aboutsummaryrefslogtreecommitdiff
path: root/src/crypter.cpp
diff options
context:
space:
mode:
authorJeff Garzik <[email protected]>2012-08-01 10:56:47 -0700
committerJeff Garzik <[email protected]>2012-08-01 10:56:47 -0700
commitf81e6f779b66e235afd6c5241306d5e70ec41276 (patch)
tree208e1d5fb7b77c41e67edb372e2590250c32faac /src/crypter.cpp
parentMerge pull request #1636 from Diapolo/Warning_string (diff)
parentBugfix: Correct English grammar regarding "'s" (diff)
downloaddiscoin-f81e6f779b66e235afd6c5241306d5e70ec41276.tar.xz
discoin-f81e6f779b66e235afd6c5241306d5e70ec41276.zip
Merge pull request #1632 from luke-jr/spelling
Fix spelling and grammar errors
Diffstat (limited to 'src/crypter.cpp')
-rw-r--r--src/crypter.cpp4
1 files changed, 2 insertions, 2 deletions
diff --git a/src/crypter.cpp b/src/crypter.cpp
index 4f37575a6..411a1ee4c 100644
--- a/src/crypter.cpp
+++ b/src/crypter.cpp
@@ -17,7 +17,7 @@ bool CCrypter::SetKeyFromPassphrase(const SecureString& strKeyData, const std::v
if (nRounds < 1 || chSalt.size() != WALLET_CRYPTO_SALT_SIZE)
return false;
- // Try to keep the keydata out of swap (and be a bit over-careful to keep the IV that we don't even use out of swap)
+ // Try to keep the key data out of swap (and be a bit over-careful to keep the IV that we don't even use out of swap)
// Note that this does nothing about suspend-to-disk (which will put all our key data on disk)
// Note as well that at no point in this program is any attempt made to prevent stealing of keys by reading the memory of the running process.
mlock(&chKey[0], sizeof chKey);
@@ -44,7 +44,7 @@ bool CCrypter::SetKey(const CKeyingMaterial& chNewKey, const std::vector<unsigne
if (chNewKey.size() != WALLET_CRYPTO_KEY_SIZE || chNewIV.size() != WALLET_CRYPTO_KEY_SIZE)
return false;
- // Try to keep the keydata out of swap
+ // Try to keep the key data out of swap
// Note that this does nothing about suspend-to-disk (which will put all our key data on disk)
// Note as well that at no point in this program is any attempt made to prevent stealing of keys by reading the memory of the running process.
mlock(&chKey[0], sizeof chKey);