Merge pull request #6565

72cdfa4a2 fix a few typos in error messages (moneromooo-monero)
This commit is contained in:
Alexander Blair 2020-07-19 03:40:19 -07:00
commit 9871fefbf9
No known key found for this signature in database
GPG key ID: C64552D877C32479
3 changed files with 6 additions and 6 deletions

View file

@ -511,7 +511,7 @@ bool ssl_options_t::handshake(
// autodetect will reconnect without SSL - warn and keep connection encrypted // autodetect will reconnect without SSL - warn and keep connection encrypted
if (support != ssl_support_t::e_ssl_support_autodetect) if (support != ssl_support_t::e_ssl_support_autodetect)
{ {
MERROR("SSL certificate is not in the allowed list, connection droppped"); MERROR("SSL certificate is not in the allowed list, connection dropped");
return false; return false;
} }
MWARNING("SSL peer has not been verified"); MWARNING("SSL peer has not been verified");

View file

@ -4115,7 +4115,7 @@ void BlockchainLMDB::get_output_tx_and_index_from_global(const std::vector<uint6
void BlockchainLMDB::get_output_key(const epee::span<const uint64_t> &amounts, const std::vector<uint64_t> &offsets, std::vector<output_data_t> &outputs, bool allow_partial) const void BlockchainLMDB::get_output_key(const epee::span<const uint64_t> &amounts, const std::vector<uint64_t> &offsets, std::vector<output_data_t> &outputs, bool allow_partial) const
{ {
if (amounts.size() != 1 && amounts.size() != offsets.size()) if (amounts.size() != 1 && amounts.size() != offsets.size())
throw0(DB_ERROR("Invalid sizes of amounts and offets")); throw0(DB_ERROR("Invalid sizes of amounts and offsets"));
LOG_PRINT_L3("BlockchainLMDB::" << __func__); LOG_PRINT_L3("BlockchainLMDB::" << __func__);
TIME_MEASURE_START(db3); TIME_MEASURE_START(db3);

View file

@ -1108,7 +1108,7 @@ namespace hw {
for(size_t n=0; n < additional_derivations.size();++n) { for(size_t n=0; n < additional_derivations.size();++n) {
if(derivation == additional_derivations[n]) { if(derivation == additional_derivations[n]) {
pkey = &additional_tx_pub_keys[n]; pkey = &additional_tx_pub_keys[n];
MDEBUG("conceal derivation with additionnal tx pub key"); MDEBUG("conceal derivation with additional tx pub key");
break; break;
} }
} }
@ -1640,20 +1640,20 @@ namespace hw {
//if (tx_version > 1) //if (tx_version > 1)
{ {
ASSERT_X(recv_len>=32, "Not enought data from device"); ASSERT_X(recv_len>=32, "Not enough data from device");
crypto::secret_key scalar1; crypto::secret_key scalar1;
this->receive_secret((unsigned char*)scalar1.data, offset); this->receive_secret((unsigned char*)scalar1.data, offset);
amount_keys.push_back(rct::sk2rct(scalar1)); amount_keys.push_back(rct::sk2rct(scalar1));
recv_len -= 32; recv_len -= 32;
} }
ASSERT_X(recv_len>=32, "Not enought data from device"); ASSERT_X(recv_len>=32, "Not enough data from device");
memmove(out_eph_public_key.data, &this->buffer_recv[offset], 32); memmove(out_eph_public_key.data, &this->buffer_recv[offset], 32);
recv_len -= 32; recv_len -= 32;
offset += 32; offset += 32;
if (need_additional_txkeys) if (need_additional_txkeys)
{ {
ASSERT_X(recv_len>=32, "Not enought data from device"); ASSERT_X(recv_len>=32, "Not enough data from device");
memmove(additional_txkey.pub.data, &this->buffer_recv[offset], 32); memmove(additional_txkey.pub.data, &this->buffer_recv[offset], 32);
additional_tx_public_keys.push_back(additional_txkey.pub); additional_tx_public_keys.push_back(additional_txkey.pub);
offset += 32; offset += 32;