fix typos in comments

This commit is contained in:
Brenton Bostick 2022-11-28 12:36:51 -05:00
parent f8351ca47e
commit 40cce9dba6
4 changed files with 5 additions and 5 deletions

View file

@ -131,7 +131,7 @@ pub enum Error {
/// Packet was not well formed
InvalidPacket,
/// An invalid paramter was supplied to the function
/// An invalid parameter was supplied to the function
InvalidParameter,
/// Packet failed one or more authentication (MAC) checks
@ -212,7 +212,7 @@ pub enum ReceiveResult<'a, H: Host> {
/// The session will have already been gated by the accept_new_session() method in the Host trait.
OkNewSession(Session<H>),
/// Packet apperas valid but was ignored e.g. as a duplicate.
/// Packet appears valid but was ignored e.g. as a duplicate.
Ignored,
}

View file

@ -764,7 +764,7 @@ impl Node {
);
// An 0xff value at byte [8] means this is a ZSSP packet. This is accomplished via the
// backward compatibilty hack of always having 0xff at byte [4] of 6-byte session IDs
// backward compatibility hack of always having 0xff at byte [4] of 6-byte session IDs
// and by having 0xffffffffffff be the "nil" session ID for session init packets. ZSSP
// is the new V2 Noise-based forward-secure transport protocol. What follows below this
// is legacy handling of the old v1 protocol.

View file

@ -67,7 +67,7 @@ impl CertificateOfMembership {
q[8] = u64::MAX; // no to_be needed for all-1s
// This is a fix for a security issue in V1 in which an attacker could (with much CPU use)
// duplciate an identity and insert themselves in place of one after 30-60 days when local
// duplicate an identity and insert themselves in place of one after 30-60 days when local
// identity caches expire. The full hash should have been included from the beginning, and
// V2 only ever uses the full hash of the identity to verify credentials.
let fp = self.issued_to_fingerprint.as_bytes();

View file

@ -15,7 +15,7 @@ fn main() -> Result<(), KyberError> {
// encapsulated shared secret back
let server_send = bob.server_receive(client_send, &alice_keys.public, &bob_keys.secret, &mut rng)?;
// Alice autheticates and decapsulates
// Alice authenticates and decapsulates
alice.client_confirm(server_send, &alice_keys.secret)?;
// Both structs now have the shared secret