aboutsummaryrefslogtreecommitdiffstats
path: root/drivers/char
diff options
context:
space:
mode:
authorGreg Price <price@MIT.EDU>2013-11-29 14:58:06 -0500
committerTheodore Ts'o <tytso@mit.edu>2014-03-19 22:18:50 -0400
commitdfd38750db3cc17a1da3405389a81b430720c2c6 (patch)
treedf11e100df827cdf5f2faabaefef85d1a7c6d6a2 /drivers/char
parentb28a960c42fcd9cfc987441fa6d1c1a471f0f9ed (diff)
random: fix typos / spelling errors in comments
Signed-off-by: Greg Price <price@mit.edu> Signed-off-by: "Theodore Ts'o" <tytso@mit.edu>
Diffstat (limited to 'drivers/char')
-rw-r--r--drivers/char/random.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/drivers/char/random.c b/drivers/char/random.c
index 429b75bb60e8..b8e44e25bc36 100644
--- a/drivers/char/random.c
+++ b/drivers/char/random.c
@@ -305,7 +305,7 @@ static int random_read_wakeup_thresh = 64;
305static int random_write_wakeup_thresh = 28 * OUTPUT_POOL_WORDS; 305static int random_write_wakeup_thresh = 28 * OUTPUT_POOL_WORDS;
306 306
307/* 307/*
308 * The minimum number of seconds between urandom pool resending. We 308 * The minimum number of seconds between urandom pool reseeding. We
309 * do this to limit the amount of entropy that can be drained from the 309 * do this to limit the amount of entropy that can be drained from the
310 * input pool even if there are heavy demands on /dev/urandom. 310 * input pool even if there are heavy demands on /dev/urandom.
311 */ 311 */
@@ -322,7 +322,7 @@ static int random_min_urandom_seed = 60;
322 * Register. (See M. Matsumoto & Y. Kurita, 1992. Twisted GFSR 322 * Register. (See M. Matsumoto & Y. Kurita, 1992. Twisted GFSR
323 * generators. ACM Transactions on Modeling and Computer Simulation 323 * generators. ACM Transactions on Modeling and Computer Simulation
324 * 2(3):179-194. Also see M. Matsumoto & Y. Kurita, 1994. Twisted 324 * 2(3):179-194. Also see M. Matsumoto & Y. Kurita, 1994. Twisted
325 * GFSR generators II. ACM Transactions on Mdeling and Computer 325 * GFSR generators II. ACM Transactions on Modeling and Computer
326 * Simulation 4:254-266) 326 * Simulation 4:254-266)
327 * 327 *
328 * Thanks to Colin Plumb for suggesting this. 328 * Thanks to Colin Plumb for suggesting this.
@@ -1036,7 +1036,7 @@ static void extract_buf(struct entropy_store *r, __u8 *out)
1036 sha_transform(hash.w, (__u8 *)(r->pool + i), workspace); 1036 sha_transform(hash.w, (__u8 *)(r->pool + i), workspace);
1037 1037
1038 /* 1038 /*
1039 * If we have a architectural hardware random number 1039 * If we have an architectural hardware random number
1040 * generator, mix that in, too. 1040 * generator, mix that in, too.
1041 */ 1041 */
1042 for (i = 0; i < LONGS(20); i++) { 1042 for (i = 0; i < LONGS(20); i++) {