summaryrefslogtreecommitdiff
path: root/src/common/crypto.c
diff options
context:
space:
mode:
authorDeepesh Pathak <deepshpathak@gmail.com>2018-01-24 14:25:15 +0530
committerNick Mathewson <nickm@torproject.org>2018-02-07 10:41:57 -0500
commitca6682f3f86dbcf2b5346ae69d45293e8a59322b (patch)
tree54502f2a67b49927e85c51baf6fa0805c24b3839 /src/common/crypto.c
parent13f5adc86c30101a32fedcd1713443eb4c43a397 (diff)
downloadtor-ca6682f3f86dbcf2b5346ae69d45293e8a59322b.tar.gz
tor-ca6682f3f86dbcf2b5346ae69d45293e8a59322b.zip
Fix spelling mistakes corresponding to ticket #23650
Diffstat (limited to 'src/common/crypto.c')
-rw-r--r--src/common/crypto.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/src/common/crypto.c b/src/common/crypto.c
index 2ecf64c393..6e420ab051 100644
--- a/src/common/crypto.c
+++ b/src/common/crypto.c
@@ -1917,7 +1917,7 @@ crypto_strongest_rand_syscall(uint8_t *out, size_t out_len)
#elif defined(__linux__) && defined(SYS_getrandom)
static int getrandom_works = 1; /* Be optimitic about our chances... */
- /* getrandom() isn't as straight foward as getentropy(), and has
+ /* getrandom() isn't as straightforward as getentropy(), and has
* no glibc wrapper.
*
* As far as I can tell from getrandom(2) and the source code, the
@@ -1930,7 +1930,7 @@ crypto_strongest_rand_syscall(uint8_t *out, size_t out_len)
*
* We optimistically assume that getrandom() is available and functional
* because it is the way of the future, and 2 branch mispredicts pale in
- * comparision to the overheads involved with failing to open
+ * comparison to the overheads involved with failing to open
* /dev/srandom followed by opening and reading from /dev/urandom.
*/
if (PREDICT_LIKELY(getrandom_works)) {