aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorConstanza Heath <[email protected]>2015-08-28 16:15:04 -0700
committerConstanza Heath <[email protected]>2015-08-28 16:15:04 -0700
commit397e7d4a140373c5e21de9b3cd2867889f989fc6 (patch)
tree27baea70bacbb0b0fa162e259c151abb47fdef38
parente100a0dbbc5abd2ccdbfe56b3d4e2cb3a47c841f (diff)
Remove whitespace
Signed-off-by: Constanza Heath <[email protected]>
-rw-r--r--lib/hmac_prng.h18
-rw-r--r--lib/sha256.c2
2 files changed, 10 insertions, 10 deletions
diff --git a/lib/hmac_prng.h b/lib/hmac_prng.h
index 7e33242..e138237 100644
--- a/lib/hmac_prng.h
+++ b/lib/hmac_prng.h
@@ -31,17 +31,17 @@
* hmac_prng.h -- Interface to an HMAC-PRNG implementation.
*
* Overview: A pseudo-random number generator (PRNG) generates a sequence
- * of numbers that have a distribution close to the one expected
- * for a sequence of truly random numbers. The NIST Special
- * Publication 800-90A specifies several mechanisms to generate
- * sequences of pseudo random numbers, including the HMAC-PRNG one
- * which is based on HMAC. TinyCrypt implements HMAC-PRNG with
- * certain modifications from the NIST SP 800-90A spec.
+ * of numbers that have a distribution close to the one expected
+ * for a sequence of truly random numbers. The NIST Special
+ * Publication 800-90A specifies several mechanisms to generate
+ * sequences of pseudo random numbers, including the HMAC-PRNG one
+ * which is based on HMAC. TinyCrypt implements HMAC-PRNG with
+ * certain modifications from the NIST SP 800-90A spec.
*
* Security: A cryptographically secure PRNG depends on the existence of an
- * entropy source to provide a truly random seed as well as the
- * security of the primitives used as the building blocks (HMAC and
- * SHA256, for TinyCrypt).
+ * entropy source to provide a truly random seed as well as the
+ * security of the primitives used as the building blocks (HMAC and
+ * SHA256, for TinyCrypt).
*
* The NIST SP 800-90A standard tolerates a null personalization,
* while TinyCrypt requires a non-null personalization. This is
diff --git a/lib/sha256.c b/lib/sha256.c
index bd9e25b..1a8454e 100644
--- a/lib/sha256.c
+++ b/lib/sha256.c
@@ -134,7 +134,7 @@ int32_t tc_sha256_final (uint8_t *digest, TCSha256State_t s) {
}
/* Initializing SHA-256 Hash constant words K.
- These values correspond to the first 32 bits of the fractional parts of the
+ These values correspond to the first 32 bits of the fractional parts of the
cube roots of the first 64 primes between 2 and 311. */
static const uint32_t k256[64] = {
0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5, 0x3956c25b, 0x59f111f1,