More spelling fixes
This commit is contained in:
parent
6c4b403fa4
commit
8ecfe311d8
2
.github/workflows/codespell.yml
vendored
2
.github/workflows/codespell.yml
vendored
@ -17,4 +17,4 @@ jobs:
|
|||||||
check_filenames: true
|
check_filenames: true
|
||||||
check_hidden: true
|
check_hidden: true
|
||||||
# Add comma separated list of words to ignore (sorted alphabetically, case sensitive)
|
# Add comma separated list of words to ignore (sorted alphabetically, case sensitive)
|
||||||
ignore_words_list: adin,ADn,aNULL,carryIn,cconfiguration,chainG,ciph,cLen,cliKs,creen,dout,ede,endianess,Endianess,Fo,haveA,hashIn,larg,LEAPYEAR,inCreated,inOut,inout,Merget,optionA,optmization,parm,parms,rIn,ser,siz,Te,te,TOOM,userA,vie,vlaue
|
ignore_words_list: adin,ADn,aNULL,carryIn,cconfiguration,chainG,ciph,cLen,cliKs,creen,dout,ede,endianess,Endianess,Fo,haveA,hashIn,larg,LEAPYEAR,inCreated,inOut,inout,Merget,mot,optionA,optmization,parm,parms,rIn,ser,siz,Te,te,TOOM,userA,vie,vlaue
|
||||||
|
@ -567,7 +567,7 @@ static int km_AesGcmSetAuthsize(struct crypto_aead *tfm, unsigned int authsize)
|
|||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* aead ciphers recieve data in scatterlists in following order:
|
* aead ciphers receive data in scatterlists in following order:
|
||||||
* encrypt
|
* encrypt
|
||||||
* req->src: aad||plaintext
|
* req->src: aad||plaintext
|
||||||
* req->dst: aad||ciphertext||tag
|
* req->dst: aad||ciphertext||tag
|
||||||
|
@ -305,7 +305,7 @@ static struct wc_thread_fpu_count_ent *wc_linuxkm_fpu_state_assoc_unlikely(int c
|
|||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
/* check for migration. this can happen despite our best efforts if any
|
/* check for migration. this can happen despite our best efforts if any
|
||||||
* I/O occured while locked, e.g. kernel messages like "uninitialized
|
* I/O occurred while locked, e.g. kernel messages like "uninitialized
|
||||||
* urandom read". since we're locked now, we can safely migrate the
|
* urandom read". since we're locked now, we can safely migrate the
|
||||||
* entry in wc_linuxkm_fpu_states[], freeing up the slot on the previous
|
* entry in wc_linuxkm_fpu_states[], freeing up the slot on the previous
|
||||||
* cpu.
|
* cpu.
|
||||||
|
@ -44,7 +44,7 @@ until a PR is created for upstream support.
|
|||||||
### Time
|
### Time
|
||||||
|
|
||||||
The wolfSSL libraries are by default considerably more robust and strict. As such, it is important to have an accurate
|
The wolfSSL libraries are by default considerably more robust and strict. As such, it is important to have an accurate
|
||||||
time and date setting for the certficate date ranges.. The wolfssL libraries include some
|
time and date setting for the certificate date ranges.. The wolfssL libraries include some
|
||||||
[time helper functions](https://github.com/wolfSSL/wolfssl/blob/master/wolfssl/wolfcrypt/port/Espressif/esp-sdk-lib.h).
|
[time helper functions](https://github.com/wolfSSL/wolfssl/blob/master/wolfssl/wolfcrypt/port/Espressif/esp-sdk-lib.h).
|
||||||
These can be enabled with `#define USE_WOLFSSL_ESP_SDK_TIME` in the `user_settings.h`.
|
These can be enabled with `#define USE_WOLFSSL_ESP_SDK_TIME` in the `user_settings.h`.
|
||||||
|
|
||||||
|
@ -159,8 +159,8 @@ esp_err_t esp_crt_bundle_attach(void *conf)
|
|||||||
*
|
*
|
||||||
* The default is having the bundle pre-sorted in the python script
|
* The default is having the bundle pre-sorted in the python script
|
||||||
* to allow for rapid binary cert match search at runtime. The unsorted
|
* to allow for rapid binary cert match search at runtime. The unsorted
|
||||||
* seach ALWAYS works, but when expecting a sorted search the python
|
* search ALWAYS works, but when expecting a sorted search the python
|
||||||
* script MUST presort the data, oherwise the connection will likely fail.
|
* script MUST presort the data, otherwise the connection will likely fail.
|
||||||
*
|
*
|
||||||
* When debugging and using an unsorted bundle, define CERT_BUNDLE_UNSORTED
|
* When debugging and using an unsorted bundle, define CERT_BUNDLE_UNSORTED
|
||||||
* Reminder: the actual sort occurs in gen_crt_bundly.py call from CMake. */
|
* Reminder: the actual sort occurs in gen_crt_bundly.py call from CMake. */
|
||||||
@ -677,7 +677,7 @@ static CB_INLINE int wolfssl_ssl_conf_verify_cb_no_signer(int preverify,
|
|||||||
* NOTE: To save memory, the store `cert` from above is overwritten below.
|
* NOTE: To save memory, the store `cert` from above is overwritten below.
|
||||||
* Any details needed from the store `cert` should have been saved.
|
* Any details needed from the store `cert` should have been saved.
|
||||||
*
|
*
|
||||||
* We'll proceed by assiging `cert` to each of the respective items in
|
* We'll proceed by assigning `cert` to each of the respective items in
|
||||||
* bundle as we attempt to find the desired cert: */
|
* bundle as we attempt to find the desired cert: */
|
||||||
if (ret == WOLFSSL_SUCCESS) {
|
if (ret == WOLFSSL_SUCCESS) {
|
||||||
_cert_bundle_loaded = 1;
|
_cert_bundle_loaded = 1;
|
||||||
@ -843,7 +843,7 @@ static CB_INLINE int wolfssl_ssl_conf_verify_cb_no_signer(int preverify,
|
|||||||
* so we don't need to clean them up explicitly.
|
* so we don't need to clean them up explicitly.
|
||||||
*
|
*
|
||||||
* However, we'll start over with a freash bundle_cert for the
|
* However, we'll start over with a freash bundle_cert for the
|
||||||
* next search interation. */
|
* next search iteration. */
|
||||||
if (bundle_cert != NULL) {
|
if (bundle_cert != NULL) {
|
||||||
wolfSSL_X509_free(bundle_cert);
|
wolfSSL_X509_free(bundle_cert);
|
||||||
}
|
}
|
||||||
@ -918,7 +918,7 @@ static CB_INLINE int wolfssl_ssl_conf_verify_cb_no_signer(int preverify,
|
|||||||
}
|
}
|
||||||
|
|
||||||
/* Note that although we are adding a certificate to the store
|
/* Note that although we are adding a certificate to the store
|
||||||
* now, it is too late to be used in the current TLS connecton
|
* now, it is too late to be used in the current TLS connection
|
||||||
* that caused the callback. See the Cerfiicate Manager for
|
* that caused the callback. See the Cerfiicate Manager for
|
||||||
* validation and possible overriding of preverify values. */
|
* validation and possible overriding of preverify values. */
|
||||||
ESP_LOGCBI(TAG, "\n\nAdding Cert for Certificate Store!\n");
|
ESP_LOGCBI(TAG, "\n\nAdding Cert for Certificate Store!\n");
|
||||||
@ -993,7 +993,7 @@ static CB_INLINE int wolfssl_ssl_conf_verify_cb_no_signer(int preverify,
|
|||||||
* for reference:
|
* for reference:
|
||||||
* typedef int (*VerifyCallback)(int, WOLFSSL_X509_STORE_CTX*);
|
* typedef int (*VerifyCallback)(int, WOLFSSL_X509_STORE_CTX*);
|
||||||
*
|
*
|
||||||
* This is the callback for TLS handshake verify / valiation. See related:
|
* This is the callback for TLS handshake verify / validation. See related:
|
||||||
* wolfssl_ssl_conf_verify_cb_no_signer
|
* wolfssl_ssl_conf_verify_cb_no_signer
|
||||||
* wolfssl_ssl_conf_verify_cb_before_date
|
* wolfssl_ssl_conf_verify_cb_before_date
|
||||||
* wolfssl_ssl_conf_verify_cb_after_date
|
* wolfssl_ssl_conf_verify_cb_after_date
|
||||||
@ -1133,7 +1133,7 @@ void CB_INLINE wolfssl_ssl_conf_verify(wolfssl_ssl_config *conf,
|
|||||||
int (*f_vrfy) WOLFSSL_X509_VERIFY_CALLBACK,
|
int (*f_vrfy) WOLFSSL_X509_VERIFY_CALLBACK,
|
||||||
void (*p_vrfy) )
|
void (*p_vrfy) )
|
||||||
{
|
{
|
||||||
/* Other Crytographic providers for reference:
|
/* Other Cryptographic providers for reference:
|
||||||
conf->f_vrfy = f_vrfy; (verification function callback)
|
conf->f_vrfy = f_vrfy; (verification function callback)
|
||||||
conf->p_vrfy = p_vrfy; (pre-verification value)
|
conf->p_vrfy = p_vrfy; (pre-verification value)
|
||||||
*/
|
*/
|
||||||
@ -1270,7 +1270,7 @@ esp_err_t esp_crt_bundle_is_valid(void)
|
|||||||
|
|
||||||
/* Initialize the bundle into an array so we can do binary
|
/* Initialize the bundle into an array so we can do binary
|
||||||
* search for certs; the bundle generated by the python utility is
|
* search for certs; the bundle generated by the python utility is
|
||||||
* normally already presorted by subject name attrbutes in ARBITRARY order!
|
* normally already presorted by subject name attributes in ARBITRARY order!
|
||||||
*
|
*
|
||||||
* See gen_crt_bundle.py regarding element extraction sort.
|
* See gen_crt_bundle.py regarding element extraction sort.
|
||||||
*
|
*
|
||||||
@ -1287,7 +1287,7 @@ static esp_err_t wolfssl_esp_crt_bundle_init(const uint8_t *x509_bundle,
|
|||||||
int ret = ESP_OK;
|
int ret = ESP_OK;
|
||||||
|
|
||||||
WOLFSSL_ENTER("wolfssl_esp_crt_bundle_init");
|
WOLFSSL_ENTER("wolfssl_esp_crt_bundle_init");
|
||||||
_esp_crt_bundle_is_valid = ESP_OK; /* Assume valid until proven otherise. */
|
_esp_crt_bundle_is_valid = ESP_OK; /* Assume valid until proven otherwise. */
|
||||||
|
|
||||||
_cert_bundle_loaded = 0;
|
_cert_bundle_loaded = 0;
|
||||||
_crt_found = 0;
|
_crt_found = 0;
|
||||||
|
@ -4082,7 +4082,7 @@ static WC_INLINE void IncrementAesCounter(byte* inOutCtr)
|
|||||||
{
|
{
|
||||||
int i;
|
int i;
|
||||||
|
|
||||||
/* Big-endian aray - start at last element and move back. */
|
/* Big-endian array - start at last element and move back. */
|
||||||
for (i = AES_BLOCK_SIZE - 1; i >= 0; i--) {
|
for (i = AES_BLOCK_SIZE - 1; i >= 0; i--) {
|
||||||
/* Result not zero means no carry. */
|
/* Result not zero means no carry. */
|
||||||
if ((++inOutCtr[i]) != 0) {
|
if ((++inOutCtr[i]) != 0) {
|
||||||
@ -4093,7 +4093,7 @@ static WC_INLINE void IncrementAesCounter(byte* inOutCtr)
|
|||||||
|
|
||||||
/* Encrypt blocks of data using AES-CTR.
|
/* Encrypt blocks of data using AES-CTR.
|
||||||
*
|
*
|
||||||
* Implemenation uses wc_AesEncrypt().
|
* Implementation uses wc_AesEncrypt().
|
||||||
*
|
*
|
||||||
* @param [in] aes AES object.
|
* @param [in] aes AES object.
|
||||||
* @param [out] out Encrypted blocks.
|
* @param [out] out Encrypted blocks.
|
||||||
@ -8788,7 +8788,7 @@ static WC_INLINE void IncrementGcmCounter(byte* inOutCtr)
|
|||||||
{
|
{
|
||||||
int i;
|
int i;
|
||||||
|
|
||||||
/* Big-endian aray - start at last element and move back. */
|
/* Big-endian array - start at last element and move back. */
|
||||||
for (i = AES_BLOCK_SIZE - 1; i >= AES_BLOCK_SIZE - CTR_SZ; i--) {
|
for (i = AES_BLOCK_SIZE - 1; i >= AES_BLOCK_SIZE - CTR_SZ; i--) {
|
||||||
/* Result not zero means no carry. */
|
/* Result not zero means no carry. */
|
||||||
if ((++inOutCtr[i]) != 0) {
|
if ((++inOutCtr[i]) != 0) {
|
||||||
|
@ -698,7 +698,7 @@ static WC_INLINE void wc_chacha_encrypt_384(const word32* input, const byte* m,
|
|||||||
* v12-v15 - fourth block
|
* v12-v15 - fourth block
|
||||||
* v16-v19 - fifth block
|
* v16-v19 - fifth block
|
||||||
* v20-v24 - temp/message
|
* v20-v24 - temp/message
|
||||||
* v25-v27 - indeces for rotating words in vector
|
* v25-v27 - indices for rotating words in vector
|
||||||
* v28-v31 - input
|
* v28-v31 - input
|
||||||
*
|
*
|
||||||
* v0 0 1 2 3
|
* v0 0 1 2 3
|
||||||
@ -1342,7 +1342,7 @@ static WC_INLINE int wc_chacha_encrypt_256(const word32* input, const byte* m,
|
|||||||
* v12-v15 - message
|
* v12-v15 - message
|
||||||
* v16-v19 - input
|
* v16-v19 - input
|
||||||
* v20-v22 - temp
|
* v20-v22 - temp
|
||||||
* v23-v25 - indeces for rotating words in vector
|
* v23-v25 - indices for rotating words in vector
|
||||||
*
|
*
|
||||||
* v0 0 1 2 3
|
* v0 0 1 2 3
|
||||||
* v1 4 5 6 7
|
* v1 4 5 6 7
|
||||||
@ -1588,7 +1588,7 @@ static WC_INLINE int wc_chacha_encrypt_128(const word32* input, const byte* m,
|
|||||||
* v12-v15 - message
|
* v12-v15 - message
|
||||||
* v16-v19 - input
|
* v16-v19 - input
|
||||||
* v20-v22 - temp
|
* v20-v22 - temp
|
||||||
* v23-v25 - indeces for rotating words in vector
|
* v23-v25 - indices for rotating words in vector
|
||||||
*
|
*
|
||||||
* v0 0 1 2 3
|
* v0 0 1 2 3
|
||||||
* v1 4 5 6 7
|
* v1 4 5 6 7
|
||||||
|
@ -76,7 +76,7 @@ static const FLASH_QUALIFIER ALIGN32 word32 K[64] = {
|
|||||||
0x90BEFFFAL, 0xA4506CEBL, 0xBEF9A3F7L, 0xC67178F2L
|
0x90BEFFFAL, 0xA4506CEBL, 0xBEF9A3F7L, 0xC67178F2L
|
||||||
};
|
};
|
||||||
|
|
||||||
/* Initialze SHA-256 object for hashing.
|
/* Initialize SHA-256 object for hashing.
|
||||||
*
|
*
|
||||||
* @param [in, out] sha256 SHA-256 object.
|
* @param [in, out] sha256 SHA-256 object.
|
||||||
*/
|
*/
|
||||||
@ -1192,7 +1192,7 @@ int wc_Sha256HashBlock(wc_Sha256* sha256, const unsigned char* data,
|
|||||||
|
|
||||||
#ifdef WOLFSSL_SHA224
|
#ifdef WOLFSSL_SHA224
|
||||||
|
|
||||||
/* Initialze SHA-224 object for hashing.
|
/* Initialize SHA-224 object for hashing.
|
||||||
*
|
*
|
||||||
* @param [in, out] sha224 SHA-224 object.
|
* @param [in, out] sha224 SHA-224 object.
|
||||||
*/
|
*/
|
||||||
|
@ -129,7 +129,7 @@ static int InitSha512(wc_Sha512* sha512, void* heap, int devId)
|
|||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Initialze SHA-512 object for hashing.
|
/* Initialize SHA-512 object for hashing.
|
||||||
*
|
*
|
||||||
* @param [in, out] sha512 SHA-512 object.
|
* @param [in, out] sha512 SHA-512 object.
|
||||||
*/
|
*/
|
||||||
@ -1493,7 +1493,7 @@ int wc_Sha512_256Transform(wc_Sha512* sha512, const unsigned char* data)
|
|||||||
|
|
||||||
#ifdef WOLFSSL_SHA384
|
#ifdef WOLFSSL_SHA384
|
||||||
|
|
||||||
/* Initialze SHA-384 object for hashing.
|
/* Initialize SHA-384 object for hashing.
|
||||||
*
|
*
|
||||||
* @param [in, out] sha384 SHA-384 object.
|
* @param [in, out] sha384 SHA-384 object.
|
||||||
*/
|
*/
|
||||||
|
Loading…
Reference in New Issue
Block a user