diff options
author | Julian Krause <julian.krause@gmail.com> | 2013-12-13 23:47:17 -0800 |
---|---|---|
committer | Julian Krause <julian.krause@gmail.com> | 2013-12-13 23:47:17 -0800 |
commit | 383a04cf47cef37ec94dcc56f52c0e6a18013dcb (patch) | |
tree | 9a6a8a050107df77e4ca1f268c7dfe69e8b59218 /docs/hazmat | |
parent | 848f770c4ab33e0d1cd98c78480ae32d5c5f134e (diff) | |
download | cryptography-383a04cf47cef37ec94dcc56f52c0e6a18013dcb.tar.gz cryptography-383a04cf47cef37ec94dcc56f52c0e6a18013dcb.tar.bz2 cryptography-383a04cf47cef37ec94dcc56f52c0e6a18013dcb.zip |
Remove plural.
Diffstat (limited to 'docs/hazmat')
-rw-r--r-- | docs/hazmat/primitives/constant-time.rst | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/docs/hazmat/primitives/constant-time.rst b/docs/hazmat/primitives/constant-time.rst index 4df73b3c..632e7c68 100644 --- a/docs/hazmat/primitives/constant-time.rst +++ b/docs/hazmat/primitives/constant-time.rst @@ -14,7 +14,7 @@ An example would be comparing a HMAC signature received from a client to the one generated by the server code for authentication purposes. For more information about this sort of issue, see `Coda Hale's blog post`_ -about the timing attacks on KeyCzar and Java's ``MessageDigest.isEquals()``. +about the timing attacks on KeyCzar and Java's ``MessageDigest.isEqual()``. .. function:: bytes_eq(a, b) |