diff options
| author | Luke Dashjr <[email protected]> | 2012-08-12 17:02:38 +0000 |
|---|---|---|
| committer | Luke Dashjr <[email protected]> | 2012-08-12 17:02:38 +0000 |
| commit | 797d0b231bebcf2cfdb82f4d44b9a06ead2a6e3c (patch) | |
| tree | e020813e04c0d63487147f9b586b34367bed9252 /src/crypter.cpp | |
| parent | Merge branch 'bugfix_CNBerr' into 0.5.x (diff) | |
| parent | Bugfix: Fix a variety of misspellings (diff) | |
| download | discoin-797d0b231bebcf2cfdb82f4d44b9a06ead2a6e3c.tar.xz discoin-797d0b231bebcf2cfdb82f4d44b9a06ead2a6e3c.zip | |
Merge branch '0.4.x' into 0.5.x
Conflicts:
src/net.cpp
Diffstat (limited to 'src/crypter.cpp')
| -rw-r--r-- | src/crypter.cpp | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/src/crypter.cpp b/src/crypter.cpp index 727cf090f..72d753a9c 100644 --- a/src/crypter.cpp +++ b/src/crypter.cpp @@ -20,7 +20,7 @@ bool CCrypter::SetKeyFromPassphrase(const SecureString& strKeyData, const std::v if (nRounds < 1 || chSalt.size() != WALLET_CRYPTO_SALT_SIZE) return false; - // Try to keep the keydata out of swap (and be a bit over-careful to keep the IV that we don't even use out of swap) + // Try to keep the key data out of swap (and be a bit over-careful to keep the IV that we don't even use out of swap) // Note that this does nothing about suspend-to-disk (which will put all our key data on disk) // Note as well that at no point in this program is any attempt made to prevent stealing of keys by reading the memory of the running process. mlock(&chKey[0], sizeof chKey); @@ -47,7 +47,7 @@ bool CCrypter::SetKey(const CKeyingMaterial& chNewKey, const std::vector<unsigne if (chNewKey.size() != WALLET_CRYPTO_KEY_SIZE || chNewIV.size() != WALLET_CRYPTO_KEY_SIZE) return false; - // Try to keep the keydata out of swap + // Try to keep the key data out of swap // Note that this does nothing about suspend-to-disk (which will put all our key data on disk) // Note as well that at no point in this program is any attempt made to prevent stealing of keys by reading the memory of the running process. mlock(&chKey[0], sizeof chKey); |