diff options
author | stomar <stomar@b2dd03c8-39d4-4d8f-98ff-823fe69b080e> | 2018-12-12 22:04:48 +0000 |
---|---|---|
committer | stomar <stomar@b2dd03c8-39d4-4d8f-98ff-823fe69b080e> | 2018-12-12 22:04:48 +0000 |
commit | 31dc65b2750e15e5a55a87e87e0d41e935ec7d3a (patch) | |
tree | fc840710450d834a30cdf3a6849bc450dcc99b11 /string.c | |
parent | 2930317b09acb11e73eb657548b5a8f1d86c91f0 (diff) |
string.c: [DOC] fix typos
git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@66375 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
Diffstat (limited to 'string.c')
-rw-r--r-- | string.c | 10 |
1 files changed, 5 insertions, 5 deletions
@@ -9237,17 +9237,17 @@ rb_str_oct(VALUE str) * * So-called "traditional" usage of <code>crypt(3)</code> is very * very very weak. According to its manpage, Linux's traditional * <code>crypt(3)</code> output has only 2**56 variations; too - * easy to blute force today. And this is the default behaviour. + * easy to brute force today. And this is the default behaviour. * * * In order to make things robust some OSes implement so-called * "modular" usage. To go through, you have to do a complex * build-up of the <code>salt_str</code> parameter, by hand. * Failure in generation of a proper salt string tends not to - * yield any errors; typo in parameters are normally not + * yield any errors; typos in parameters are normally not * detectable. * - * * For instance, in the following example, second invocation - * of <code>String#crypt</code> is wrong; it has typo in + * * For instance, in the following example, the second invocation + * of <code>String#crypt</code> is wrong; it has a typo in * "round=" (lacks "s"). However the call does not fail and * something unexpected is generated. * @@ -9271,7 +9271,7 @@ rb_str_oct(VALUE str) * * If for some reason you cannot migrate to other secure contemporary * password hashing algorithms, install the string-crypt gem and - * <code>requiire 'string/crypt'</code> to continue using it. + * <code>require 'string/crypt'</code> to continue using it. */ static VALUE |