diff options
author | SHIBATA Hiroshi <hsbt@ruby-lang.org> | 2017-02-14 09:18:45 +0900 |
---|---|---|
committer | SHIBATA Hiroshi <hsbt@ruby-lang.org> | 2017-02-14 09:18:45 +0900 |
commit | 213003a99aa5ab5490239493256c1948f1d9e186 (patch) | |
tree | 77bfcf4af1937fa7691217336416d4ebb6c9b19e /ext/openssl/ossl_cipher.c | |
parent | 6693a549d6738e5957201094004abd2159164332 (diff) | |
download | ruby-openssl-213003a99aa5ab5490239493256c1948f1d9e186.tar.gz |
Fix typos
Diffstat (limited to 'ext/openssl/ossl_cipher.c')
-rw-r--r-- | ext/openssl/ossl_cipher.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/ext/openssl/ossl_cipher.c b/ext/openssl/ossl_cipher.c index 73b667b2..9ab74a16 100644 --- a/ext/openssl/ossl_cipher.c +++ b/ext/openssl/ossl_cipher.c @@ -1023,7 +1023,7 @@ Init_ossl_cipher(void) * An example using the GCM (Galois/Counter Mode). You have 16 bytes +key+, * 12 bytes (96 bits) +nonce+ and the associated data +auth_data+. Be sure * not to reuse the +key+ and +nonce+ pair. Reusing an nonce ruins the - * security gurantees of GCM mode. + * security guarantees of GCM mode. * * cipher = OpenSSL::Cipher::AES.new(128, :GCM).encrypt * cipher.key = key |