diff options
Diffstat (limited to 'lib/auth/rsa.c')
-rw-r--r-- | lib/auth/rsa.c | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/lib/auth/rsa.c b/lib/auth/rsa.c index c2203c7ed3..d5d0943242 100644 --- a/lib/auth/rsa.c +++ b/lib/auth/rsa.c @@ -92,7 +92,7 @@ int check_key_usage_for_enc(gnutls_session_t session, unsigned key_usage) * server. Therefore the correct cert type needs to be retrieved to be * used for the _gnutls_get_auth_info_pcert call. If this * function is to be called on the server side in the future, extra - * checks need to be build in order to retrieve te correct + * checks need to be build in order to retrieve the correct * certificate type. */ int @@ -213,12 +213,12 @@ proc_rsa_client_kx(gnutls_session_t session, uint8_t * data, session->key.key.size); /* After this point, any conditional on failure that cause differences * in execution may create a timing or cache access pattern side - * channel that can be used as an oracle, so tread very carefully */ + * channel that can be used as an oracle, so treat very carefully */ /* Error handling logic: * In case decryption fails then don't inform the peer. Just use the * random key previously generated. (in order to avoid attack against - * pkcs-1 formating). + * pkcs-1 formatting). * * If we get version mismatches no error is returned either. We * proceed normally. This is to defend against the attack described |