aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRiccardo Spagni <ric@spagni.net>2014-10-15 11:32:10 +0200
committerRiccardo Spagni <ric@spagni.net>2014-10-15 11:32:16 +0200
commit0790aea6c826253f5b8a015cc9ad0e3b3d938d29 (patch)
tree57bd041161a343042fa1f7c085eba61e3cd44828
parentMerge branch 'moneromooo-monero-memmem' (diff)
parentcapitalize Keccak everywhere (diff)
downloadmonero-0790aea6c826253f5b8a015cc9ad0e3b3d938d29.tar.xz
Merge pull request #174
28dfb4b capitalize Keccak everywhere (David G. Andersen) ce2ad65 typo fix - cryptonight, not cryptonote (David G. Andersen)
-rw-r--r--src/crypto/slow-hash.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/src/crypto/slow-hash.c b/src/crypto/slow-hash.c
index ce8e90bb7..787545830 100644
--- a/src/crypto/slow-hash.c
+++ b/src/crypto/slow-hash.c
@@ -105,7 +105,7 @@
_a = _mm_load_si128(R128(a)); \
/*
- * An SSE-optimized implementation of the second half of CryptoNote step 3.
+ * An SSE-optimized implementation of the second half of CryptoNight step 3.
* After using AES to mix a scratchpad value into _c (done by the caller),
* this macro xors it with _b and stores the result back to the same index (j) that it
* loaded the scratchpad value from. It then performs a second random memory
@@ -522,7 +522,7 @@ void cn_slow_hash(const void *data, size_t length, char *hash)
hash_process(&state.hs, data, length);
memcpy(text, state.init, INIT_SIZE_BYTE);
- /* CryptoNight Step 2: Iteratively encrypt the results from keccak to fill
+ /* CryptoNight Step 2: Iteratively encrypt the results from Keccak to fill
* the 2MB large random access buffer.
*/