summaryrefslogtreecommitdiff
path: root/doc
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@gnutls.org>2017-03-30 19:58:22 +0200
committerNikos Mavrogiannopoulos <nmav@gnutls.org>2017-03-30 19:58:42 +0200
commit6ba708715a1c0816b854bb32d3f10556ad66f2b4 (patch)
tree4367f91e3314a14d3cf2f896b342b022b7eee90b /doc
parent86d67f7d21ac382183975eef3f14d5fe6ada566a (diff)
downloadgnutls-6ba708715a1c0816b854bb32d3f10556ad66f2b4.tar.gz
doc update [ci skip]
Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
Diffstat (limited to 'doc')
-rw-r--r--doc/cha-tokens.texi2
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/cha-tokens.texi b/doc/cha-tokens.texi
index a5c647d0d3..78d0bc8734 100644
--- a/doc/cha-tokens.texi
+++ b/doc/cha-tokens.texi
@@ -1,5 +1,5 @@
@node Hardware security modules and abstract key types
-@chapter Abstract keys types and Hardware security modules
+@chapter Abstract key types and Hardware security modules
In several cases storing the long term cryptographic keys in a hard disk or
even in memory poses a significant risk. Once the system they are stored