diff options
author | Deepesh Pathak <deepshpathak@gmail.com> | 2018-01-24 14:25:15 +0530 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2018-02-07 10:41:57 -0500 |
commit | ca6682f3f86dbcf2b5346ae69d45293e8a59322b (patch) | |
tree | 54502f2a67b49927e85c51baf6fa0805c24b3839 /src/common/crypto.c | |
parent | 13f5adc86c30101a32fedcd1713443eb4c43a397 (diff) | |
download | tor-ca6682f3f86dbcf2b5346ae69d45293e8a59322b.tar.gz tor-ca6682f3f86dbcf2b5346ae69d45293e8a59322b.zip |
Fix spelling mistakes corresponding to ticket #23650
Diffstat (limited to 'src/common/crypto.c')
-rw-r--r-- | src/common/crypto.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/src/common/crypto.c b/src/common/crypto.c index 2ecf64c393..6e420ab051 100644 --- a/src/common/crypto.c +++ b/src/common/crypto.c @@ -1917,7 +1917,7 @@ crypto_strongest_rand_syscall(uint8_t *out, size_t out_len) #elif defined(__linux__) && defined(SYS_getrandom) static int getrandom_works = 1; /* Be optimitic about our chances... */ - /* getrandom() isn't as straight foward as getentropy(), and has + /* getrandom() isn't as straightforward as getentropy(), and has * no glibc wrapper. * * As far as I can tell from getrandom(2) and the source code, the @@ -1930,7 +1930,7 @@ crypto_strongest_rand_syscall(uint8_t *out, size_t out_len) * * We optimistically assume that getrandom() is available and functional * because it is the way of the future, and 2 branch mispredicts pale in - * comparision to the overheads involved with failing to open + * comparison to the overheads involved with failing to open * /dev/srandom followed by opening and reading from /dev/urandom. */ if (PREDICT_LIKELY(getrandom_works)) { |