From 2aeff4c62f7b1aaf0161bd5868a41ec35bb10978 Mon Sep 17 00:00:00 2001 From: Andrew Poelstra Date: Tue, 24 Jul 2018 21:16:52 +0000 Subject: [PATCH] fix typos --- README.md | 2 +- src/lib.rs | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index 93648e1..8a04f9d 100644 --- a/README.md +++ b/README.md @@ -3,7 +3,7 @@ ### rust-secp256k1 `rust-secp256k1` is a wrapper around ![libsecp256k1](https://github.com/bitcoin-core/secp256k1), -a C library by Peter Wuille for producing ECDSA signatures using the SECG curve +a C library by Pieter Wuille for producing ECDSA signatures using the SECG curve `secp256k1`. This library * exposes type-safe Rust bindings for all `libsecp256k1` functions * implements key generation diff --git a/src/lib.rs b/src/lib.rs index b9ae6ab..187054f 100644 --- a/src/lib.rs +++ b/src/lib.rs @@ -456,7 +456,7 @@ impl Secp256k1 { impl Secp256k1 { - /// (Re)randomizes the Secp256k1 context for cheap sidechannel resistence; + /// (Re)randomizes the Secp256k1 context for cheap sidechannel resistance; /// see comment in libsecp256k1 commit d2275795f by Gregory Maxwell #[cfg(any(test, feature = "rand"))] pub fn randomize(&mut self, rng: &mut R) { @@ -467,7 +467,7 @@ impl Secp256k1 { // This function cannot fail; it has an error return for future-proofing. // We do not expose this error since it is impossible to hit, and we have // precedent for not exposing impossible errors (for example in - // `PublicKey::from_secret_key` where it is impossble to create an invalid + // `PublicKey::from_secret_key` where it is impossible to create an invalid // secret key through the API.) // However, if this DOES fail, the result is potentially weaker side-channel // resistance, which is deadly and undetectable, so we take out the entire