Skip to content

Commit 04ebc96

Browse files
Merge pull request #7385 from philljj/spelling_cleanup
Used codespell and fixed obvious typos.
2 parents ed4f052 + b65e42b commit 04ebc96

13 files changed

Lines changed: 20 additions & 20 deletions

File tree

tests/api.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1156,7 +1156,7 @@ static int test_dual_alg_support(void)
11561156
SSL_FILETYPE_ASN1), WOLFSSL_SUCCESS);
11571157
ExpectIntEQ(wolfSSL_CertManagerVerifyBuffer(cm, server, serverSz,
11581158
SSL_FILETYPE_ASN1), WOLFSSL_SUCCESS);
1159-
/* There is only 1 unknown exension (1.2.3.4.5). The other ones are known
1159+
/* There is only 1 unknown extension (1.2.3.4.5). The other ones are known
11601160
* because they are for the dual alg extensions. */
11611161
ExpectIntEQ(extCount, 1);
11621162
wolfSSL_CertManagerFree(cm);

wolfcrypt/benchmark/benchmark.c

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1378,9 +1378,9 @@ static const char* bench_result_words3[][5] = {
13781378
/* unsigned int max = 4,294,967,295 */
13791379
uint64_t thisVal = 0; /* CPU counter, "this current value" as read. */
13801380
uint64_t thisIncrement = 0; /* The adjusted increment amount. */
1381-
uint64_t expected_diff = 0; /* FreeRTOS esimated expected CPU diff. */
1381+
uint64_t expected_diff = 0; /* FreeRTOS estimated expected CPU diff.*/
13821382
#ifdef DEBUG_WOLFSSL_BENCHMARK_TIMING
1383-
uint32_t tickCount = 0; /* Currrent rtos tick counter. */
1383+
uint32_t tickCount = 0; /* Current rtos tick counter. */
13841384
uint32_t tickDiff = 0; /* Tick difference from last check. */
13851385
uint32_t tickBeginDiff = 0; /* Tick difference from beginning. */
13861386
#endif
@@ -1459,7 +1459,7 @@ static const char* bench_result_words3[][5] = {
14591459
if (expected_diff > UINT_MAX) {
14601460
/* The number of cycles expected from FreeRTOS ticks is
14611461
* greater than the maximum size of an unsigned 32-bit
1462-
* integer, meaning multiple overflows occured. */
1462+
* integer, meaning multiple overflows occurred. */
14631463
#ifdef DEBUG_WOLFSSL_BENCHMARK_TIMING
14641464
ESP_LOGW(TAG, "expected_diff > UINT_MAX (%u)", UINT_MAX);
14651465
#endif
@@ -1538,7 +1538,7 @@ static const char* bench_result_words3[][5] = {
15381538
_esp_cpu_count_last = esp_cpu_get_cycle_count();
15391539
#else
15401540
/* TODO: Why doesn't esp_cpu_get_cycle_count work for Xtensa
1541-
* when resetting CPU cycle counter? FreeRTOS tick collison?
1541+
* when resetting CPU cycle counter? FreeRTOS tick collision?
15421542
* thisVal = esp_cpu_get_cycle_count(); See also, above
15431543
* or thisVal = xthal_get_ccount(); */
15441544
#if ESP_IDF_VERSION_MAJOR < 5

wolfcrypt/src/dilithium.c

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -290,7 +290,7 @@ int wc_dilithium_init_id(dilithium_key* key, const unsigned char* id, int len,
290290
key->idLen = len;
291291
}
292292

293-
/* Set the maxiumum level here */
293+
/* Set the maximum level here */
294294
wc_dilithium_set_level(key, 5);
295295

296296
return ret;
@@ -317,7 +317,7 @@ int wc_dilithium_init_label(dilithium_key* key, const char* label, void* heap,
317317
key->labelLen = labelLen;
318318
}
319319

320-
/* Set the maxiumum level here */
320+
/* Set the maximum level here */
321321
wc_dilithium_set_level(key, 5);
322322

323323
return ret;

wolfcrypt/src/falcon.c

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -282,7 +282,7 @@ int wc_falcon_init_id(falcon_key* key, const unsigned char* id, int len,
282282
key->idLen = len;
283283
}
284284

285-
/* Set the maxiumum level here */
285+
/* Set the maximum level here */
286286
wc_falcon_set_level(key, 5);
287287

288288
return ret;
@@ -309,7 +309,7 @@ int wc_falcon_init_label(falcon_key* key, const char* label, void* heap,
309309
key->labelLen = labelLen;
310310
}
311311

312-
/* Set the maxiumum level here */
312+
/* Set the maximum level here */
313313
wc_falcon_set_level(key, 5);
314314

315315
return ret;

wolfcrypt/src/pkcs7.c

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2517,7 +2517,7 @@ static int wc_PKCS7_EncodeContentStreamHelper(PKCS7* pkcs7, int cipherType,
25172517
}
25182518

25192519

2520-
/* Used for encoding the content, potentially one octet chunck at a time if
2520+
/* Used for encoding the content, potentially one octet chunk at a time if
25212521
* in streaming mode with IO callbacks set.
25222522
* Can handle the cipher types:
25232523
* - WC_CIPHER_NONE, used for encoding signed bundle where no encryption is
@@ -9746,7 +9746,7 @@ int wc_PKCS7_EncodeEnvelopedData(PKCS7* pkcs7, byte* output, word32 outputSz)
97469746
StreamOctetString(NULL, encryptedOutSz, NULL, &streamSz, &tmpIdx);
97479747
totalSz += (streamSz - encryptedOutSz);
97489748

9749-
/* resize encrytped content buffer */
9749+
/* resize encrypted content buffer */
97509750
if (encryptedContent != NULL) {
97519751
XFREE(encryptedContent, pkcs7->heap, DYNAMIC_TYPE_PKCS7);
97529752
encryptedContent = (byte*)XMALLOC(streamSz, pkcs7->heap,

wolfcrypt/src/port/Espressif/esp32_mp.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -413,7 +413,7 @@ static int esp_mp_hw_lock(void)
413413
{
414414
/* Note these names are different from those in the documentation!
415415
*
416-
* Documenation lists the same names as the ESP32-C3:
416+
* Documentation lists the same names as the ESP32-C3:
417417
*
418418
* DPORT_REG_SET_BIT((volatile void *)(SYSTEM_PERIP_CLK_EN1_REG),
419419
* SYSTEM_CRYPTO_RSA_CLK_EN );

wolfcrypt/src/port/Espressif/esp32_sha.c

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -128,7 +128,7 @@ static const char* TAG = "wolf_hw_sha";
128128
#ifdef WOLFSSL_DEBUG_MUTEX
129129
static portMUX_TYPE sha_crit_sect = portMUX_INITIALIZER_UNLOCKED;
130130
WC_ESP32SHA* stray_ctx;
131-
/* each ctx keeps track of the intializer for HW. when debugging
131+
/* each ctx keeps track of the initializer for HW. when debugging
132132
* we'll have a global variable to indicate which has the lock. */
133133
static int _sha_lock_count = 0;
134134
static int _sha_call_count = 0;
@@ -1130,7 +1130,7 @@ int esp_sha_release_unfinished_lock(WC_ESP32SHA* ctx)
11301130
#ifdef WOLFSSL_DEBUG_MUTEX
11311131
ESP_LOGE(TAG, "\n>>>> esp_sha_release_unfinished_lock %x\n", ret);
11321132
#endif
1133-
/* unlock only if this ctx is the intializer of the lock */
1133+
/* unlock only if this ctx is the initializer of the lock */
11341134
#ifdef SINGLE_THREADED
11351135
{
11361136
ret = esp_sha_hw_unlock(ctx);

wolfcrypt/src/port/Espressif/esp32_util.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ static int esp_ShowMacroStatus_need_header = 0;
7676
#include <wolfssl/wolfcrypt/error-crypt.h>
7777
#include <wolfssl/wolfcrypt/logging.h>
7878

79-
/* big nums can be very long, perhaps unitialized, so limit displayed words */
79+
/* big nums can be very long, perhaps uninitialized, so limit displayed words */
8080
#define MAX_WORDS_ESP_SHOW_MP 32
8181

8282
/*

wolfcrypt/src/port/autosar/crypto.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -431,7 +431,7 @@ Std_ReturnType Crypto_ProcessJob(uint32 objectId, Crypto_JobType* job)
431431
break;
432432

433433
default:
434-
WOLFSSL_MSG("Unsuported Crypto service");
434+
WOLFSSL_MSG("Unsupported Crypto service");
435435
ret = E_NOT_OK;
436436
break;
437437
}

wolfcrypt/src/port/liboqs/liboqs.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ static void wolfSSL_liboqsGetRandomData(uint8_t* buffer, size_t numOfBytes)
6060
ret = wc_RNG_GenerateBlock(liboqsCurrentRNG, buffer,
6161
numOfBytes_word32);
6262
if (ret != 0) {
63-
/* ToDo: liboqs exits programm if RNG fails,
63+
/* ToDo: liboqs exits program if RNG fails,
6464
* not sure what to do here
6565
*/
6666
WOLFSSL_MSG_EX(

0 commit comments

Comments
 (0)