summaryrefslogtreecommitdiff
path: root/crypto/openssl/doc/man3/BF_encrypt.pod
diff options
context:
space:
mode:
Diffstat (limited to 'crypto/openssl/doc/man3/BF_encrypt.pod')
-rw-r--r--crypto/openssl/doc/man3/BF_encrypt.pod4
1 files changed, 2 insertions, 2 deletions
diff --git a/crypto/openssl/doc/man3/BF_encrypt.pod b/crypto/openssl/doc/man3/BF_encrypt.pod
index b20f634da6f5..02e04b7f34cb 100644
--- a/crypto/openssl/doc/man3/BF_encrypt.pod
+++ b/crypto/openssl/doc/man3/BF_encrypt.pod
@@ -60,7 +60,7 @@ recipient needs to know what it was initialized with, or it won't be able
to decrypt. Some programs and protocols simplify this, like SSH, where
B<ivec> is simply initialized to zero.
BF_cbc_encrypt() operates on data that is a multiple of 8 bytes long, while
-BF_cfb64_encrypt() and BF_ofb64_encrypt() are used to encrypt an variable
+BF_cfb64_encrypt() and BF_ofb64_encrypt() are used to encrypt a variable
number of bytes (the amount does not have to be an exact multiple of 8). The
purpose of the latter two is to simulate stream ciphers, and therefore, they
need the parameter B<num>, which is a pointer to an integer where the current
@@ -109,7 +109,7 @@ L<des_modes(7)>
=head1 COPYRIGHT
-Copyright 2000-2016 The OpenSSL Project Authors. All Rights Reserved.
+Copyright 2000-2020 The OpenSSL Project Authors. All Rights Reserved.
Licensed under the OpenSSL license (the "License"). You may not use
this file except in compliance with the License. You can obtain a copy