diff options
author | David G. Andersen <dave.andersen@gmail.com> | 2014-10-06 10:15:21 -0400 |
---|---|---|
committer | David G. Andersen <dave.andersen@gmail.com> | 2014-10-06 10:15:21 -0400 |
commit | e4fb913b2d3d508dc3ebf2d8e8ca1655e7ef63b9 (patch) | |
tree | d3e297728674a6ffd21f90ae9257cfc61443caa9 /src | |
parent | Merge pull request #170 (diff) | |
download | monero-e4fb913b2d3d508dc3ebf2d8e8ca1655e7ef63b9.tar.xz |
Fix comment start for two functions
Diffstat (limited to 'src')
-rw-r--r-- | src/crypto/slow-hash.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/src/crypto/slow-hash.c b/src/crypto/slow-hash.c index ec356d53b..ce8e90bb7 100644 --- a/src/crypto/slow-hash.c +++ b/src/crypto/slow-hash.c @@ -281,7 +281,7 @@ STATIC INLINE void aes_expand_key(const uint8_t *key, uint8_t *expandedKey) ek[10] = t1; } -/* +/** * @brief a "pseudo" round of AES (similar to but slightly different from normal AES encryption) * * To fill its 2MB scratch buffer, CryptoNight uses a nonstandard implementation @@ -323,7 +323,7 @@ STATIC INLINE void aes_pseudo_round(const uint8_t *in, uint8_t *out, } } -/* +/** * @brief aes_pseudo_round that loads data from *in and xors it with *xor first * * This function performs the same operations as aes_pseudo_round, but before |