Skip to content

Commit 106a065

Browse files
Merge pull request #6660 from DimitriPapadopoulos/codespell
Fix residual typos found by codespell
2 parents 5043ece + 1b10fb5 commit 106a065

5 files changed

Lines changed: 46 additions & 46 deletions

File tree

ChangeLog.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3255,7 +3255,7 @@ More info can be found on-line at //http://wolfssl.com/yaSSL/Docs.html
32553255
a) If using wolfSSL for DTLS on the server side of a publicly accessible
32563256
machine you MUST update.
32573257
b) If using wolfSSL for TLS on the server side with private RSA keys allowing
3258-
ephemeral key exchange without low memory optimziations you MUST update and
3258+
ephemeral key exchange without low memory optimizations you MUST update and
32593259
regenerate the private RSA keys.
32603260

32613261
Please see https://www.wolfssl.com/wolfSSL/Blog/Blog.html for more details

IDE/ECLIPSE/MICRIUM/README.md

Lines changed: 35 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -118,41 +118,41 @@ memcb test passed!
118118
wolfSSL version 3.15.5
119119
------------------------------------------------------------------------------
120120
wolfCrypt Benchmark (block bytes 1024, min 1.0 sec each)
121-
RNG 225 KB tooks 1.026 seconds, 219.313 KB/s
122-
AES-128-CBC-enc 250 KB toks 1.105 seconds 226.210 KB/s
123-
AES-128-CBC-dec 225 KB tooks 1.005 seconds, 223.922 KB/s
124-
AES-192-CBC-enc 225 KB tooks 1.076 seconds, 209.104 KB/s
125-
AES-192-CBC-dec 225 KB tooks 1.077 seconds, 208.981 K/s
126-
AES-56-CBC-enc 200 KB tooks 1.029 seconds, 19.396 KB/s
127-
AES-256-CBC-dec 200 KB toks 1.022 seconds, 195.785 KB/s
128-
AES-128-GCM-enc 125 KB tooks 1.28 secnds, 101.70 KB/s
129-
AES-128-GC-dec 125 KB tooks 1.228 seconds 101.756 KB/s
130-
AES-192-GCM-enc 100 KB tooks 1.026 seconds, 97.493 KB/s
131-
AES-192-GCM-dec 100 KB tooks 1.026 seconds, 97.480 KB/s
132-
AES-256-GCM-enc 100 KB tooks 1.065 seconds, 93.909 KB/s
133-
AES-256-GC-dec 100 KB tooks 1.065 seconds, 93.897 KB/s
134-
RABBIT 2 MB tooks 1.011 seconds, 2.19 MB/s
135-
3DES 100 KB tooks 1.007 sconds, 99.312 KB/s
136-
MD5 3MB tooks 1.008 seonds, 2.907 MBs
137-
SHA 1 MB tooks 1.09 secnds, 1.283 MB/s
138-
SHA-256 575 KB tooks 1.037 seconds, 554.501 KB/s
139-
SHA-512 200 KB tooks 1.003 seconds, 199.444 KB/s
140-
HMAC-MD5 3 B tooks 1.002 seconds, 2.876 MB/s
141-
HMAC-SHA26 550 KB tooks 1.000 seconds, 549.95 KB//s
142-
HMAC-SHA512 200 KB toks 1.018 seconds, 196.452 KB/s
143-
RSA 2048 public 8 ops took 1.025 sec, avg 128.135 ms, 7.804 op/sec
144-
RSA 2048 private 2 ops took 4.972 ec, avg 2485.951 s, 0.402 ops/sec
145-
DH 2048 key en 2 ops took 1.927 sec, avg 96.303 ms, 1.038 op/sec
146-
DH 2048 agree 2ops took 1.937 sc, avg 968.578 ms, 1.032 ops/sec
147-
ECC 256 key gen 3 ops took 1.185 sec, avg 394.944 ms, 2.53 ops/sec
148-
ECDHE 256 agree 4 ops took 1.585 sec, avg 396.168 ms, 2.524 ops/sec
149-
ECSA 256 sign 4 ops took 1.611 sec, avg 402.865 ms, 2.482 ops/sec
150-
ECDSA 256verif 2 ops tok 1.586 sec, avg 793.153 ms, 1.261 opssec
151-
CURVE 25519 key gen 2 ops took 1.262 sec, avg 630.907 ms, 1.585 ops/sec
152-
CURE 25519 agree 2 ops took 1.261 sec, avg630.469 ms, 1.586 ops/sec
153-
ED 2519 key gen 2 ops took 1.27 sec, avg 66.099ms, 1.572 ops/sec
154-
ED 25519 sign 2 ops took 1.303 sec, ag 65.633 ms, 1.35 op/sec
155-
ED 25519 verify 2 ops took 2.674 sec, avg1337.68 ms 0.748 ops/ec
121+
RNG 225 KB took 1.026 seconds, 219.313 KB/s
122+
AES-128-CBC-enc 250 KB took 1.105 seconds 226.210 KB/s
123+
AES-128-CBC-dec 225 KB took 1.005 seconds, 223.922 KB/s
124+
AES-192-CBC-enc 225 KB took 1.076 seconds, 209.104 KB/s
125+
AES-192-CBC-dec 225 KB took 1.077 seconds, 208.981 K/s
126+
AES-56-CBC-enc 200 KB took 1.029 seconds, 19.396 KB/s
127+
AES-256-CBC-dec 200 KB took 1.022 seconds, 195.785 KB/s
128+
AES-128-GCM-enc 125 KB took 1.28 seconds, 101.70 KB/s
129+
AES-128-GC-dec 125 KB took 1.228 seconds 101.756 KB/s
130+
AES-192-GCM-enc 100 KB took 1.026 seconds, 97.493 KB/s
131+
AES-192-GCM-dec 100 KB took 1.026 seconds, 97.480 KB/s
132+
AES-256-GCM-enc 100 KB took 1.065 seconds, 93.909 KB/s
133+
AES-256-GC-dec 100 KB took 1.065 seconds, 93.897 KB/s
134+
RABBIT 2 MB took 1.011 seconds, 2.19 MB/s
135+
3DES 100 KB took 1.007 seconds, 99.312 KB/s
136+
MD5 3MB took 1.008 seconds, 2.907 MBs
137+
SHA 1 MB took 1.09 secends, 1.283 MB/s
138+
SHA-256 575 KB took 1.037 seconds, 554.501 KB/s
139+
SHA-512 200 KB took 1.003 seconds, 199.444 KB/s
140+
HMAC-MD5 3 B took 1.002 seconds, 2.876 MB/s
141+
HMAC-SHA26 550 KB took 1.000 seconds, 549.95 KB//s
142+
HMAC-SHA512 200 KB topk 1.018 seconds, 196.452 KB/s
143+
RSA 2048 public 8 ops took 1.025 seconds, avg 128.135 ms, 7.804 ops/s
144+
RSA 2048 private 2 ops took 4.972 seconds, avg 2485.951 s, 0.402 ops/s
145+
DH 2048 key en 2 ops took 1.927 seconds, avg 96.303 ms, 1.038 ops/s
146+
DH 2048 agree 2ops took 1.937 seconds, avg 968.578 ms, 1.032 ops/s
147+
ECC 256 key gen 3 ops took 1.185 seconds, avg 394.944 ms, 2.53 ops/s
148+
ECDHE 256 agree 4 ops took 1.585 seconds, avg 396.168 ms, 2.524 ops/s
149+
ECSA 256 sign 4 ops took 1.611 seconds, avg 402.865 ms, 2.482 ops/s
150+
ECDSA 256verif 2 ops took 1.586 seconds, avg 793.153 ms, 1.261 ops/s
151+
CURVE 25519 key gen 2 ops took 1.262 seconds, avg 630.907 ms, 1.585 ops/s
152+
CURE 25519 agree 2 ops took 1.261 seconds, avg630.469 ms, 1.586 ops/s
153+
ED 2519 key gen 2 ops took 1.27 seconds, avg 66.099 ms, 1.572 ops/s
154+
ED 25519 sign 2 ops took 1.303 seconds, ag 65.633 ms, 1.35 ops/s
155+
ED 25519 verify 2 ops took 2.674 seconds, avg1337.68 ms 0.748 ops/s
156156
```
157157
### `WOLFSSL_CLIENT_TEST` wolfssl_client_test()
158158

IDE/Renesas/e2studio/RA6M4/test/key_data/key_data.h

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
/** Firmware update data and user key data */
77
typedef struct user_key_block_data
88
{
9-
/* Provisioning key wapped by Renesas DLM */
9+
/* Provisioning key wrapped by Renesas DLM */
1010
uint8_t encrypted_provisioning_key[HW_SCE_AES_CBC_IV_BYTE_SIZE * 2];
1111
/* Initial vector to be used when creating encrypted key */
1212
uint8_t iv[HW_SCE_AES_CBC_IV_BYTE_SIZE];

mcapi/mcapi_test.c

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -311,7 +311,7 @@ static int check_sha256(void)
311311
}
312312

313313
if (memcmp(mcDigest, defDigest, CRYPT_SHA256_DIGEST_SIZE) != 0) {
314-
printf("sha256 final memcmp fialed\n");
314+
printf("sha256 final memcmp failed\n");
315315
return -1;
316316
}
317317
printf("sha256 mcapi test passed\n");
@@ -351,7 +351,7 @@ static int check_sha384(void)
351351
}
352352

353353
if (memcmp(mcDigest, defDigest, CRYPT_SHA384_DIGEST_SIZE) != 0) {
354-
printf("sha384 final memcmp fialed\n");
354+
printf("sha384 final memcmp failed\n");
355355
return -1;
356356
}
357357
printf("sha384 mcapi test passed\n");
@@ -391,7 +391,7 @@ static int check_sha512(void)
391391
}
392392

393393
if (memcmp(mcDigest, defDigest, CRYPT_SHA512_DIGEST_SIZE) != 0) {
394-
printf("sha512 final memcmp fialed\n");
394+
printf("sha512 final memcmp failed\n");
395395
return -1;
396396
}
397397
printf("sha512 mcapi test passed\n");
@@ -434,7 +434,7 @@ static int check_hmac(void)
434434
}
435435

436436
if (memcmp(mcDigest, defDigest, CRYPT_SHA_DIGEST_SIZE) != 0) {
437-
printf("hmac sha final memcmp fialed\n");
437+
printf("hmac sha final memcmp failed\n");
438438
return -1;
439439
}
440440
printf("hmac sha mcapi test passed\n");
@@ -462,7 +462,7 @@ static int check_hmac(void)
462462
}
463463

464464
if (memcmp(mcDigest, defDigest, CRYPT_SHA256_DIGEST_SIZE) != 0) {
465-
printf("hmac sha256 final memcmp fialed\n");
465+
printf("hmac sha256 final memcmp failed\n");
466466
return -1;
467467
}
468468
printf("hmac sha256 mcapi test passed\n");
@@ -490,7 +490,7 @@ static int check_hmac(void)
490490
}
491491

492492
if (memcmp(mcDigest, defDigest, CRYPT_SHA384_DIGEST_SIZE) != 0) {
493-
printf("hmac sha384 final memcmp fialed\n");
493+
printf("hmac sha384 final memcmp failed\n");
494494
return -1;
495495
}
496496
printf("hmac sha384 mcapi test passed\n");
@@ -518,7 +518,7 @@ static int check_hmac(void)
518518
}
519519

520520
if (memcmp(mcDigest, defDigest, CRYPT_SHA512_DIGEST_SIZE) != 0) {
521-
printf("hmac sha512 final memcmp fialed\n");
521+
printf("hmac sha512 final memcmp failed\n");
522522
return -1;
523523
}
524524
printf("hmac sha512 mcapi test passed\n");

wrapper/Ada/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ using the WolfSSL Ada binding. The implementation is cross-platform
77
and compiles on Linux, Mac OS X and Windows.
88

99
Security: The WolfSSL Ada binding avoids usage of the
10-
Seconday Stack. The GNAT compiler has a number of hardening
10+
Secondary Stack. The GNAT compiler has a number of hardening
1111
features for example Stack Scrubbing; the compiler can generate
1212
code to zero-out stack frames used by subprograms.
1313
Unfortunately this works well for the primary stack but not
@@ -108,4 +108,4 @@ found in the files:
108108
spark_sockets.ads
109109
spark_sockets.adb
110110
spark_terminal.ads
111-
spark_terminal.adb
111+
spark_terminal.adb

0 commit comments

Comments
 (0)