about summary refs log tree commit diff
path: root/library/std/src/sys/random/linux.rs
diff options
context:
space:
mode:
authorbors <bors@rust-lang.org>2024-10-25 21:01:03 +0000
committerbors <bors@rust-lang.org>2024-10-25 21:01:03 +0000
commitc1db4dc24267a707409c9bf2e67cf3c7323975c8 (patch)
tree01af826253af9b474b7af04fc091d11df77915cc /library/std/src/sys/random/linux.rs
parentb188577f14fd238ca8568276baabd461a174038d (diff)
parent4f2e9c5284abf541f61ec0399cf20c0d143ae284 (diff)
downloadrust-c1db4dc24267a707409c9bf2e67cf3c7323975c8.tar.gz
rust-c1db4dc24267a707409c9bf2e67cf3c7323975c8.zip
Auto merge of #132148 - matthiaskrgr:rollup-c155tcy, r=matthiaskrgr
Rollup of 3 pull requests

Successful merges:

 - #132106 (Pass Ident by reference in ast Visitor)
 - #132130 (remove `change-id` from CI script)
 - #132137 (library: consistently use American spelling for 'behavior')

r? `@ghost`
`@rustbot` modify labels: rollup
Diffstat (limited to 'library/std/src/sys/random/linux.rs')
-rw-r--r--library/std/src/sys/random/linux.rs4
1 files changed, 2 insertions, 2 deletions
diff --git a/library/std/src/sys/random/linux.rs b/library/std/src/sys/random/linux.rs
index 073fdc45e61..e3cb79285cd 100644
--- a/library/std/src/sys/random/linux.rs
+++ b/library/std/src/sys/random/linux.rs
@@ -30,7 +30,7 @@
 //! data the system has available at the time.
 //!
 //! So in conclusion, we always want the output of the non-blocking pool, but
-//! may need to wait until it is initalized. The default behaviour of `getrandom`
+//! may need to wait until it is initalized. The default behavior of `getrandom`
 //! is to wait until the non-blocking pool is initialized and then draw from there,
 //! so if `getrandom` is available, we use its default to generate the bytes. For
 //! `HashMap`, however, we need to specify the `GRND_INSECURE` flags, but that
@@ -39,7 +39,7 @@
 //! succeed if the pool is initialized. If it isn't, we fall back to the file
 //! access method.
 //!
-//! The behaviour of `/dev/urandom` is inverse to that of `getrandom`: it always
+//! The behavior of `/dev/urandom` is inverse to that of `getrandom`: it always
 //! yields data, even when the pool is not initialized. For generating `HashMap`
 //! keys, this is not important, so we can use it directly. For secure data
 //! however, we need to wait until initialization, which we can do by `poll`ing