mirror of
https://github.com/zerotier/ZeroTierOne.git
synced 2025-04-23 15:37:22 +02:00
fix typos in comments
This commit is contained in:
parent
f8351ca47e
commit
40cce9dba6
4 changed files with 5 additions and 5 deletions
|
@ -131,7 +131,7 @@ pub enum Error {
|
|||
/// Packet was not well formed
|
||||
InvalidPacket,
|
||||
|
||||
/// An invalid paramter was supplied to the function
|
||||
/// An invalid parameter was supplied to the function
|
||||
InvalidParameter,
|
||||
|
||||
/// Packet failed one or more authentication (MAC) checks
|
||||
|
@ -212,7 +212,7 @@ pub enum ReceiveResult<'a, H: Host> {
|
|||
/// The session will have already been gated by the accept_new_session() method in the Host trait.
|
||||
OkNewSession(Session<H>),
|
||||
|
||||
/// Packet apperas valid but was ignored e.g. as a duplicate.
|
||||
/// Packet appears valid but was ignored e.g. as a duplicate.
|
||||
Ignored,
|
||||
}
|
||||
|
||||
|
|
|
@ -764,7 +764,7 @@ impl Node {
|
|||
);
|
||||
|
||||
// An 0xff value at byte [8] means this is a ZSSP packet. This is accomplished via the
|
||||
// backward compatibilty hack of always having 0xff at byte [4] of 6-byte session IDs
|
||||
// backward compatibility hack of always having 0xff at byte [4] of 6-byte session IDs
|
||||
// and by having 0xffffffffffff be the "nil" session ID for session init packets. ZSSP
|
||||
// is the new V2 Noise-based forward-secure transport protocol. What follows below this
|
||||
// is legacy handling of the old v1 protocol.
|
||||
|
|
|
@ -67,7 +67,7 @@ impl CertificateOfMembership {
|
|||
q[8] = u64::MAX; // no to_be needed for all-1s
|
||||
|
||||
// This is a fix for a security issue in V1 in which an attacker could (with much CPU use)
|
||||
// duplciate an identity and insert themselves in place of one after 30-60 days when local
|
||||
// duplicate an identity and insert themselves in place of one after 30-60 days when local
|
||||
// identity caches expire. The full hash should have been included from the beginning, and
|
||||
// V2 only ever uses the full hash of the identity to verify credentials.
|
||||
let fp = self.issued_to_fingerprint.as_bytes();
|
||||
|
|
2
third_party/kyber/examples/ake.rs
vendored
2
third_party/kyber/examples/ake.rs
vendored
|
@ -15,7 +15,7 @@ fn main() -> Result<(), KyberError> {
|
|||
// encapsulated shared secret back
|
||||
let server_send = bob.server_receive(client_send, &alice_keys.public, &bob_keys.secret, &mut rng)?;
|
||||
|
||||
// Alice autheticates and decapsulates
|
||||
// Alice authenticates and decapsulates
|
||||
alice.client_confirm(server_send, &alice_keys.secret)?;
|
||||
|
||||
// Both structs now have the shared secret
|
||||
|
|
Loading…
Add table
Reference in a new issue