diff options
author | Greg Price <price@MIT.EDU> | 2013-11-29 14:58:06 -0500 |
---|---|---|
committer | Theodore Ts'o <tytso@mit.edu> | 2014-03-19 22:18:50 -0400 |
commit | dfd38750db3cc17a1da3405389a81b430720c2c6 (patch) | |
tree | df11e100df827cdf5f2faabaefef85d1a7c6d6a2 /drivers/char/random.c | |
parent | b28a960c42fcd9cfc987441fa6d1c1a471f0f9ed (diff) |
random: fix typos / spelling errors in comments
Signed-off-by: Greg Price <price@mit.edu>
Signed-off-by: "Theodore Ts'o" <tytso@mit.edu>
Diffstat (limited to 'drivers/char/random.c')
-rw-r--r-- | drivers/char/random.c | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/drivers/char/random.c b/drivers/char/random.c index 429b75bb60e8..b8e44e25bc36 100644 --- a/drivers/char/random.c +++ b/drivers/char/random.c | |||
@@ -305,7 +305,7 @@ static int random_read_wakeup_thresh = 64; | |||
305 | static int random_write_wakeup_thresh = 28 * OUTPUT_POOL_WORDS; | 305 | static int random_write_wakeup_thresh = 28 * OUTPUT_POOL_WORDS; |
306 | 306 | ||
307 | /* | 307 | /* |
308 | * The minimum number of seconds between urandom pool resending. We | 308 | * The minimum number of seconds between urandom pool reseeding. We |
309 | * do this to limit the amount of entropy that can be drained from the | 309 | * do this to limit the amount of entropy that can be drained from the |
310 | * input pool even if there are heavy demands on /dev/urandom. | 310 | * input pool even if there are heavy demands on /dev/urandom. |
311 | */ | 311 | */ |
@@ -322,7 +322,7 @@ static int random_min_urandom_seed = 60; | |||
322 | * Register. (See M. Matsumoto & Y. Kurita, 1992. Twisted GFSR | 322 | * Register. (See M. Matsumoto & Y. Kurita, 1992. Twisted GFSR |
323 | * generators. ACM Transactions on Modeling and Computer Simulation | 323 | * generators. ACM Transactions on Modeling and Computer Simulation |
324 | * 2(3):179-194. Also see M. Matsumoto & Y. Kurita, 1994. Twisted | 324 | * 2(3):179-194. Also see M. Matsumoto & Y. Kurita, 1994. Twisted |
325 | * GFSR generators II. ACM Transactions on Mdeling and Computer | 325 | * GFSR generators II. ACM Transactions on Modeling and Computer |
326 | * Simulation 4:254-266) | 326 | * Simulation 4:254-266) |
327 | * | 327 | * |
328 | * Thanks to Colin Plumb for suggesting this. | 328 | * Thanks to Colin Plumb for suggesting this. |
@@ -1036,7 +1036,7 @@ static void extract_buf(struct entropy_store *r, __u8 *out) | |||
1036 | sha_transform(hash.w, (__u8 *)(r->pool + i), workspace); | 1036 | sha_transform(hash.w, (__u8 *)(r->pool + i), workspace); |
1037 | 1037 | ||
1038 | /* | 1038 | /* |
1039 | * If we have a architectural hardware random number | 1039 | * If we have an architectural hardware random number |
1040 | * generator, mix that in, too. | 1040 | * generator, mix that in, too. |
1041 | */ | 1041 | */ |
1042 | for (i = 0; i < LONGS(20); i++) { | 1042 | for (i = 0; i < LONGS(20); i++) { |