aboutsummaryrefslogtreecommitdiffstats
path: root/crypto/crypto.go
diff options
context:
space:
mode:
authorPéter Szilágyi <peterke@gmail.com>2017-01-07 01:44:35 +0800
committerPéter Szilágyi <peterke@gmail.com>2017-01-07 01:44:35 +0800
commit18c77744ff4ad0bc385a4c8b50d28c2a6fde8e00 (patch)
treef346aa2c1de4c873ba7d7bf847225b2c319c5694 /crypto/crypto.go
parentac93a6ff6cd1200ab0fb67a5bd0c02cb70646632 (diff)
downloaddexon-18c77744ff4ad0bc385a4c8b50d28c2a6fde8e00.tar.gz
dexon-18c77744ff4ad0bc385a4c8b50d28c2a6fde8e00.tar.zst
dexon-18c77744ff4ad0bc385a4c8b50d28c2a6fde8e00.zip
all: fix spelling errors
Diffstat (limited to 'crypto/crypto.go')
-rw-r--r--crypto/crypto.go4
1 files changed, 2 insertions, 2 deletions
diff --git a/crypto/crypto.go b/crypto/crypto.go
index f1a4b774c..ce45ebd38 100644
--- a/crypto/crypto.go
+++ b/crypto/crypto.go
@@ -194,9 +194,9 @@ func SigToPub(hash, sig []byte) (*ecdsa.PublicKey, error) {
// Sign calculates an ECDSA signature.
//
-// This function is susceptible to choosen plaintext attacks that can leak
+// This function is susceptible to chosen plaintext attacks that can leak
// information about the private key that is used for signing. Callers must
-// be aware that the given hash cannot be choosen by an adversery. Common
+// be aware that the given hash cannot be chosen by an adversery. Common
// solution is to hash any input before calculating the signature.
//
// The produced signature is in the [R || S || V] format where V is 0 or 1.