diff --git a/src/bundle.rs b/src/bundle.rs index fab0c700e..98c1bd49b 100644 --- a/src/bundle.rs +++ b/src/bundle.rs @@ -111,7 +111,7 @@ impl Flags { /// /// [txencoding]: https://zips.z.cash/protocol/protocol.pdf#txnencoding pub fn from_byte(value: u8) -> Option { - // TCR:bad-txns-v5-reserved-bits-nonzero + // https://p.z.cash/TCR:bad-txns-v5-reserved-bits-nonzero if value & FLAGS_EXPECTED_UNSET == 0 { Some(Self::from_parts( value & FLAG_SPENDS_ENABLED != 0, @@ -372,7 +372,7 @@ impl> Bundle { /// This can be used to validate the [`Authorized::binding_signature`] returned from /// [`Bundle::authorization`]. pub fn binding_validating_key(&self) -> redpallas::VerificationKey { - // *TCR:bad-txns-orchard-binding-signature-invalid + // https://p.z.cash/TCR:bad-txns-orchard-binding-signature-invalid?partial (self .actions .iter() diff --git a/src/bundle/batch.rs b/src/bundle/batch.rs index b41a96fd0..6626b9162 100644 --- a/src/bundle/batch.rs +++ b/src/bundle/batch.rs @@ -67,7 +67,7 @@ impl BatchValidator { /// figure out which of the accumulated bundles might be invalid; if that information /// is desired, construct separate [`BatchValidator`]s for sub-batches of the bundles. pub fn validate(self, vk: &VerifyingKey, rng: R) -> bool { - // *TCR:bad-txns-orchard-binding-signature-invalid + // https://p.z.cash/TCR:bad-txns-orchard-binding-signature-invalid?partial if self.signatures.is_empty() { // An empty batch is always valid, but is not free to run; skip it.