summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorDongsun Lee <ds73.lee@samsung.com>2016-09-23 10:12:47 +0900
committerDongsun Lee <ds73.lee@samsung.com>2016-09-23 10:12:47 +0900
commitefad90f650cd388ee7ba2c2ac2cfc1934b9b1c03 (patch)
treedc7f8251d763be8f148ada2f42355ec748a67c69
parentb3a6beafac3b820e16efedc3d029981b74cd078a (diff)
downloadyaca-efad90f650cd388ee7ba2c2ac2cfc1934b9b1c03.tar.gz
yaca-efad90f650cd388ee7ba2c2ac2cfc1934b9b1c03.tar.bz2
yaca-efad90f650cd388ee7ba2c2ac2cfc1934b9b1c03.zip
Change-Id: I1a971b00b321a56e6ea59d03f3c51056494f16ab Signed-off-by: Dongsun Lee <ds73.lee@samsung.com>
-rwxr-xr-xapi/yaca/yaca_types.h2
1 files changed, 1 insertions, 1 deletions
diff --git a/api/yaca/yaca_types.h b/api/yaca/yaca_types.h
index 0f0ae33..59674bc 100755
--- a/api/yaca/yaca_types.h
+++ b/api/yaca/yaca_types.h
@@ -676,7 +676,7 @@ typedef enum {
/**
* PKCS #1 v1.5 padding with an SSL-specific modification that denotes that the party
* is SSL3 capable. It is used for rollback attack detection in SSLv3. If during decryption it
- * turns out that both parties are using #YACA_PADDING_PKCS1_SSL23 (both are communicating
+ * turns out that both parties are using #YACA_PADDING_PKCS1_SSLV23 (both are communicating
* using SSL2 and both are SSL3 capable) it is treated as a rollback attack and an error is
* returned. Suitable for low-level RSA public_encrypt/private_decrypt operations. For
* low-level operations the input must be at least 11 bytes shorter than the key length.