Browse Source

Merge branch 'patch-17' of https://github.com/blrhc/cjdns into crashey

Caleb James DeLisle 2 years ago
parent
commit
2f4f7b6b9b
1 changed files with 3 additions and 3 deletions
  1. 3 3
      doc/Whitepaper.md

+ 3 - 3
doc/Whitepaper.md

@@ -524,7 +524,7 @@ The Switch Header may be followed by three different types of packets:
   The CryptoAuth handshake packet contains the Session Handle (that should
   The CryptoAuth handshake packet contains the Session Handle (that should
   be used by the recipient to prefix CryptoAuth data packets sent after that),
   be used by the recipient to prefix CryptoAuth data packets sent after that),
   eventually followed by a Switch Data Header.
   eventually followed by a Switch Data Header.
-* Otherwise, these first four bytes are a Session Handle, which the receipient
+* Otherwise, these first four bytes are a Session Handle, which the recipient
   of these packet chose earlier to identify the emitted. They are followed
   of these packet chose earlier to identify the emitted. They are followed
   by a CryptoAuth Data Packet, containing a Switch Data Header.
   by a CryptoAuth Data Packet, containing a Switch Data Header.
 
 
@@ -658,7 +658,7 @@ Possible keys in a router message include:
 * `p` (integer): protocol version. Matches the cjdns version.
 * `p` (integer): protocol version. Matches the cjdns version.
 * `tar` (byte string): the target address. If provided, contains an address
 * `tar` (byte string): the target address. If provided, contains an address
   the sender wants to reach.
   the sender wants to reach.
-* `txid` (byte string): transaction id. Opaque value choosen by senders of
+* `txid` (byte string): transaction id. Opaque value chosen by senders of
   queries, which must be used in responses.
   queries, which must be used in responses.
 
 
 The serialization of each item of the list of nodes `n` is:
 The serialization of each item of the list of nodes `n` is:
@@ -969,7 +969,7 @@ of the hash of the password (counting indexes from 1). This is used as a sort
 of username so that the other end knows which password to try using in the
 of username so that the other end knows which password to try using in the
 handshake.
 handshake.
 
 
-AuthType Two is prefered to this method because it may be harder to crack
+AuthType Two is preferred to this method because it may be harder to crack
 (does not leak bytes of the value computing from the password).
 (does not leak bytes of the value computing from the password).
 
 
 ##### AuthType Two
 ##### AuthType Two