From c02ca21a94e93570dcfad0b50d25c6681a1013b3 Mon Sep 17 00:00:00 2001 From: Dominic Fischer Date: Mon, 1 Jun 2020 17:32:10 +0100 Subject: [PATCH] Fix Typo --- specification/modules/end_to_end_encryption.rst | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/specification/modules/end_to_end_encryption.rst b/specification/modules/end_to_end_encryption.rst index 8bc46de8..a357944b 100644 --- a/specification/modules/end_to_end_encryption.rst +++ b/specification/modules/end_to_end_encryption.rst @@ -587,7 +587,7 @@ The process between Alice and Bob verifying each other would be: the same for Bob's device keys and key IDs concurrently with Alice. #. When the other device receives the ``m.key.verification.mac`` message, the device calculates the HMAC of its copies of the other device's keys given in the message, - as well as the HMAC of the comma-seperated, sorted, list of key IDs in the message. + as well as the HMAC of the comma-separated, sorted, list of key IDs in the message. The device compares these with the HMAC values given in the message, and if everything matches then the device keys are verified.