Skip to content

Commit 219a338

Browse files
authored
Merge pull request #7547 from philljj/spelling_cleanup
Used codespell and fixed some obvious typos.
2 parents b866bf6 + 040e0c9 commit 219a338

8 files changed

Lines changed: 32 additions & 32 deletions

File tree

examples/client/client.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2104,7 +2104,7 @@ THREAD_RETURN WOLFSSL_THREAD client_test(void* args)
21042104
#endif
21052105

21062106
#ifdef WOLFSSL_DUAL_ALG_CERTS
2107-
/* Set our preference for verfication to be for both the native and
2107+
/* Set our preference for verification to be for both the native and
21082108
* alternative chains. Ultimately, its the server's choice. This will be
21092109
* used in the call to wolfSSL_UseCKS(). */
21102110
byte cks_order[3] = {

src/pk.c

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -14423,7 +14423,7 @@ int wolfSSL_ED25519_generate_key(unsigned char *priv, unsigned int *privSz,
1442314423
* @param [in] priv ED25519 private key data.
1442414424
* @param [in] privSz Length in bytes of private key data.
1442514425
* @param [out] sig Signature buffer.
14426-
* @param [in, out] sigSz On in, the length of the siganture buffer in bytes.
14426+
* @param [in, out] sigSz On in, the length of the signature buffer in bytes.
1442714427
* On out, the length of the signature in bytes.
1442814428
* @return 1 on success
1442914429
* @return 0 on failure.
@@ -14889,7 +14889,7 @@ int wolfSSL_ED448_generate_key(unsigned char *priv, unsigned int *privSz,
1488914889
* @param [in] priv ED448 private key data.
1489014890
* @param [in] privSz Length in bytes of private key data.
1489114891
* @param [out] sig Signature buffer.
14892-
* @param [in, out] sigSz On in, the length of the siganture buffer in bytes.
14892+
* @param [in, out] sigSz On in, the length of the signature buffer in bytes.
1489314893
* On out, the length of the signature in bytes.
1489414894
* @return 1 on success
1489514895
* @return 0 on failure.
@@ -15143,7 +15143,7 @@ int wolfSSL_PEM_write_bio_PUBKEY(WOLFSSL_BIO* bio, WOLFSSL_EVP_PKEY* key)
1514315143
* @param [in] passwd Password to use when encrypting.
1514415144
* @param [in] len Length of password.
1514515145
* @param [in] cb Password callback.
15146-
* @param [in] arg Password callback arguement.
15146+
* @param [in] arg Password callback argument.
1514715147
* @return 1 on success.
1514815148
* @return 0 on failure.
1514915149
*/
@@ -15254,7 +15254,7 @@ int wolfSSL_PEM_write_bio_PrivateKey(WOLFSSL_BIO* bio, WOLFSSL_EVP_PKEY* key,
1525415254
* @param [in] bio BIO to read from.
1525515255
* @param [in, out] key Public key object. Object used if passed in.
1525615256
* @param [in] cb Password callback.
15257-
* @param [in] arg Password callback arguement.
15257+
* @param [in] arg Password callback argument.
1525815258
* @return A WOLFSSL_EVP_PKEY object on success.
1525915259
* @return NULL on failure.
1526015260
*/
@@ -15310,7 +15310,7 @@ WOLFSSL_EVP_PKEY* wolfSSL_PEM_read_bio_PUBKEY(WOLFSSL_BIO* bio,
1531015310
* @param [in] bio BIO to read from.
1531115311
* @param [in, out] key Private key object. Object used if passed in.
1531215312
* @param [in] cb Password callback.
15313-
* @param [in] arg Password callback arguement.
15313+
* @param [in] arg Password callback argument.
1531415314
* @return A WOLFSSL_EVP_PKEY object on success.
1531515315
* @return NULL on failure.
1531615316
*/
@@ -15391,7 +15391,7 @@ WOLFSSL_EVP_PKEY* wolfSSL_PEM_read_bio_PrivateKey(WOLFSSL_BIO* bio,
1539115391
* @param [in] fp File pointer.
1539215392
* @param [in, out] key Public key object. Object used if passed in.
1539315393
* @param [in] cb Password callback.
15394-
* @param [in] arg Password callback arguement.
15394+
* @param [in] arg Password callback argument.
1539515395
* @return A WOLFSSL_EVP_PKEY object on success.
1539615396
* @return NULL on failure.
1539715397
*/
@@ -15448,7 +15448,7 @@ WOLFSSL_EVP_PKEY *wolfSSL_PEM_read_PUBKEY(XFILE fp, WOLFSSL_EVP_PKEY **key,
1544815448
* @param [in] fp File pointer.
1544915449
* @param [in, out] key Private key object. Object used if passed in.
1545015450
* @param [in] cb Password callback.
15451-
* @param [in] arg Password callback arguement.
15451+
* @param [in] arg Password callback argument.
1545215452
* @return A WOLFSSL_EVP_PKEY object on success.
1545315453
* @return NULL on failure.
1545415454
*/
@@ -15668,7 +15668,7 @@ static int pem_read_data(char* pem, int pemLen, char **name, char **header,
1566815668
return ret;
1566915669
}
1567015670

15671-
/* Encode the DER data in PEM foramt into a newly allocated buffer.
15671+
/* Encode the DER data in PEM format into a newly allocated buffer.
1567215672
*
1567315673
* @param [in] name Header/footer name.
1567415674
* @param [in] header Encryption header.
@@ -15812,7 +15812,7 @@ int wolfSSL_PEM_read_bio(WOLFSSL_BIO* bio, char **name, char **header,
1581215812
return res;
1581315813
}
1581415814

15815-
/* Encode the DER data in PEM foramt into a BIO.
15815+
/* Encode the DER data in PEM format into a BIO.
1581615816
*
1581715817
* @param [in] bio BIO to write to.
1581815818
* @param [in] name Header/footer name.
@@ -15894,7 +15894,7 @@ int wolfSSL_PEM_read(XFILE fp, char **name, char **header, unsigned char **data,
1589415894
return res;
1589515895
}
1589615896

15897-
/* Encode the DER data in PEM foramt into a file.
15897+
/* Encode the DER data in PEM format into a file.
1589815898
*
1589915899
* @param [in] fp File pointer to write to.
1590015900
* @param [in] name Header/footer name.
@@ -16135,7 +16135,7 @@ static int pem_pkcs8_encode(WOLFSSL_EVP_PKEY* pkey, byte* key, word32* keySz)
1613516135
* @param [out] pemSz Size of data in buffer in bytes.
1613616136
* @param [in] pkey Private key to write.
1613716137
* @param [in] enc Encryption information to use. May be NULL.
16138-
* @param [in] passwd Pasword to use when encrypting. May be NULL.
16138+
* @param [in] passwd Password to use when encrypting. May be NULL.
1613916139
* @param [in] passwdSz Size of password in bytes.
1614016140
* @param [in] cb Password callback. Used when passwd is NULL. May be
1614116141
* NULL.
@@ -16256,7 +16256,7 @@ static int pem_write_mem_pkcs8privatekey(byte** pem, int* pemSz,
1625616256
* @param [in] bio BIO to write to.
1625716257
* @param [in] pkey Private key to write.
1625816258
* @param [in] enc Encryption information to use. May be NULL.
16259-
* @param [in] passwd Pasword to use when encrypting. May be NULL.
16259+
* @param [in] passwd Password to use when encrypting. May be NULL.
1626016260
* @param [in] passwdSz Size of password in bytes.
1626116261
* @param [in] cb Password callback. Used when passwd is NULL. May be
1626216262
* NULL.
@@ -16301,7 +16301,7 @@ int wolfSSL_PEM_write_bio_PKCS8PrivateKey(WOLFSSL_BIO* bio,
1630116301
* @param [in] f File pointer.
1630216302
* @param [in] pkey Private key to write.
1630316303
* @param [in] enc Encryption information to use. May be NULL.
16304-
* @param [in] passwd Pasword to use when encrypting. May be NULL.
16304+
* @param [in] passwd Password to use when encrypting. May be NULL.
1630516305
* @param [in] passwdSz Size of password in bytes.
1630616306
* @param [in] cb Password callback. Used when passwd is NULL. May be
1630716307
* NULL.

src/ssl_load.c

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1585,7 +1585,7 @@ static void ProcessBufferCertSetHave(WOLFSSL_CTX* ctx, WOLFSSL* ssl,
15851585
#ifndef WC_STRICT_SIG
15861586
wolfssl_set_have_from_key_oid(ctx, ssl, cert->keyOID);
15871587
#else
1588-
/* Set whether ECC is available baed on signature available. */
1588+
/* Set whether ECC is available based on signature available. */
15891589
if (ssl != NULL) {
15901590
ssl->options.haveECC = ssl->options.haveECDSAsig;
15911591
}
@@ -5611,7 +5611,7 @@ long wolfSSL_CTX_set_tmp_dh(WOLFSSL_CTX* ctx, WOLFSSL_DH* dh)
56115611
*
56125612
* @param [in, out] ctx SSL context object.
56135613
* @param [in, out] ssl SSL object.
5614-
* @oaram [in] buf Buffer holding encoded DH parameters.
5614+
* @param [in] buf Buffer holding encoded DH parameters.
56155615
* @param [in] sz Size of encoded DH parameters.
56165616
* @param [in] format Format of data:
56175617
* WOLFSSL_FILETYPE_PEM or WOLFSSL_FILETYPE_ASN1.
@@ -5724,7 +5724,7 @@ static int ws_ctx_ssl_set_tmp_dh(WOLFSSL_CTX* ctx, WOLFSSL* ssl,
57245724
/* Set the temporary DH parameters against the SSL.
57255725
*
57265726
* @param [in, out] ssl SSL object.
5727-
* @oaram [in] buf Buffer holding encoded DH parameters.
5727+
* @param [in] buf Buffer holding encoded DH parameters.
57285728
* @param [in] sz Size of encoded DH parameters.
57295729
* @param [in] format Format of data:
57305730
* WOLFSSL_FILETYPE_PEM or WOLFSSL_FILETYPE_ASN1.
@@ -5743,7 +5743,7 @@ int wolfSSL_SetTmpDH_buffer(WOLFSSL* ssl, const unsigned char* buf, long sz,
57435743
/* Set the temporary DH parameters against the SSL context.
57445744
*
57455745
* @param [in, out] ctx SSL context object.
5746-
* @oaram [in] buf Buffer holding encoded DH parameters.
5746+
* @param [in] buf Buffer holding encoded DH parameters.
57475747
* @param [in] sz Size of encoded DH parameters.
57485748
* @param [in] format Format of data:
57495749
* WOLFSSL_FILETYPE_PEM or WOLFSSL_FILETYPE_ASN1.
@@ -5806,11 +5806,11 @@ static int ws_ctx_ssl_set_tmp_dh_file(WOLFSSL_CTX* ctx, WOLFSSL* ssl,
58065806
}
58075807
if (res == 1) {
58085808
if (ssl != NULL) {
5809-
/* Set encoded DH paramters into SSL. */
5809+
/* Set encoded DH parameters into SSL. */
58105810
res = wolfSSL_SetTmpDH_buffer(ssl, dhFile.buffer, sz, format);
58115811
}
58125812
else {
5813-
/* Set encoded DH paramters into SSL context. */
5813+
/* Set encoded DH parameters into SSL context. */
58145814
res = wolfSSL_CTX_SetTmpDH_buffer(ctx, dhFile.buffer, sz, format);
58155815
}
58165816
}

src/tls13.c

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9073,7 +9073,7 @@ static int SendTls13CertificateVerify(WOLFSSL* ssl)
90739073
if ((ssl->hsType == DYNAMIC_TYPE_RSA) &&
90749074
(args->sigLen > MAX_SIG_DATA_SZ)) {
90759075
/* We store the RSA signature in the sigData buffer
9076-
* temporarly, hence its size must be fitting. */
9076+
* temporarily, hence its size must be fitting. */
90779077
sigLen = args->sigLen;
90789078
}
90799079
args->sigData = (byte*)XMALLOC(sigLen, ssl->heap,
@@ -9091,7 +9091,7 @@ static int SendTls13CertificateVerify(WOLFSSL* ssl)
90919091
if (ssl->hsAltType == DYNAMIC_TYPE_RSA &&
90929092
args->altSigLen > MAX_SIG_DATA_SZ) {
90939093
/* We store the RSA signature in the sigData buffer
9094-
* temporarly, hence its size must be fitting. */
9094+
* temporarily, hence its size must be fitting. */
90959095
sigLen = args->altSigLen;
90969096
}
90979097
args->altSigData = (byte*)XMALLOC(sigLen, ssl->heap,

wolfcrypt/benchmark/benchmark.c

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -318,7 +318,7 @@
318318
* enabled, all if the values in report are blank. */
319319
#ifdef CONFIG_NEWLIB_NANO_FORMAT
320320
#if CONFIG_NEWLIB_NANO_FORMAT == 1
321-
#error "Nano newlib fomatting must not be enabled for benchmark"
321+
#error "Nano newlib formatting must not be enabled for benchmark"
322322
#endif
323323
#endif
324324

@@ -372,7 +372,7 @@
372372
defined(CONFIG_IDF_TARGET_ESP32S3)
373373
#include <xtensa/hal.h>
374374
#elif defined(CONFIG_IDF_TARGET_ESP8266)
375-
/* no CPU HAL for ESP8266, we'll use RTOS tick calc extimates */
375+
/* no CPU HAL for ESP8266, we'll use RTOS tick calc estimates */
376376
#include <FreeRTOS.h>
377377
#elif defined(CONFIG_IDF_TARGET_ESP32H2)
378378
/* TODO add ESP32-H2 benchmark support */
@@ -1410,7 +1410,7 @@ static const char* bench_result_words3[][5] = {
14101410
uint64_t thisIncrement = 0; /* The adjusted increment amount. */
14111411
uint64_t expected_diff = 0; /* FreeRTOS estimated expected CPU diff.*/
14121412
#ifdef DEBUG_WOLFSSL_BENCHMARK_TIMING
1413-
uint64_t tickCount = 0; /* Currrent rtos tick counter. */
1413+
uint64_t tickCount = 0; /* Current rtos tick counter. */
14141414
uint64_t tickDiff = 0; /* Tick difference from last check. */
14151415
uint64_t tickBeginDiff = 0; /* Tick difference from beginning. */
14161416
#endif

wolfcrypt/src/port/Espressif/esp32_sha.c

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -502,7 +502,7 @@ int esp_sha_ctx_copy(struct wc_Sha* src, struct wc_Sha* dst)
502502
int esp_sha224_ctx_copy(struct wc_Sha256* src, struct wc_Sha256* dst)
503503
{
504504
/* There's no 224 hardware on ESP32.
505-
* Initializer fo dst is this ctx address for use as a breadcrumb. */
505+
* Initializer for dst is this ctx address for use as a breadcrumb. */
506506
dst->ctx.initializer = (uintptr_t)&dst->ctx;
507507
#if defined(ESP_MONITOR_HW_TASK_LOCK) && !defined(SINGLE_THREADED)
508508
{
@@ -1414,7 +1414,7 @@ int esp_sha_try_hw_lock(WC_ESP32SHA* ctx)
14141414
if (mutex_ctx_owner) {
14151415
#ifdef WOLFSSL_DEBUG_MUTEX
14161416
ESP_LOGW(TAG, "revert to SW since mutex_ctx_owner = %x"
1417-
" but we are currenty ctx = %x",
1417+
" but we are currently ctx = %x",
14181418
mutex_ctx_owner, (intptr_t)ctx);
14191419
#endif
14201420
}

wolfcrypt/src/port/Espressif/esp_sdk_time_lib.c

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -241,7 +241,7 @@ int set_time_from_string(const char* time_buffer)
241241
int quote_offset = 0;
242242
int ret = 0;
243243

244-
/* perform some basic sanity checkes */
244+
/* perform some basic sanity checks */
245245
ret = probably_valid_time_string(time_buffer);
246246
if (ret == ESP_OK) {
247247
/* we are expecting the string to be encapsulated in single quotes */
@@ -255,7 +255,7 @@ int set_time_from_string(const char* time_buffer)
255255
&day, &hour, &minute, &second, &year, &offset);
256256

257257
if (ret == 8) {
258-
/* we found a match for all componets */
258+
/* we found a match for all components */
259259

260260
const char *months[] = { "Jan", "Feb", "Mar", "Apr", "May", "Jun",
261261
"Jul", "Aug", "Sep", "Oct", "Nov", "Dec"
@@ -320,7 +320,7 @@ int set_time(void)
320320
esp_show_current_datetime();
321321

322322
#ifdef LIBWOLFSSL_VERSION_GIT_HASH_DATE
323-
/* initialy set a default approximate time from recent git commit */
323+
/* initially set a default approximate time from recent git commit */
324324
ESP_LOGI(TAG, "Found git hash date, attempting to set system date: %s",
325325
LIBWOLFSSL_VERSION_GIT_HASH_DATE);
326326
set_time_from_string(LIBWOLFSSL_VERSION_GIT_HASH_DATE"\0");
@@ -427,7 +427,7 @@ int set_time_wait_for_ntp(void)
427427
#endif
428428

429429
if (ret == ESP_OK) {
430-
ESP_LOGI(TAG, "Successfuly set time via NTP servers.");
430+
ESP_LOGI(TAG, "Successfully set time via NTP servers.");
431431
}
432432
else {
433433
ESP_LOGW(TAG, "Warning: Failed to set time with NTP: "

wolfcrypt/src/port/Espressif/esp_sdk_wifi_lib.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -384,7 +384,7 @@ esp_err_t wc_wifi_init_sta(void)
384384
.ssid = EXAMPLE_ESP_WIFI_SSID,
385385
.password = EXAMPLE_ESP_WIFI_PASS,
386386
/* Authmode threshold resets to WPA2 as default if password matches
387-
* WPA2 standards (pasword len => 8). If you want to connect the
387+
* WPA2 standards (password len => 8). If you want to connect the
388388
* device to deprecated WEP/WPA networks, Please set the threshold
389389
* value WIFI_AUTH_WEP/WIFI_AUTH_WPA_PSK and set the password with
390390
* length and format matching to WIFI_AUTH_WEP/WIFI_AUTH_WPA_PSK

0 commit comments

Comments
 (0)