From ce2ad655990c0b0fdba479d02fbd0f746b98d44d Mon Sep 17 00:00:00 2001 From: "David G. Andersen" Date: Mon, 6 Oct 2014 17:42:58 -0400 Subject: [PATCH 1/2] typo fix - cryptonight, not cryptonote --- src/crypto/slow-hash.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/crypto/slow-hash.c b/src/crypto/slow-hash.c index ce8e90bb7..10536dc5b 100644 --- a/src/crypto/slow-hash.c +++ b/src/crypto/slow-hash.c @@ -105,7 +105,7 @@ _a = _mm_load_si128(R128(a)); \ /* - * An SSE-optimized implementation of the second half of CryptoNote step 3. + * An SSE-optimized implementation of the second half of CryptoNight step 3. * After using AES to mix a scratchpad value into _c (done by the caller), * this macro xors it with _b and stores the result back to the same index (j) that it * loaded the scratchpad value from. It then performs a second random memory From 28dfb4b178a864c5b41f46c041da185088c48f51 Mon Sep 17 00:00:00 2001 From: "David G. Andersen" Date: Mon, 6 Oct 2014 17:44:23 -0400 Subject: [PATCH 2/2] capitalize Keccak everywhere --- src/crypto/slow-hash.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/crypto/slow-hash.c b/src/crypto/slow-hash.c index 10536dc5b..787545830 100644 --- a/src/crypto/slow-hash.c +++ b/src/crypto/slow-hash.c @@ -522,7 +522,7 @@ void cn_slow_hash(const void *data, size_t length, char *hash) hash_process(&state.hs, data, length); memcpy(text, state.init, INIT_SIZE_BYTE); - /* CryptoNight Step 2: Iteratively encrypt the results from keccak to fill + /* CryptoNight Step 2: Iteratively encrypt the results from Keccak to fill * the 2MB large random access buffer. */