X-Git-Url: https://git.distorted.org.uk/~mdw/tripe/blobdiff_plain/11ad66c29764521f87f0dd399a1e592147c7af36..23bbe6014c89ed239b25405a8b7a8725413620f7:/server/keyset.c diff --git a/server/keyset.c b/server/keyset.c index a94132b3..881cdd22 100644 --- a/server/keyset.c +++ b/server/keyset.c @@ -219,7 +219,7 @@ void ks_derivekey(octet *k, size_t ksz, const struct rawkey *rk, GH_DESTROY(h); IF_TRACING(T_KEYSET, { IF_TRACING(T_CRYPTO, { char _buf[32]; - sprintf(_buf, "crypto: %s key %s", dir ? "incoming" : "outgoing", what); + sprintf(_buf, "crypto: %s key %s", dir ? "outgoing" : "incoming", what); trace_block(T_CRYPTO, _buf, k, ksz); }) }) } @@ -238,9 +238,8 @@ void ks_derivekey(octet *k, size_t ksz, const struct rawkey *rk, * the key material; between @k + x@ and @k + y@ is `your' * contribution; and between @k + y@ and @k + z@ is a shared * value we made together. These are used to construct two - * pairs of symmetric keys. Each pair consists of an encryption - * key and a message authentication key. One pair is used for - * outgoing messages, the other for incoming messages. + * collections of symmetric keys: one for outgoing messages, the + * other for incoming messages. * * The new key is marked so that it won't be selected for output * by @ksl_encrypt@. You can still encrypt data with it by