You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -82,7 +82,7 @@ Comprehensive documentation coming, for now these are the main components
82
82
By abuse of the `hmac-secret` extension, we can generate static challenge responses,
83
83
which are scoped to a credential. A use case might be e.g. unlocking a [LUKS-encrypted](https://github.com/saravanan30erd/solokey-full-disk-encryption) drive.
84
84
85
-
**DANGER** The generated reponses depend on both the key and the credential.
85
+
**DANGER** The generated responses depend on both the key and the credential.
86
86
There is no way to extract or backup from the physical key, so if you intend to use the
87
87
"response" as a static password, make sure to store it somewhere separately, e.g. on paper.
88
88
@@ -125,7 +125,7 @@ For maintainers:
125
125
126
126
- adjust `solo/VERSION` file as appropriate
127
127
- add entry or entries to `CHANGELOG.md` (no need to repeat commit messages, but point out major changes
128
-
in such a way that a user of the library has an easy entrypoint to follow development)
128
+
in such a way that a user of the library has an easy entry point to follow development)
129
129
- run `make check` and/or `make fix` to ensure code consistency
130
130
- run `make build` to double check
131
131
- run `make publish` (assumes a `~/.pypirc` file with entry `[pypi]`), or `flit publish` manually
0 commit comments