diff --git a/changelogs/client_server/newsfragments/2594.clarification b/changelogs/client_server/newsfragments/2594.clarification new file mode 100644 index 000000000..3ccb23339 --- /dev/null +++ b/changelogs/client_server/newsfragments/2594.clarification @@ -0,0 +1 @@ +Fix various typos throughout the specification. diff --git a/specification/modules/end_to_end_encryption.rst b/specification/modules/end_to_end_encryption.rst index 8bc46de87..a357944b9 100644 --- a/specification/modules/end_to_end_encryption.rst +++ b/specification/modules/end_to_end_encryption.rst @@ -587,7 +587,7 @@ The process between Alice and Bob verifying each other would be: the same for Bob's device keys and key IDs concurrently with Alice. #. When the other device receives the ``m.key.verification.mac`` message, the device calculates the HMAC of its copies of the other device's keys given in the message, - as well as the HMAC of the comma-seperated, sorted, list of key IDs in the message. + as well as the HMAC of the comma-separated, sorted, list of key IDs in the message. The device compares these with the HMAC values given in the message, and if everything matches then the device keys are verified.