Skip to content

Commit 639c2aa

Browse files
committed
Fix typos in sample comments
1 parent fdc9b33 commit 639c2aa

File tree

2 files changed

+2
-3
lines changed

2 files changed

+2
-3
lines changed

SampleCode/RemoteAttestation/isv_app/isv_app.cpp

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -287,7 +287,7 @@ int main(int argc, char* argv[])
287287
}
288288
fprintf(OUTPUT, "\nCall sgx_select_att_key_id success.");
289289
}
290-
// Remote attestation will be initiated the ISV server challenges the ISV
290+
// Remote attestation will be initiated if the ISV server challenges the ISV
291291
// app or if the ISV app detects it doesn't have the credentials
292292
// (shared secret) from a previous attestation required for secure
293293
// communication with the server.
@@ -741,4 +741,3 @@ int main(int argc, char* argv[])
741741
getchar();
742742
return ret;
743743
}
744-

SampleCode/RemoteAttestation/isv_enclave/isv_enclave.cpp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@
4343
// attestation secure channel binding. The public EC key should be hardcoded in
4444
// the enclave or delivered in a trustworthy manner. The use of a spoofed public
4545
// EC key in the remote attestation with secure channel binding session may lead
46-
// to a security compromise. Every different SP the enlcave communicates to
46+
// to a security compromise. Every different SP the enclave communicates to
4747
// must have a unique SP public key. Delivery of the SP public key is
4848
// determined by the ISV. The TKE SIGMA protocl expects an Elliptical Curve key
4949
// based on NIST P-256

0 commit comments

Comments
 (0)