diff options
author | Patrick Pelletier <code@funwithsoftware.org> | 2012-04-21 15:32:32 -0700 |
---|---|---|
committer | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2012-04-22 17:25:30 +0200 |
commit | bb9d96bae90cde2a5e5e18f52e1d7a7e419d2d76 (patch) | |
tree | 17126b046ffbb00c3e61984c8f53de8730d990fe /doc/cha-intro-tls.texi | |
parent | d6d572b972e51d21f6ad9780a5be5a68c8c9a196 (diff) | |
download | gnutls-bb9d96bae90cde2a5e5e18f52e1d7a7e419d2d76.tar.gz |
documentation and comment fixes
Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
Diffstat (limited to 'doc/cha-intro-tls.texi')
-rw-r--r-- | doc/cha-intro-tls.texi | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/cha-intro-tls.texi b/doc/cha-intro-tls.texi index 428319c3d1..3ab1d65190 100644 --- a/doc/cha-intro-tls.texi +++ b/doc/cha-intro-tls.texi @@ -574,7 +574,7 @@ legitimate end of data or not. @item Weak message integrity for export ciphers. The cryptographic keys in @acronym{SSLv2} are used for both message authentication and encryption, so if weak encryption schemes are -negotiated (say 40-bit keys) the message authentication code use the +negotiated (say 40-bit keys) the message authentication code uses the same weak key, which isn't necessary. @end itemize |