We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 2eb1742 commit 00af4deCopy full SHA for 00af4de
src/psbt_io.h
@@ -195,7 +195,7 @@
195
/* Input PSBT/PSET fields that must *not* be present in v2 */
196
#define PSBT_IN_DISALLOWED_V2 ((uint64_t)0)
197
198
-/* Input PSET fields that are trivially mergable, i.e. can be
+/* Input PSET fields that are trivially mergeable, i.e. can be
199
* copied when merging if missing the the destination input. */
200
#define PSET_IN_MERGEABLE (PSET_FT(PSET_IN_ISSUANCE_VALUE_RANGEPROOF) | \
201
PSET_FT(PSET_IN_ISSUANCE_INFLATION_KEYS_RANGEPROOF) | \
src/sign.c
@@ -388,7 +388,7 @@ int wally_ec_sig_from_bytes_aux(const unsigned char *priv_key, size_t priv_key_l
388
389
return WALLY_OK;
390
}
391
- /* Incremement nonce to grind for low-R */
+ /* Increment nonce to grind for low-R */
392
entropy_p = extra_entropy;
393
++counter;
394
uint32_to_le_bytes(counter, entropy_p);
src/test/test_anti_exfil.py
@@ -73,7 +73,7 @@ def test_anti_exfil(self):
73
for args in [
74
(None, 32, msg, 32, entropy, 32, signer_commitment, 33, flags, sig, 64), # Missing pubkey
75
(pub_key, 31, msg, 32, entropy, 32, signer_commitment, 33, flags, sig, 64), # Incorrect pubkey length
76
- (inv_pub, 32, msg, 32, entropy, 32, signer_commitment, 33, flags, sig, 64), # Invalud pubkey
+ (inv_pub, 32, msg, 32, entropy, 32, signer_commitment, 33, flags, sig, 64), # Invalid pubkey
77
(pub_key, 32, None, 32, entropy, 32, signer_commitment, 33, flags, sig, 64), # Missing message
78
(pub_key, 32, msg, 31, entropy, 32, signer_commitment, 33, flags, sig, 64), # Incorrect message length
79
(pub_key, 32, inv_msg, 32, entropy, 32, signer_commitment, 33, flags, sig, 64), # Invalid message
src/test/test_sign.py
@@ -279,7 +279,7 @@ def test_recoverable_sig(self):
279
280
281
(None, 32, out1, 65, pub_key, 33), # Missing message
282
- (msg, 31, out1, 65, pub_key, 33), # Incorrect messsage length
+ (msg, 31, out1, 65, pub_key, 33), # Incorrect message length
283
(msg, 32, None, 65, pub_key, 33), # Missing signature
284
(msg, 32, out1, 64, pub_key, 33), # Incorrect signature length
285
(msg, 32, out1, 65, None, 33), # Missing pubkey
src/tx_io.c
@@ -775,7 +775,7 @@ static void txio_bip341_init(cursor_io *io,
775
const struct wally_map_item *item = NULL;
776
item = wally_map_get_integer(io->cache, TXIO_SHA_TAPSIGHASH_CTX);
777
if (item) {
778
- /* Note we cached the intial sha256_ctx itself here and so memcpy it */
+ /* Note we cached the initial sha256_ctx itself here and so memcpy it */
779
memcpy(&io->ctx, item->value, item->value_len);
780
return;
781
0 commit comments