Skip to content

Commit e72e23e

Browse files
committed
Fix typo
Signed-off-by: Mattias Andrée <maandree@kth.se>
1 parent 1b88359 commit e72e23e

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

doc/crypt.5

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -192,13 +192,13 @@ In 2016, the scrypt algorithm was published by IETF as RFC 7914.
192192
.Ss argon2_d
193193
argon2_d is one of the variants of Argon2 key derivation functions that won
194194
the Password Hashing Competition 2015. argon2d is designed for environments
195-
taht are safe from side-channel attacks. Acceptable for new hashes, but
195+
that are safe from side-channel attacks. Acceptable for new hashes, but
196196
not widely supported.
197197
.hash "$argon2d$" "\e$argon2d\e$(v=(16|19)\e$)?m=[1-9][0-9]*,t=[1-9][0-9]*,p=[1-9][0-9]*\e$[A-Za-z0-9+/]{11,}\e$[A-Za-z0-9+/]{6,}" 4,294,967,295 8 "32 to 34,359,738,360 (256 default)" "32 to 34,359,738,360 (256 default)" "64 to 34,359,738,360 (128+ recommended)" "1 to 4,294,967,295"
198198
.Ss argon2_i
199199
argon2_i is one of the variants of Argon2 key derivation functions that won
200200
the Password Hashing Competition 2015. argon2i is designed for environments
201-
taht are not safe from side-channel attacks. Acceptable for new hashes, but
201+
that are not safe from side-channel attacks. Acceptable for new hashes, but
202202
not widely supported.
203203
.hash "$argon2i$" "\e$argon2i\e$(v=(16|19)\e$)?m=[1-9][0-9]*,t=[1-9][0-9]*,p=[1-9][0-9]*\e$[A-Za-z0-9+/]{11,}\e$[A-Za-z0-9+/]{6,}" 4,294,967,295 8 "32 to 34,359,738,360 (256 default)" "32 to 34,359,738,360 (256 default)" "64 to 34,359,738,360 (128+ recommended)" "1 to 4,294,967,295"
204204
.Ss argon2_id

0 commit comments

Comments
 (0)