From: Loup Vaillant Date: Wed, 27 Jun 2018 08:48:44 +0000 (+0200) Subject: Typo X-Git-Url: https://git.codecow.com/?a=commitdiff_plain;h=acff2f03b62de43fc16cbccf9de8e5174fb13d52;p=Monocypher.git Typo --- diff --git a/doc/man/man3/crypto_verify16.3monocypher b/doc/man/man3/crypto_verify16.3monocypher index 8208253..36f6428 100644 --- a/doc/man/man3/crypto_verify16.3monocypher +++ b/doc/man/man3/crypto_verify16.3monocypher @@ -37,7 +37,7 @@ If the attacker attempts a forgery, one does not want to reveal .Dq your MAC is wrong, Em and it took 384 microseconds to tell . If the next attempt takes 462 microseconds instead, it tells the attacker they just guessed a few bytes correctly. -That way, an attacker can derive the correct MAC, and sucessfully +That way, an attacker can derive the correct MAC, and successfully forge a message. This has lead to practical attacks in the past. .Pp