aboutsummaryrefslogtreecommitdiff
path: root/src/secp256k1/examples/ecdh.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/secp256k1/examples/ecdh.c')
-rw-r--r--src/secp256k1/examples/ecdh.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/src/secp256k1/examples/ecdh.c b/src/secp256k1/examples/ecdh.c
index 4b7b7d6154..d71fd2f604 100644
--- a/src/secp256k1/examples/ecdh.c
+++ b/src/secp256k1/examples/ecdh.c
@@ -108,7 +108,7 @@ int main(void) {
/* It's best practice to try to clear secrets from memory after using them.
* This is done because some bugs can allow an attacker to leak memory, for
- * example through "out of bounds" array access (see Heartbleed), Or the OS
+ * example through "out of bounds" array access (see Heartbleed), or the OS
* swapping them to disk. Hence, we overwrite the secret key buffer with zeros.
*
* Here we are preventing these writes from being optimized out, as any good compiler