fix typos

This commit is contained in:
Andrew Poelstra 2018-07-24 21:16:52 +00:00
parent 9b51ed3e2c
commit 2aeff4c62f
2 changed files with 3 additions and 3 deletions

View File

@ -3,7 +3,7 @@
### rust-secp256k1 ### rust-secp256k1
`rust-secp256k1` is a wrapper around ![libsecp256k1](https://github.com/bitcoin-core/secp256k1), `rust-secp256k1` is a wrapper around ![libsecp256k1](https://github.com/bitcoin-core/secp256k1),
a C library by Peter Wuille for producing ECDSA signatures using the SECG curve a C library by Pieter Wuille for producing ECDSA signatures using the SECG curve
`secp256k1`. This library `secp256k1`. This library
* exposes type-safe Rust bindings for all `libsecp256k1` functions * exposes type-safe Rust bindings for all `libsecp256k1` functions
* implements key generation * implements key generation

View File

@ -456,7 +456,7 @@ impl Secp256k1<VerifyOnly> {
impl<C> Secp256k1<C> { impl<C> Secp256k1<C> {
/// (Re)randomizes the Secp256k1 context for cheap sidechannel resistence; /// (Re)randomizes the Secp256k1 context for cheap sidechannel resistance;
/// see comment in libsecp256k1 commit d2275795f by Gregory Maxwell /// see comment in libsecp256k1 commit d2275795f by Gregory Maxwell
#[cfg(any(test, feature = "rand"))] #[cfg(any(test, feature = "rand"))]
pub fn randomize<R: Rng>(&mut self, rng: &mut R) { pub fn randomize<R: Rng>(&mut self, rng: &mut R) {
@ -467,7 +467,7 @@ impl<C> Secp256k1<C> {
// This function cannot fail; it has an error return for future-proofing. // This function cannot fail; it has an error return for future-proofing.
// We do not expose this error since it is impossible to hit, and we have // We do not expose this error since it is impossible to hit, and we have
// precedent for not exposing impossible errors (for example in // precedent for not exposing impossible errors (for example in
// `PublicKey::from_secret_key` where it is impossble to create an invalid // `PublicKey::from_secret_key` where it is impossible to create an invalid
// secret key through the API.) // secret key through the API.)
// However, if this DOES fail, the result is potentially weaker side-channel // However, if this DOES fail, the result is potentially weaker side-channel
// resistance, which is deadly and undetectable, so we take out the entire // resistance, which is deadly and undetectable, so we take out the entire