diff options
author | Riccardo Spagni <ric@spagni.net> | 2014-10-15 11:32:10 +0200 |
---|---|---|
committer | Riccardo Spagni <ric@spagni.net> | 2014-10-15 11:32:16 +0200 |
commit | 0790aea6c826253f5b8a015cc9ad0e3b3d938d29 (patch) | |
tree | 57bd041161a343042fa1f7c085eba61e3cd44828 /src | |
parent | Merge branch 'moneromooo-monero-memmem' (diff) | |
parent | capitalize Keccak everywhere (diff) | |
download | monero-0790aea6c826253f5b8a015cc9ad0e3b3d938d29.tar.xz |
Merge pull request #174
28dfb4b capitalize Keccak everywhere (David G. Andersen)
ce2ad65 typo fix - cryptonight, not cryptonote (David G. Andersen)
Diffstat (limited to 'src')
-rw-r--r-- | src/crypto/slow-hash.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/src/crypto/slow-hash.c b/src/crypto/slow-hash.c index ce8e90bb7..787545830 100644 --- a/src/crypto/slow-hash.c +++ b/src/crypto/slow-hash.c @@ -105,7 +105,7 @@ _a = _mm_load_si128(R128(a)); \ /* - * An SSE-optimized implementation of the second half of CryptoNote step 3. + * An SSE-optimized implementation of the second half of CryptoNight step 3. * After using AES to mix a scratchpad value into _c (done by the caller), * this macro xors it with _b and stores the result back to the same index (j) that it * loaded the scratchpad value from. It then performs a second random memory @@ -522,7 +522,7 @@ void cn_slow_hash(const void *data, size_t length, char *hash) hash_process(&state.hs, data, length); memcpy(text, state.init, INIT_SIZE_BYTE); - /* CryptoNight Step 2: Iteratively encrypt the results from keccak to fill + /* CryptoNight Step 2: Iteratively encrypt the results from Keccak to fill * the 2MB large random access buffer. */ |