Update 09.5.md
Correct misspelling.
This commit is contained in:
@@ -75,7 +75,7 @@ Very secure systems utilize hash algorithms that take into account the time and
|
||||
|
||||
In Go, it's recommended that you use the `scrypt` package, which is based on the work of the famous hacker Colin Percival (of the FreeBSD backup service Tarsnap).
|
||||
|
||||
The packge's source code can be found at the following link: http://code.google.com/p/go/source/browse?repo=crypto#hg%2Fscrypt
|
||||
The package's source code can be found at the following link: http://code.google.com/p/go/source/browse?repo=crypto#hg%2Fscrypt
|
||||
|
||||
Here is an example code snippet which can be used to obtain a derived key for an AES-256 encryption:
|
||||
|
||||
|
||||
Reference in New Issue
Block a user