Skip to content

Commit c7bb69a

Browse files
authored
Merge pull request #552 from GuilhemN/master
Fix a few typos in the samples comments Signed-off-by: Zhang Lili Z <lili.z.zhang@intel.com>
2 parents fdc9b33 + 639c2aa commit c7bb69a

File tree

2 files changed

+2
-3
lines changed

2 files changed

+2
-3
lines changed

SampleCode/RemoteAttestation/isv_app/isv_app.cpp

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -287,7 +287,7 @@ int main(int argc, char* argv[])
287287
}
288288
fprintf(OUTPUT, "\nCall sgx_select_att_key_id success.");
289289
}
290-
// Remote attestation will be initiated the ISV server challenges the ISV
290+
// Remote attestation will be initiated if the ISV server challenges the ISV
291291
// app or if the ISV app detects it doesn't have the credentials
292292
// (shared secret) from a previous attestation required for secure
293293
// communication with the server.
@@ -741,4 +741,3 @@ int main(int argc, char* argv[])
741741
getchar();
742742
return ret;
743743
}
744-

SampleCode/RemoteAttestation/isv_enclave/isv_enclave.cpp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@
4343
// attestation secure channel binding. The public EC key should be hardcoded in
4444
// the enclave or delivered in a trustworthy manner. The use of a spoofed public
4545
// EC key in the remote attestation with secure channel binding session may lead
46-
// to a security compromise. Every different SP the enlcave communicates to
46+
// to a security compromise. Every different SP the enclave communicates to
4747
// must have a unique SP public key. Delivery of the SP public key is
4848
// determined by the ISV. The TKE SIGMA protocl expects an Elliptical Curve key
4949
// based on NIST P-256

0 commit comments

Comments
 (0)