From: Nick Mathewson Date: Thu, 31 Jan 2013 18:53:29 +0000 (-0500) Subject: typo in crypto_curve25519.c comment, spotted by rransom X-Git-Tag: tor-0.2.4.10-alpha~12 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=abb5519d93d56c2859e147fef2fbf0f9e96d5b9c;p=thirdparty%2Ftor.git typo in crypto_curve25519.c comment, spotted by rransom --- diff --git a/src/common/crypto_curve25519.c b/src/common/crypto_curve25519.c index 88705427a8..62398f62e6 100644 --- a/src/common/crypto_curve25519.c +++ b/src/common/crypto_curve25519.c @@ -69,7 +69,7 @@ curve25519_secret_key_generate(curve25519_secret_key_t *key_out, return -1; if (extra_strong && !crypto_strongest_rand(k_tmp, CURVE25519_SECKEY_LEN)) { /* If they asked for extra-strong entropy and we have some, use it as an - * HMAC key to improve not-so-good entopy rather than using it directly, + * HMAC key to improve not-so-good entropy rather than using it directly, * just in case the extra-strong entropy is less amazing than we hoped. */ crypto_hmac_sha256((char *)key_out->secret_key, (const char *)k_tmp, sizeof(k_tmp),