diff options
author | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2017-03-30 19:58:22 +0200 |
---|---|---|
committer | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2017-03-30 19:58:42 +0200 |
commit | 6ba708715a1c0816b854bb32d3f10556ad66f2b4 (patch) | |
tree | 4367f91e3314a14d3cf2f896b342b022b7eee90b /doc | |
parent | 86d67f7d21ac382183975eef3f14d5fe6ada566a (diff) | |
download | gnutls-6ba708715a1c0816b854bb32d3f10556ad66f2b4.tar.gz |
doc update [ci skip]
Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
Diffstat (limited to 'doc')
-rw-r--r-- | doc/cha-tokens.texi | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/cha-tokens.texi b/doc/cha-tokens.texi index a5c647d0d3..78d0bc8734 100644 --- a/doc/cha-tokens.texi +++ b/doc/cha-tokens.texi @@ -1,5 +1,5 @@ @node Hardware security modules and abstract key types -@chapter Abstract keys types and Hardware security modules +@chapter Abstract key types and Hardware security modules In several cases storing the long term cryptographic keys in a hard disk or even in memory poses a significant risk. Once the system they are stored |