aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorDavid G. Andersen <dave.andersen@gmail.com>2014-10-05 20:32:49 -0400
committerDavid G. Andersen <dave.andersen@gmail.com>2014-10-05 20:32:49 -0400
commit46f26ffe8894eeffa3298ce3cf3ff9f5c8b8e23b (patch)
tree212fcf7384a67473f599ce9e869def0aa5544c0a
parentfix typo (diff)
downloadmonero-46f26ffe8894eeffa3298ce3cf3ff9f5c8b8e23b.tar.xz
another typo fix
-rw-r--r--src/crypto/slow-hash.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/src/crypto/slow-hash.c b/src/crypto/slow-hash.c
index d4d0aaa6f..ec356d53b 100644
--- a/src/crypto/slow-hash.c
+++ b/src/crypto/slow-hash.c
@@ -282,7 +282,7 @@ STATIC INLINE void aes_expand_key(const uint8_t *key, uint8_t *expandedKey)
}
/*
- * @brief a "pseudo" round of AES (similar to slightly different from normal AES encryption)
+ * @brief a "pseudo" round of AES (similar to but slightly different from normal AES encryption)
*
* To fill its 2MB scratch buffer, CryptoNight uses a nonstandard implementation
* of AES encryption: It applies 10 rounds of the basic AES encryption operation