summaryrefslogtreecommitdiff
path: root/lib/auth/rsa.c
diff options
context:
space:
mode:
Diffstat (limited to 'lib/auth/rsa.c')
-rw-r--r--lib/auth/rsa.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/lib/auth/rsa.c b/lib/auth/rsa.c
index c2203c7ed3..d5d0943242 100644
--- a/lib/auth/rsa.c
+++ b/lib/auth/rsa.c
@@ -92,7 +92,7 @@ int check_key_usage_for_enc(gnutls_session_t session, unsigned key_usage)
* server. Therefore the correct cert type needs to be retrieved to be
* used for the _gnutls_get_auth_info_pcert call. If this
* function is to be called on the server side in the future, extra
- * checks need to be build in order to retrieve te correct
+ * checks need to be build in order to retrieve the correct
* certificate type.
*/
int
@@ -213,12 +213,12 @@ proc_rsa_client_kx(gnutls_session_t session, uint8_t * data,
session->key.key.size);
/* After this point, any conditional on failure that cause differences
* in execution may create a timing or cache access pattern side
- * channel that can be used as an oracle, so tread very carefully */
+ * channel that can be used as an oracle, so treat very carefully */
/* Error handling logic:
* In case decryption fails then don't inform the peer. Just use the
* random key previously generated. (in order to avoid attack against
- * pkcs-1 formating).
+ * pkcs-1 formatting).
*
* If we get version mismatches no error is returned either. We
* proceed normally. This is to defend against the attack described