Skip to content

Commit

Permalink
Fix residual typos found by codespell
Browse files Browse the repository at this point in the history
  • Loading branch information
DimitriPapadopoulos committed Sep 11, 2023
1 parent f9c2a86 commit d532833
Show file tree
Hide file tree
Showing 9 changed files with 11 additions and 11 deletions.
2 changes: 1 addition & 1 deletion IDE/MDK5-ARM/Projects/wolfSSL-Full/wolfsslFull.uvoptx
Original file line number Diff line number Diff line change
Expand Up @@ -308,7 +308,7 @@
</Group>

<Group>
<GroupName>Dcumentation</GroupName>
<GroupName>Documentation</GroupName>
<tvExp>1</tvExp>
<tvExpOptDlg>0</tvExpOptDlg>
<cbSel>0</cbSel>
Expand Down
2 changes: 1 addition & 1 deletion IDE/MDK5-ARM/Projects/wolfSSL-Full/wolfsslFull.uvprojx
Original file line number Diff line number Diff line change
Expand Up @@ -446,7 +446,7 @@
</Files>
</Group>
<Group>
<GroupName>Dcumentation</GroupName>
<GroupName>Documentation</GroupName>
<Files>
<File>
<FileName>Abstract.txt</FileName>
Expand Down
2 changes: 1 addition & 1 deletion debian/copyright
Original file line number Diff line number Diff line change
Expand Up @@ -212,6 +212,6 @@ License: BSD-3-clause


License: Apache-2.0
On modern Debian systens, the text of this license can be found
On modern Debian systems, the text of this license can be found
at: /usr/share/common-licenses/Apache-2.0

2 changes: 1 addition & 1 deletion src/sniffer.c
Original file line number Diff line number Diff line change
Expand Up @@ -7559,7 +7559,7 @@ static int addKeyLogSnifferServerHelper(const char* address,
}

/* Tag the new or existing server as requiring keylog support to
* decrypt, otherwise it won't be useable */
* decrypt, otherwise it won't be usable */
sniffer->useKeyLogFile = 1;

return 0;
Expand Down
2 changes: 1 addition & 1 deletion tests/api.c
Original file line number Diff line number Diff line change
Expand Up @@ -64558,7 +64558,7 @@ static int test_session_ticket_hs_update(void)
ExpectIntEQ(wolfSSL_set_session(ssl_c3, sess), WOLFSSL_SUCCESS);

wolfSSL_SetLoggingPrefix("client");
/* Exchange intial flights for the second connection */
/* Exchange initial flights for the second connection */
ExpectIntEQ(wolfSSL_connect(ssl_c2), WOLFSSL_FATAL_ERROR);
ExpectIntEQ(wolfSSL_get_error(ssl_c2, WOLFSSL_FATAL_ERROR),
WOLFSSL_ERROR_WANT_READ);
Expand Down
2 changes: 1 addition & 1 deletion tests/quic.c
Original file line number Diff line number Diff line change
Expand Up @@ -1154,7 +1154,7 @@ static int test_quic_server_hello(int verbose) {
/* we have the app secrets */
check_secrets(&tclient, wolfssl_encryption_application, 32, 32);
check_secrets(&tserver, wolfssl_encryption_application, 32, 32);
/* verify client and server have the same secrets establishd */
/* verify client and server have the same secrets established */
assert_secrets_EQ(&tclient, &tserver, wolfssl_encryption_handshake);
assert_secrets_EQ(&tclient, &tserver, wolfssl_encryption_application);
/* AEAD cipher should be known */
Expand Down
6 changes: 3 additions & 3 deletions wolfcrypt/src/asn.c
Original file line number Diff line number Diff line change
Expand Up @@ -15071,7 +15071,7 @@ static int DecodeCertInternal(DecodedCert* cert, int verify, int* criticalExt,
/* Assumes the target is a Raw-Public-Key certificate and parsed up to the
* public key. Returns CRYPTOCB_UNAVAILABLE if it determines that the cert is
* different from the Paw-Public-Key cert. In that case, cert->srcIdx is not
* consumed so as successing parse function can take over.
* consumed so as succeeding parse function can take over.
* In case that the target is Raw-Public-Key cert and contains a public key,
* returns 0 and consumes cert->srcIdx so as a public key retrieval function
* can follow.
Expand Down Expand Up @@ -20885,7 +20885,7 @@ static const ASNItem x509CertASN[] = {
/* Version ::= INTEGER { v1(0), v2(1), v3(2) */
/* TBS_VER_INT */ { 3, ASN_INTEGER, 0, 0, 0 },
/* serialNumber CertificateSerialNumber */
/* CetificateSerialNumber ::= INTEGER */
/* CertificateSerialNumber ::= INTEGER */
/* TBS_SERIAL */ { 2, ASN_INTEGER, 0, 0, 0 },
/* signature AlgorithmIdentifier */
/* AlgorithmIdentifier ::= SEQUENCE */
Expand Down Expand Up @@ -37387,7 +37387,7 @@ int wc_ParseCertPIV(wc_CertPIV* piv, const byte* buf, word32 totalSz)
GetASN_Int8Bit(&dataASN[PIVCERTASN_IDX_INFO], &info);
/* Start parsing from start of buffer. */
idx = 0;
/* Parse PIV cetificate data. */
/* Parse PIV certificate data. */
ret = GetASN_Items(pivCertASN, dataASN, pivCertASN_Length, 1, buf, &idx,
totalSz);
if (ret == 0) {
Expand Down
2 changes: 1 addition & 1 deletion wolfcrypt/src/port/arm/armv8-aes.c
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@


/*
* There are two versions one for 64 (Aarch64) and one for 32 bit (Aarch32).
* There are two versions one for 64 (Aarch64) and one for 32 bit (Aarch32).
* If changing one check the other.
*/

Expand Down
2 changes: 1 addition & 1 deletion wolfcrypt/src/rsa.c
Original file line number Diff line number Diff line change
Expand Up @@ -4328,7 +4328,7 @@ static int wc_CompareDiffPQ(mp_int* p, mp_int* q, int size, int* valid)

#ifdef WOLFSSL_CHECK_MEM_ZERO
if (ret == 0)
mp_memzero_add("Comare PQ d", d);
mp_memzero_add("Compare PQ d", d);
#endif

#if !defined(WOLFSSL_SP_MATH) && (!defined(WOLFSSL_SP_MATH_ALL) || \
Expand Down

0 comments on commit d532833

Please sign in to comment.