxxxxxxxxx
[Thread Prev] | [Thread Next]
[Date Prev] | [Date Next]
- Subject: [PATCH] doc: Fix a typo in curve25519-sha256@xxxxxxxxxxxxxx
- From: Tobias Klauser <tklauser@xxxxxxxxxx>
- Reply-to: libssh@xxxxxxxxxx
- Date: Wed, 7 Jan 2015 09:39:54 +0100
- To: libssh@xxxxxxxxxx
Fix the typo 'stengths' -> 'strengths' and remove the trailing white space on the same line. Signed-off-by: Tobias Klauser <tklauser@xxxxxxxxxx> --- doc/curve25519-sha256@xxxxxxxxxxxxxx | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/doc/curve25519-sha256@xxxxxxxxxxxxxx b/doc/curve25519-sha256@xxxxxxxxxxxxxx index baa2ca4..0317fe4 100644 --- a/doc/curve25519-sha256@xxxxxxxxxxxxxx +++ b/doc/curve25519-sha256@xxxxxxxxxxxxxx @@ -22,7 +22,7 @@ claims to be able to eavesdrop. Having a secure replacement would make passive attacks much harder if such a backdoor exists. However an alternative exists in the form of Curve25519. This algorithm has been -proposed in 2006 by DJB [Curve25519]. Its main stengths are its speed, its +proposed in 2006 by DJB [Curve25519]. Its main strengths are its speed, its constant-time run time (and resistance against side-channel attacks), and its lack of nebulous hard-coded constants. -- 2.2.1
Archive administrator: postmaster@lists.cynapses.org