mirror of
https://github.com/golang/go.git
synced 2025-10-19 11:03:18 +00:00
src/crypto: standardize and fix spelling in Go files
receipient -> recipient
This commit is contained in:
parent
dceb77a336
commit
0ed5ff7a46
4 changed files with 11 additions and 11 deletions
|
@ -144,7 +144,7 @@ type Sender struct {
|
|||
*context
|
||||
}
|
||||
|
||||
type Receipient struct {
|
||||
type Recipient struct {
|
||||
*context
|
||||
}
|
||||
|
||||
|
@ -259,7 +259,7 @@ func SetupSender(kemID, kdfID, aeadID uint16, pub *ecdh.PublicKey, info []byte)
|
|||
return encapsulatedKey, &Sender{context}, nil
|
||||
}
|
||||
|
||||
func SetupReceipient(kemID, kdfID, aeadID uint16, priv *ecdh.PrivateKey, info, encPubEph []byte) (*Receipient, error) {
|
||||
func SetupRecipient(kemID, kdfID, aeadID uint16, priv *ecdh.PrivateKey, info, encPubEph []byte) (*Recipient, error) {
|
||||
kem, err := newDHKem(kemID)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
|
@ -274,7 +274,7 @@ func SetupReceipient(kemID, kdfID, aeadID uint16, priv *ecdh.PrivateKey, info, e
|
|||
return nil, err
|
||||
}
|
||||
|
||||
return &Receipient{context}, nil
|
||||
return &Recipient{context}, nil
|
||||
}
|
||||
|
||||
func (ctx *context) nextNonce() []byte {
|
||||
|
@ -300,7 +300,7 @@ func (s *Sender) Seal(aad, plaintext []byte) ([]byte, error) {
|
|||
return ciphertext, nil
|
||||
}
|
||||
|
||||
func (r *Receipient) Open(aad, ciphertext []byte) ([]byte, error) {
|
||||
func (r *Recipient) Open(aad, ciphertext []byte) ([]byte, error) {
|
||||
plaintext, err := r.aead.Open(nil, r.nextNonce(), ciphertext, aad)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
|
|
|
@ -126,7 +126,7 @@ func TestRFC9180Vectors(t *testing.T) {
|
|||
t.Fatal(err)
|
||||
}
|
||||
|
||||
receipient, err := SetupReceipient(
|
||||
recipient, err := SetupRecipient(
|
||||
uint16(kemID),
|
||||
uint16(kdfID),
|
||||
uint16(aeadID),
|
||||
|
@ -138,7 +138,7 @@ func TestRFC9180Vectors(t *testing.T) {
|
|||
t.Fatal(err)
|
||||
}
|
||||
|
||||
for _, ctx := range []*context{sender.context, receipient.context} {
|
||||
for _, ctx := range []*context{sender.context, recipient.context} {
|
||||
expectedSharedSecret := mustDecodeHex(t, setup["shared_secret"])
|
||||
if !bytes.Equal(ctx.sharedSecret, expectedSharedSecret) {
|
||||
t.Errorf("unexpected shared secret, got: %x, want %x", ctx.sharedSecret, expectedSharedSecret)
|
||||
|
@ -164,7 +164,7 @@ func TestRFC9180Vectors(t *testing.T) {
|
|||
t.Fatal(err)
|
||||
}
|
||||
sender.seqNum = uint128{lo: uint64(seqNum)}
|
||||
receipient.seqNum = uint128{lo: uint64(seqNum)}
|
||||
recipient.seqNum = uint128{lo: uint64(seqNum)}
|
||||
expectedNonce := mustDecodeHex(t, enc["nonce"])
|
||||
computedNonce := sender.nextNonce()
|
||||
if !bytes.Equal(computedNonce, expectedNonce) {
|
||||
|
@ -181,7 +181,7 @@ func TestRFC9180Vectors(t *testing.T) {
|
|||
}
|
||||
|
||||
expectedPlaintext := mustDecodeHex(t, enc["pt"])
|
||||
plaintext, err := receipient.Open(mustDecodeHex(t, enc["aad"]), mustDecodeHex(t, enc["ct"]))
|
||||
plaintext, err := recipient.Open(mustDecodeHex(t, enc["aad"]), mustDecodeHex(t, enc["ct"]))
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
|
|
@ -419,7 +419,7 @@ func decodeInnerClientHello(outer *clientHelloMsg, encoded []byte) (*clientHello
|
|||
return inner, nil
|
||||
}
|
||||
|
||||
func decryptECHPayload(context *hpke.Receipient, hello, payload []byte) ([]byte, error) {
|
||||
func decryptECHPayload(context *hpke.Recipient, hello, payload []byte) ([]byte, error) {
|
||||
outerAAD := bytes.Replace(hello[4:], payload, make([]byte, len(payload)), 1)
|
||||
return context.Open(outerAAD, payload)
|
||||
}
|
||||
|
@ -613,7 +613,7 @@ func (c *Conn) processECHClientHello(outer *clientHelloMsg) (*clientHelloMsg, *e
|
|||
return nil, nil, fmt.Errorf("tls: invalid EncryptedClientHelloKeys PrivateKey: %s", err)
|
||||
}
|
||||
info := append([]byte("tls ech\x00"), echKey.Config...)
|
||||
hpkeContext, err := hpke.SetupReceipient(hpke.DHKEM_X25519_HKDF_SHA256, echCiphersuite.KDFID, echCiphersuite.AEADID, echPriv, info, encap)
|
||||
hpkeContext, err := hpke.SetupRecipient(hpke.DHKEM_X25519_HKDF_SHA256, echCiphersuite.KDFID, echCiphersuite.AEADID, echPriv, info, encap)
|
||||
if err != nil {
|
||||
// attempt next trial decryption
|
||||
continue
|
||||
|
|
|
@ -30,7 +30,7 @@ import (
|
|||
const maxClientPSKIdentities = 5
|
||||
|
||||
type echServerContext struct {
|
||||
hpkeContext *hpke.Receipient
|
||||
hpkeContext *hpke.Recipient
|
||||
configID uint8
|
||||
ciphersuite echCipher
|
||||
transcript hash.Hash
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue