diff --git a/.github/workflows/codespell.yml b/.github/workflows/codespell.yml index 9ae790419..7b0e74270 100644 --- a/.github/workflows/codespell.yml +++ b/.github/workflows/codespell.yml @@ -17,4 +17,4 @@ jobs: check_filenames: true check_hidden: true # Add comma separated list of words to ignore (sorted alphabetically, case sensitive) - ignore_words_list: adin,ADn,aNULL,carryIn,cconfiguration,chainG,ciph,cLen,cliKs,creen,dout,ede,endianess,Endianess,Fo,haveA,hashIn,larg,LEAPYEAR,inCreated,inOut,inout,Merget,optionA,optmization,parm,parms,rIn,ser,siz,Te,te,TOOM,userA,vie,vlaue + ignore_words_list: adin,ADn,aNULL,carryIn,cconfiguration,chainG,ciph,cLen,cliKs,creen,dout,ede,endianess,Endianess,Fo,haveA,hashIn,larg,LEAPYEAR,inCreated,inOut,inout,Merget,mot,optionA,optmization,parm,parms,rIn,ser,siz,Te,te,TOOM,userA,vie,vlaue diff --git a/linuxkm/lkcapi_glue.c b/linuxkm/lkcapi_glue.c index faf88fd56..6adaac537 100644 --- a/linuxkm/lkcapi_glue.c +++ b/linuxkm/lkcapi_glue.c @@ -567,7 +567,7 @@ static int km_AesGcmSetAuthsize(struct crypto_aead *tfm, unsigned int authsize) } /* - * aead ciphers recieve data in scatterlists in following order: + * aead ciphers receive data in scatterlists in following order: * encrypt * req->src: aad||plaintext * req->dst: aad||ciphertext||tag diff --git a/linuxkm/x86_vector_register_glue.c b/linuxkm/x86_vector_register_glue.c index 8f0ffb4ca..552ac40c9 100644 --- a/linuxkm/x86_vector_register_glue.c +++ b/linuxkm/x86_vector_register_glue.c @@ -305,7 +305,7 @@ static struct wc_thread_fpu_count_ent *wc_linuxkm_fpu_state_assoc_unlikely(int c } } else { /* check for migration. this can happen despite our best efforts if any - * I/O occured while locked, e.g. kernel messages like "uninitialized + * I/O occurred while locked, e.g. kernel messages like "uninitialized * urandom read". since we're locked now, we can safely migrate the * entry in wc_linuxkm_fpu_states[], freeing up the slot on the previous * cpu. diff --git a/wolfcrypt/src/port/Espressif/esp_crt_bundle/README.md b/wolfcrypt/src/port/Espressif/esp_crt_bundle/README.md index 9f52338e9..00f898eef 100644 --- a/wolfcrypt/src/port/Espressif/esp_crt_bundle/README.md +++ b/wolfcrypt/src/port/Espressif/esp_crt_bundle/README.md @@ -44,7 +44,7 @@ until a PR is created for upstream support. ### Time The wolfSSL libraries are by default considerably more robust and strict. As such, it is important to have an accurate -time and date setting for the certficate date ranges.. The wolfssL libraries include some +time and date setting for the certificate date ranges.. The wolfssL libraries include some [time helper functions](https://github.com/wolfSSL/wolfssl/blob/master/wolfssl/wolfcrypt/port/Espressif/esp-sdk-lib.h). These can be enabled with `#define USE_WOLFSSL_ESP_SDK_TIME` in the `user_settings.h`. diff --git a/wolfcrypt/src/port/Espressif/esp_crt_bundle/esp_crt_bundle.c b/wolfcrypt/src/port/Espressif/esp_crt_bundle/esp_crt_bundle.c index 023b373a6..d249fbeb3 100644 --- a/wolfcrypt/src/port/Espressif/esp_crt_bundle/esp_crt_bundle.c +++ b/wolfcrypt/src/port/Espressif/esp_crt_bundle/esp_crt_bundle.c @@ -159,8 +159,8 @@ esp_err_t esp_crt_bundle_attach(void *conf) * * The default is having the bundle pre-sorted in the python script * to allow for rapid binary cert match search at runtime. The unsorted - * seach ALWAYS works, but when expecting a sorted search the python - * script MUST presort the data, oherwise the connection will likely fail. + * search ALWAYS works, but when expecting a sorted search the python + * script MUST presort the data, otherwise the connection will likely fail. * * When debugging and using an unsorted bundle, define CERT_BUNDLE_UNSORTED * Reminder: the actual sort occurs in gen_crt_bundly.py call from CMake. */ @@ -677,7 +677,7 @@ static CB_INLINE int wolfssl_ssl_conf_verify_cb_no_signer(int preverify, * NOTE: To save memory, the store `cert` from above is overwritten below. * Any details needed from the store `cert` should have been saved. * - * We'll proceed by assiging `cert` to each of the respective items in + * We'll proceed by assigning `cert` to each of the respective items in * bundle as we attempt to find the desired cert: */ if (ret == WOLFSSL_SUCCESS) { _cert_bundle_loaded = 1; @@ -843,7 +843,7 @@ static CB_INLINE int wolfssl_ssl_conf_verify_cb_no_signer(int preverify, * so we don't need to clean them up explicitly. * * However, we'll start over with a freash bundle_cert for the - * next search interation. */ + * next search iteration. */ if (bundle_cert != NULL) { wolfSSL_X509_free(bundle_cert); } @@ -918,7 +918,7 @@ static CB_INLINE int wolfssl_ssl_conf_verify_cb_no_signer(int preverify, } /* Note that although we are adding a certificate to the store - * now, it is too late to be used in the current TLS connecton + * now, it is too late to be used in the current TLS connection * that caused the callback. See the Cerfiicate Manager for * validation and possible overriding of preverify values. */ ESP_LOGCBI(TAG, "\n\nAdding Cert for Certificate Store!\n"); @@ -993,7 +993,7 @@ static CB_INLINE int wolfssl_ssl_conf_verify_cb_no_signer(int preverify, * for reference: * typedef int (*VerifyCallback)(int, WOLFSSL_X509_STORE_CTX*); * - * This is the callback for TLS handshake verify / valiation. See related: + * This is the callback for TLS handshake verify / validation. See related: * wolfssl_ssl_conf_verify_cb_no_signer * wolfssl_ssl_conf_verify_cb_before_date * wolfssl_ssl_conf_verify_cb_after_date @@ -1133,7 +1133,7 @@ void CB_INLINE wolfssl_ssl_conf_verify(wolfssl_ssl_config *conf, int (*f_vrfy) WOLFSSL_X509_VERIFY_CALLBACK, void (*p_vrfy) ) { - /* Other Crytographic providers for reference: + /* Other Cryptographic providers for reference: conf->f_vrfy = f_vrfy; (verification function callback) conf->p_vrfy = p_vrfy; (pre-verification value) */ @@ -1270,7 +1270,7 @@ esp_err_t esp_crt_bundle_is_valid(void) /* Initialize the bundle into an array so we can do binary * search for certs; the bundle generated by the python utility is - * normally already presorted by subject name attrbutes in ARBITRARY order! + * normally already presorted by subject name attributes in ARBITRARY order! * * See gen_crt_bundle.py regarding element extraction sort. * @@ -1287,7 +1287,7 @@ static esp_err_t wolfssl_esp_crt_bundle_init(const uint8_t *x509_bundle, int ret = ESP_OK; WOLFSSL_ENTER("wolfssl_esp_crt_bundle_init"); - _esp_crt_bundle_is_valid = ESP_OK; /* Assume valid until proven otherise. */ + _esp_crt_bundle_is_valid = ESP_OK; /* Assume valid until proven otherwise. */ _cert_bundle_loaded = 0; _crt_found = 0; diff --git a/wolfcrypt/src/port/riscv/riscv-64-aes.c b/wolfcrypt/src/port/riscv/riscv-64-aes.c index 3ca35419c..9040b83ab 100644 --- a/wolfcrypt/src/port/riscv/riscv-64-aes.c +++ b/wolfcrypt/src/port/riscv/riscv-64-aes.c @@ -4082,7 +4082,7 @@ static WC_INLINE void IncrementAesCounter(byte* inOutCtr) { int i; - /* Big-endian aray - start at last element and move back. */ + /* Big-endian array - start at last element and move back. */ for (i = AES_BLOCK_SIZE - 1; i >= 0; i--) { /* Result not zero means no carry. */ if ((++inOutCtr[i]) != 0) { @@ -4093,7 +4093,7 @@ static WC_INLINE void IncrementAesCounter(byte* inOutCtr) /* Encrypt blocks of data using AES-CTR. * - * Implemenation uses wc_AesEncrypt(). + * Implementation uses wc_AesEncrypt(). * * @param [in] aes AES object. * @param [out] out Encrypted blocks. @@ -8788,7 +8788,7 @@ static WC_INLINE void IncrementGcmCounter(byte* inOutCtr) { int i; - /* Big-endian aray - start at last element and move back. */ + /* Big-endian array - start at last element and move back. */ for (i = AES_BLOCK_SIZE - 1; i >= AES_BLOCK_SIZE - CTR_SZ; i--) { /* Result not zero means no carry. */ if ((++inOutCtr[i]) != 0) { diff --git a/wolfcrypt/src/port/riscv/riscv-64-chacha.c b/wolfcrypt/src/port/riscv/riscv-64-chacha.c index a1195713d..85cb1eb47 100644 --- a/wolfcrypt/src/port/riscv/riscv-64-chacha.c +++ b/wolfcrypt/src/port/riscv/riscv-64-chacha.c @@ -698,7 +698,7 @@ static WC_INLINE void wc_chacha_encrypt_384(const word32* input, const byte* m, * v12-v15 - fourth block * v16-v19 - fifth block * v20-v24 - temp/message - * v25-v27 - indeces for rotating words in vector + * v25-v27 - indices for rotating words in vector * v28-v31 - input * * v0 0 1 2 3 @@ -1342,7 +1342,7 @@ static WC_INLINE int wc_chacha_encrypt_256(const word32* input, const byte* m, * v12-v15 - message * v16-v19 - input * v20-v22 - temp - * v23-v25 - indeces for rotating words in vector + * v23-v25 - indices for rotating words in vector * * v0 0 1 2 3 * v1 4 5 6 7 @@ -1588,7 +1588,7 @@ static WC_INLINE int wc_chacha_encrypt_128(const word32* input, const byte* m, * v12-v15 - message * v16-v19 - input * v20-v22 - temp - * v23-v25 - indeces for rotating words in vector + * v23-v25 - indices for rotating words in vector * * v0 0 1 2 3 * v1 4 5 6 7 diff --git a/wolfcrypt/src/port/riscv/riscv-64-sha256.c b/wolfcrypt/src/port/riscv/riscv-64-sha256.c index 00fbc1ee5..099e56744 100644 --- a/wolfcrypt/src/port/riscv/riscv-64-sha256.c +++ b/wolfcrypt/src/port/riscv/riscv-64-sha256.c @@ -76,7 +76,7 @@ static const FLASH_QUALIFIER ALIGN32 word32 K[64] = { 0x90BEFFFAL, 0xA4506CEBL, 0xBEF9A3F7L, 0xC67178F2L }; -/* Initialze SHA-256 object for hashing. +/* Initialize SHA-256 object for hashing. * * @param [in, out] sha256 SHA-256 object. */ @@ -1192,7 +1192,7 @@ int wc_Sha256HashBlock(wc_Sha256* sha256, const unsigned char* data, #ifdef WOLFSSL_SHA224 -/* Initialze SHA-224 object for hashing. +/* Initialize SHA-224 object for hashing. * * @param [in, out] sha224 SHA-224 object. */ diff --git a/wolfcrypt/src/port/riscv/riscv-64-sha512.c b/wolfcrypt/src/port/riscv/riscv-64-sha512.c index 143dcc4a6..217761e9e 100644 --- a/wolfcrypt/src/port/riscv/riscv-64-sha512.c +++ b/wolfcrypt/src/port/riscv/riscv-64-sha512.c @@ -129,7 +129,7 @@ static int InitSha512(wc_Sha512* sha512, void* heap, int devId) return ret; } -/* Initialze SHA-512 object for hashing. +/* Initialize SHA-512 object for hashing. * * @param [in, out] sha512 SHA-512 object. */ @@ -1493,7 +1493,7 @@ int wc_Sha512_256Transform(wc_Sha512* sha512, const unsigned char* data) #ifdef WOLFSSL_SHA384 -/* Initialze SHA-384 object for hashing. +/* Initialize SHA-384 object for hashing. * * @param [in, out] sha384 SHA-384 object. */