Fix TYPO for removing warning during doxygen generation 40/89240/1 accepted/tizen/3.0/ivi/20161011.070302 accepted/tizen/3.0/mobile/20161015.034257 accepted/tizen/3.0/tv/20161016.005901 accepted/tizen/3.0/wearable/20161015.084629 accepted/tizen/common/20160926.154101 accepted/tizen/ivi/20160927.020858 accepted/tizen/mobile/20160927.020840 accepted/tizen/tv/20160927.020646 accepted/tizen/wearable/20160927.020823 submit/tizen/20160926.005548 submit/tizen_3.0_common/20161104.104000 submit/tizen_3.0_ivi/20161010.000008 submit/tizen_3.0_mobile/20161015.000007 submit/tizen_3.0_tv/20161015.000006 submit/tizen_3.0_wearable/20161015.000007
authorDongsun Lee <ds73.lee@samsung.com>
Fri, 23 Sep 2016 01:12:47 +0000 (10:12 +0900)
committerDongsun Lee <ds73.lee@samsung.com>
Fri, 23 Sep 2016 01:12:47 +0000 (10:12 +0900)
Change-Id: I1a971b00b321a56e6ea59d03f3c51056494f16ab
Signed-off-by: Dongsun Lee <ds73.lee@samsung.com>
api/yaca/yaca_types.h

index 0f0ae33..59674bc 100755 (executable)
@@ -676,7 +676,7 @@ typedef enum {
        /**
         * PKCS #1 v1.5 padding with an SSL-specific modification that denotes that the party
         * is SSL3 capable. It is used for rollback attack detection in SSLv3. If during decryption it
-        * turns out that both parties are using #YACA_PADDING_PKCS1_SSL23 (both are communicating
+        * turns out that both parties are using #YACA_PADDING_PKCS1_SSLV23 (both are communicating
         * using SSL2 and both are SSL3 capable) it is treated as a rollback attack and an error is
         * returned. Suitable for low-level RSA public_encrypt/private_decrypt operations. For
         * low-level operations the input must be at least 11 bytes shorter than the key length.