More spelling fixes

This commit is contained in:
Andras Fekete 2024-10-07 08:55:03 -04:00
parent 6c4b403fa4
commit 8ecfe311d8
9 changed files with 23 additions and 23 deletions

View File

@ -17,4 +17,4 @@ jobs:
check_filenames: true
check_hidden: true
# Add comma separated list of words to ignore (sorted alphabetically, case sensitive)
ignore_words_list: adin,ADn,aNULL,carryIn,cconfiguration,chainG,ciph,cLen,cliKs,creen,dout,ede,endianess,Endianess,Fo,haveA,hashIn,larg,LEAPYEAR,inCreated,inOut,inout,Merget,optionA,optmization,parm,parms,rIn,ser,siz,Te,te,TOOM,userA,vie,vlaue
ignore_words_list: adin,ADn,aNULL,carryIn,cconfiguration,chainG,ciph,cLen,cliKs,creen,dout,ede,endianess,Endianess,Fo,haveA,hashIn,larg,LEAPYEAR,inCreated,inOut,inout,Merget,mot,optionA,optmization,parm,parms,rIn,ser,siz,Te,te,TOOM,userA,vie,vlaue

View File

@ -567,7 +567,7 @@ static int km_AesGcmSetAuthsize(struct crypto_aead *tfm, unsigned int authsize)
}
/*
* aead ciphers recieve data in scatterlists in following order:
* aead ciphers receive data in scatterlists in following order:
* encrypt
* req->src: aad||plaintext
* req->dst: aad||ciphertext||tag

View File

@ -305,7 +305,7 @@ static struct wc_thread_fpu_count_ent *wc_linuxkm_fpu_state_assoc_unlikely(int c
}
} else {
/* check for migration. this can happen despite our best efforts if any
* I/O occured while locked, e.g. kernel messages like "uninitialized
* I/O occurred while locked, e.g. kernel messages like "uninitialized
* urandom read". since we're locked now, we can safely migrate the
* entry in wc_linuxkm_fpu_states[], freeing up the slot on the previous
* cpu.

View File

@ -44,7 +44,7 @@ until a PR is created for upstream support.
### Time
The wolfSSL libraries are by default considerably more robust and strict. As such, it is important to have an accurate
time and date setting for the certficate date ranges.. The wolfssL libraries include some
time and date setting for the certificate date ranges.. The wolfssL libraries include some
[time helper functions](https://github.com/wolfSSL/wolfssl/blob/master/wolfssl/wolfcrypt/port/Espressif/esp-sdk-lib.h).
These can be enabled with `#define USE_WOLFSSL_ESP_SDK_TIME` in the `user_settings.h`.

View File

@ -159,8 +159,8 @@ esp_err_t esp_crt_bundle_attach(void *conf)
*
* The default is having the bundle pre-sorted in the python script
* to allow for rapid binary cert match search at runtime. The unsorted
* seach ALWAYS works, but when expecting a sorted search the python
* script MUST presort the data, oherwise the connection will likely fail.
* search ALWAYS works, but when expecting a sorted search the python
* script MUST presort the data, otherwise the connection will likely fail.
*
* When debugging and using an unsorted bundle, define CERT_BUNDLE_UNSORTED
* Reminder: the actual sort occurs in gen_crt_bundly.py call from CMake. */
@ -677,7 +677,7 @@ static CB_INLINE int wolfssl_ssl_conf_verify_cb_no_signer(int preverify,
* NOTE: To save memory, the store `cert` from above is overwritten below.
* Any details needed from the store `cert` should have been saved.
*
* We'll proceed by assiging `cert` to each of the respective items in
* We'll proceed by assigning `cert` to each of the respective items in
* bundle as we attempt to find the desired cert: */
if (ret == WOLFSSL_SUCCESS) {
_cert_bundle_loaded = 1;
@ -843,7 +843,7 @@ static CB_INLINE int wolfssl_ssl_conf_verify_cb_no_signer(int preverify,
* so we don't need to clean them up explicitly.
*
* However, we'll start over with a freash bundle_cert for the
* next search interation. */
* next search iteration. */
if (bundle_cert != NULL) {
wolfSSL_X509_free(bundle_cert);
}
@ -918,7 +918,7 @@ static CB_INLINE int wolfssl_ssl_conf_verify_cb_no_signer(int preverify,
}
/* Note that although we are adding a certificate to the store
* now, it is too late to be used in the current TLS connecton
* now, it is too late to be used in the current TLS connection
* that caused the callback. See the Cerfiicate Manager for
* validation and possible overriding of preverify values. */
ESP_LOGCBI(TAG, "\n\nAdding Cert for Certificate Store!\n");
@ -993,7 +993,7 @@ static CB_INLINE int wolfssl_ssl_conf_verify_cb_no_signer(int preverify,
* for reference:
* typedef int (*VerifyCallback)(int, WOLFSSL_X509_STORE_CTX*);
*
* This is the callback for TLS handshake verify / valiation. See related:
* This is the callback for TLS handshake verify / validation. See related:
* wolfssl_ssl_conf_verify_cb_no_signer
* wolfssl_ssl_conf_verify_cb_before_date
* wolfssl_ssl_conf_verify_cb_after_date
@ -1133,7 +1133,7 @@ void CB_INLINE wolfssl_ssl_conf_verify(wolfssl_ssl_config *conf,
int (*f_vrfy) WOLFSSL_X509_VERIFY_CALLBACK,
void (*p_vrfy) )
{
/* Other Crytographic providers for reference:
/* Other Cryptographic providers for reference:
conf->f_vrfy = f_vrfy; (verification function callback)
conf->p_vrfy = p_vrfy; (pre-verification value)
*/
@ -1270,7 +1270,7 @@ esp_err_t esp_crt_bundle_is_valid(void)
/* Initialize the bundle into an array so we can do binary
* search for certs; the bundle generated by the python utility is
* normally already presorted by subject name attrbutes in ARBITRARY order!
* normally already presorted by subject name attributes in ARBITRARY order!
*
* See gen_crt_bundle.py regarding element extraction sort.
*
@ -1287,7 +1287,7 @@ static esp_err_t wolfssl_esp_crt_bundle_init(const uint8_t *x509_bundle,
int ret = ESP_OK;
WOLFSSL_ENTER("wolfssl_esp_crt_bundle_init");
_esp_crt_bundle_is_valid = ESP_OK; /* Assume valid until proven otherise. */
_esp_crt_bundle_is_valid = ESP_OK; /* Assume valid until proven otherwise. */
_cert_bundle_loaded = 0;
_crt_found = 0;

View File

@ -4082,7 +4082,7 @@ static WC_INLINE void IncrementAesCounter(byte* inOutCtr)
{
int i;
/* Big-endian aray - start at last element and move back. */
/* Big-endian array - start at last element and move back. */
for (i = AES_BLOCK_SIZE - 1; i >= 0; i--) {
/* Result not zero means no carry. */
if ((++inOutCtr[i]) != 0) {
@ -4093,7 +4093,7 @@ static WC_INLINE void IncrementAesCounter(byte* inOutCtr)
/* Encrypt blocks of data using AES-CTR.
*
* Implemenation uses wc_AesEncrypt().
* Implementation uses wc_AesEncrypt().
*
* @param [in] aes AES object.
* @param [out] out Encrypted blocks.
@ -8788,7 +8788,7 @@ static WC_INLINE void IncrementGcmCounter(byte* inOutCtr)
{
int i;
/* Big-endian aray - start at last element and move back. */
/* Big-endian array - start at last element and move back. */
for (i = AES_BLOCK_SIZE - 1; i >= AES_BLOCK_SIZE - CTR_SZ; i--) {
/* Result not zero means no carry. */
if ((++inOutCtr[i]) != 0) {

View File

@ -698,7 +698,7 @@ static WC_INLINE void wc_chacha_encrypt_384(const word32* input, const byte* m,
* v12-v15 - fourth block
* v16-v19 - fifth block
* v20-v24 - temp/message
* v25-v27 - indeces for rotating words in vector
* v25-v27 - indices for rotating words in vector
* v28-v31 - input
*
* v0 0 1 2 3
@ -1342,7 +1342,7 @@ static WC_INLINE int wc_chacha_encrypt_256(const word32* input, const byte* m,
* v12-v15 - message
* v16-v19 - input
* v20-v22 - temp
* v23-v25 - indeces for rotating words in vector
* v23-v25 - indices for rotating words in vector
*
* v0 0 1 2 3
* v1 4 5 6 7
@ -1588,7 +1588,7 @@ static WC_INLINE int wc_chacha_encrypt_128(const word32* input, const byte* m,
* v12-v15 - message
* v16-v19 - input
* v20-v22 - temp
* v23-v25 - indeces for rotating words in vector
* v23-v25 - indices for rotating words in vector
*
* v0 0 1 2 3
* v1 4 5 6 7

View File

@ -76,7 +76,7 @@ static const FLASH_QUALIFIER ALIGN32 word32 K[64] = {
0x90BEFFFAL, 0xA4506CEBL, 0xBEF9A3F7L, 0xC67178F2L
};
/* Initialze SHA-256 object for hashing.
/* Initialize SHA-256 object for hashing.
*
* @param [in, out] sha256 SHA-256 object.
*/
@ -1192,7 +1192,7 @@ int wc_Sha256HashBlock(wc_Sha256* sha256, const unsigned char* data,
#ifdef WOLFSSL_SHA224
/* Initialze SHA-224 object for hashing.
/* Initialize SHA-224 object for hashing.
*
* @param [in, out] sha224 SHA-224 object.
*/

View File

@ -129,7 +129,7 @@ static int InitSha512(wc_Sha512* sha512, void* heap, int devId)
return ret;
}
/* Initialze SHA-512 object for hashing.
/* Initialize SHA-512 object for hashing.
*
* @param [in, out] sha512 SHA-512 object.
*/
@ -1493,7 +1493,7 @@ int wc_Sha512_256Transform(wc_Sha512* sha512, const unsigned char* data)
#ifdef WOLFSSL_SHA384
/* Initialze SHA-384 object for hashing.
/* Initialize SHA-384 object for hashing.
*
* @param [in, out] sha384 SHA-384 object.
*/