diff options
author | David G. Andersen <dave.andersen@gmail.com> | 2014-10-05 20:32:49 -0400 |
---|---|---|
committer | David G. Andersen <dave.andersen@gmail.com> | 2014-10-05 20:32:49 -0400 |
commit | 46f26ffe8894eeffa3298ce3cf3ff9f5c8b8e23b (patch) | |
tree | 212fcf7384a67473f599ce9e869def0aa5544c0a | |
parent | fix typo (diff) | |
download | monero-46f26ffe8894eeffa3298ce3cf3ff9f5c8b8e23b.tar.xz |
another typo fix
-rw-r--r-- | src/crypto/slow-hash.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/src/crypto/slow-hash.c b/src/crypto/slow-hash.c index d4d0aaa6f..ec356d53b 100644 --- a/src/crypto/slow-hash.c +++ b/src/crypto/slow-hash.c @@ -282,7 +282,7 @@ STATIC INLINE void aes_expand_key(const uint8_t *key, uint8_t *expandedKey) } /* - * @brief a "pseudo" round of AES (similar to slightly different from normal AES encryption) + * @brief a "pseudo" round of AES (similar to but slightly different from normal AES encryption) * * To fill its 2MB scratch buffer, CryptoNight uses a nonstandard implementation * of AES encryption: It applies 10 rounds of the basic AES encryption operation |