File tree Expand file tree Collapse file tree 1 file changed +3
-3
lines changed Expand file tree Collapse file tree 1 file changed +3
-3
lines changed Original file line number Diff line number Diff line change @@ -1485,8 +1485,8 @@ it in the next step.
1485
1485
2 . Otherwise, recursively search the list of delegations in
1486
1486
order of appearance.
1487
1487
1488
- 1 . Let DELEGATEE denote the current target role TARGETS is
1489
- delegating to.
1488
+ 1 . Let DELEGATOR be the current target role TARGETS and DELEGATEE denote
1489
+ the current target role DELEGATOR is delegating to.
1490
1490
1491
1491
2 . ** Download the DELEGATEE targets metadata file** , up to either
1492
1492
the number of bytes specified in the snapshot metadata file, or some Z
@@ -1509,7 +1509,7 @@ it in the next step.
1509
1509
1510
1510
4 . ** Check for an arbitrary software attack.** The new DELEGATEE
1511
1511
metadata file MUST have been signed by a threshold of keys specified in the
1512
- TARGETS metadata file. If the new DELEGATEE metadata file is not signed
1512
+ DELEGATOR metadata file. If the new DELEGATEE metadata file is not signed
1513
1513
as required, abort the update cycle, and report the failure.
1514
1514
1515
1515
5 . ** Check for a freeze attack.** The latest known time
You can’t perform that action at this time.
0 commit comments