diff options
| author | Jeff Garzik <[email protected]> | 2012-08-01 10:56:47 -0700 |
|---|---|---|
| committer | Jeff Garzik <[email protected]> | 2012-08-01 10:56:47 -0700 |
| commit | f81e6f779b66e235afd6c5241306d5e70ec41276 (patch) | |
| tree | 208e1d5fb7b77c41e67edb372e2590250c32faac /src/crypter.cpp | |
| parent | Merge pull request #1636 from Diapolo/Warning_string (diff) | |
| parent | Bugfix: Correct English grammar regarding "'s" (diff) | |
| download | discoin-f81e6f779b66e235afd6c5241306d5e70ec41276.tar.xz discoin-f81e6f779b66e235afd6c5241306d5e70ec41276.zip | |
Merge pull request #1632 from luke-jr/spelling
Fix spelling and grammar errors
Diffstat (limited to 'src/crypter.cpp')
| -rw-r--r-- | src/crypter.cpp | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/src/crypter.cpp b/src/crypter.cpp index 4f37575a6..411a1ee4c 100644 --- a/src/crypter.cpp +++ b/src/crypter.cpp @@ -17,7 +17,7 @@ bool CCrypter::SetKeyFromPassphrase(const SecureString& strKeyData, const std::v if (nRounds < 1 || chSalt.size() != WALLET_CRYPTO_SALT_SIZE) return false; - // Try to keep the keydata out of swap (and be a bit over-careful to keep the IV that we don't even use out of swap) + // Try to keep the key data out of swap (and be a bit over-careful to keep the IV that we don't even use out of swap) // Note that this does nothing about suspend-to-disk (which will put all our key data on disk) // Note as well that at no point in this program is any attempt made to prevent stealing of keys by reading the memory of the running process. mlock(&chKey[0], sizeof chKey); @@ -44,7 +44,7 @@ bool CCrypter::SetKey(const CKeyingMaterial& chNewKey, const std::vector<unsigne if (chNewKey.size() != WALLET_CRYPTO_KEY_SIZE || chNewIV.size() != WALLET_CRYPTO_KEY_SIZE) return false; - // Try to keep the keydata out of swap + // Try to keep the key data out of swap // Note that this does nothing about suspend-to-disk (which will put all our key data on disk) // Note as well that at no point in this program is any attempt made to prevent stealing of keys by reading the memory of the running process. mlock(&chKey[0], sizeof chKey); |