Skip to content

Commit

Permalink
examples: fix case typos in secret clearing paragraphs (s/, Or/, or/)
Browse files Browse the repository at this point in the history
  • Loading branch information
theStack committed Jun 25, 2024
1 parent f473c95 commit fe4fbaa
Show file tree
Hide file tree
Showing 3 changed files with 3 additions and 3 deletions.
2 changes: 1 addition & 1 deletion examples/ecdh.c
Original file line number Diff line number Diff line change
Expand Up @@ -108,7 +108,7 @@ int main(void) {

/* It's best practice to try to clear secrets from memory after using them.
* This is done because some bugs can allow an attacker to leak memory, for
* example through "out of bounds" array access (see Heartbleed), Or the OS
* example through "out of bounds" array access (see Heartbleed), or the OS
* swapping them to disk. Hence, we overwrite the secret key buffer with zeros.
*
* Here we are preventing these writes from being optimized out, as any good compiler
Expand Down
2 changes: 1 addition & 1 deletion examples/ecdsa.c
Original file line number Diff line number Diff line change
Expand Up @@ -128,7 +128,7 @@ int main(void) {

/* It's best practice to try to clear secrets from memory after using them.
* This is done because some bugs can allow an attacker to leak memory, for
* example through "out of bounds" array access (see Heartbleed), Or the OS
* example through "out of bounds" array access (see Heartbleed), or the OS
* swapping them to disk. Hence, we overwrite the secret key buffer with zeros.
*
* Here we are preventing these writes from being optimized out, as any good compiler
Expand Down
2 changes: 1 addition & 1 deletion examples/schnorr.c
Original file line number Diff line number Diff line change
Expand Up @@ -146,7 +146,7 @@ int main(void) {

/* It's best practice to try to clear secrets from memory after using them.
* This is done because some bugs can allow an attacker to leak memory, for
* example through "out of bounds" array access (see Heartbleed), Or the OS
* example through "out of bounds" array access (see Heartbleed), or the OS
* swapping them to disk. Hence, we overwrite the secret key buffer with zeros.
*
* Here we are preventing these writes from being optimized out, as any good compiler
Expand Down

0 comments on commit fe4fbaa

Please sign in to comment.