diff --git a/embedded/tls-client-server.c b/embedded/tls-client-server.c index e95de85d..548b079d 100644 --- a/embedded/tls-client-server.c +++ b/embedded/tls-client-server.c @@ -164,7 +164,7 @@ static int wolfssl_client_new(WOLFSSL_CTX** ctx, WOLFSSL** ssl) /* Load CA certificates into WOLFSSL_CTX */ if (wolfSSL_CTX_load_verify_buffer(client_ctx, CA_CERTS, CA_CERTS_LEN, WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) { - printf("ERROR: failed to load CA certiifcate\n"); + printf("ERROR: failed to load CA certificate\n"); ret = -1; } } @@ -240,7 +240,7 @@ static int wolfssl_server_new(WOLFSSL_CTX** ctx, WOLFSSL** ssl) /* Load client certificates into WOLFSSL_CTX */ if (wolfSSL_CTX_use_certificate_buffer(server_ctx, SERVER_CERT, SERVER_CERT_LEN, WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) { - printf("ERROR: failed to load server certiifcate\n"); + printf("ERROR: failed to load server certificate\n"); ret = -1; } } diff --git a/embedded/tls-sock-client-ca.c b/embedded/tls-sock-client-ca.c index 27acb8fa..3c05c0ef 100644 --- a/embedded/tls-sock-client-ca.c +++ b/embedded/tls-sock-client-ca.c @@ -47,7 +47,7 @@ static int wolfssl_client_ctx_new(WOLFSSL_CTX** ctx) /* Load client certificates into WOLFSSL_CTX */ if (wolfSSL_CTX_load_verify_buffer(client_ctx, CA_CERTS, CA_CERTS_LEN, WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) { - printf("ERROR: failed to load CA certiifcate\n"); + printf("ERROR: failed to load CA certificate\n"); ret = -1; } } @@ -56,7 +56,7 @@ static int wolfssl_client_ctx_new(WOLFSSL_CTX** ctx) /* Load client certificates into WOLFSSL_CTX */ if (wolfSSL_CTX_use_certificate_buffer(client_ctx, CLIENT_CERT, CLIENT_CERT_LEN, WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) { - printf("ERROR: failed to load client certiifcate\n"); + printf("ERROR: failed to load client certificate\n"); ret = -1; } } diff --git a/embedded/tls-sock-client.c b/embedded/tls-sock-client.c index 5a28fbf0..62e38f9b 100644 --- a/embedded/tls-sock-client.c +++ b/embedded/tls-sock-client.c @@ -45,7 +45,7 @@ static int wolfssl_client_ctx_new(WOLFSSL_CTX** ctx) /* Load client certificates into WOLFSSL_CTX */ if (wolfSSL_CTX_load_verify_buffer(client_ctx, CA_CERTS, CA_CERTS_LEN, WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) { - printf("ERROR: failed to load CA certiifcate\n"); + printf("ERROR: failed to load CA certificate\n"); ret = -1; } } diff --git a/embedded/tls-sock-server-ca.c b/embedded/tls-sock-server-ca.c index dfa3babc..0b6e96d5 100644 --- a/embedded/tls-sock-server-ca.c +++ b/embedded/tls-sock-server-ca.c @@ -60,7 +60,7 @@ static int wolfssl_server_ctx_new(WOLFSSL_CTX** ctx) /* Load client certificates into WOLFSSL_CTX */ if (wolfSSL_CTX_use_certificate_buffer(server_ctx, SERVER_CERT, SERVER_CERT_LEN, WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) { - printf("ERROR: failed to load server certiifcate\n"); + printf("ERROR: failed to load server certificate\n"); ret = -1; } } @@ -81,7 +81,7 @@ static int wolfssl_server_ctx_new(WOLFSSL_CTX** ctx) /* Load server certificates into WOLFSSL_CTX */ if (wolfSSL_CTX_load_verify_buffer(server_ctx, CLIENT_CERT, CLIENT_CERT_LEN, WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) { - printf("ERROR: failed to load CA certiifcate\n"); + printf("ERROR: failed to load CA certificate\n"); ret = -1; } } @@ -201,11 +201,11 @@ static int wolfssl_server_listen_tcp(SOCKET_T* fd) static int wolfssl_server_accept_tcp(WOLFSSL* ssl, SOCKET_T fd, SOCKET_T* acceptfd) { - int ret = 0; + int ret = 0; SOCKET_T clientfd = WOLFSSL_SOCKET_INVALID; ret = tcp_accept(&fd, &clientfd); - if (ret == 0) { + if (ret == 0) { *acceptfd = clientfd; ret = tcp_set_nonblocking(&clientfd); } @@ -243,7 +243,7 @@ static int server(WOLFSSL_CTX* server_ctx, SOCKET_T sockfd) /* Receive HTTP request */ if (ret == 0) ret = wolfssl_recv(server_ssl); - /* Send HTTP repsonse */ + /* Send HTTP response */ if (ret == 0) ret = wolfssl_send(server_ssl, msgHTTPIndex); diff --git a/embedded/tls-sock-server.c b/embedded/tls-sock-server.c index 62634a31..3358d26e 100644 --- a/embedded/tls-sock-server.c +++ b/embedded/tls-sock-server.c @@ -58,7 +58,7 @@ static int wolfssl_server_ctx_new(WOLFSSL_CTX** ctx) /* Load client certificates into WOLFSSL_CTX */ if (wolfSSL_CTX_use_certificate_buffer(server_ctx, SERVER_CERT, SERVER_CERT_LEN, WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) { - printf("ERROR: failed to load server certiifcate\n"); + printf("ERROR: failed to load server certificate\n"); ret = -1; } } @@ -187,11 +187,11 @@ static int wolfssl_server_listen_tcp(SOCKET_T* fd) static int wolfssl_server_accept_tcp(WOLFSSL* ssl, SOCKET_T fd, SOCKET_T* acceptfd) { - int ret = 0; + int ret = 0; SOCKET_T clientfd = WOLFSSL_SOCKET_INVALID; ret = tcp_accept(&fd, &clientfd); - if (ret == 0) { + if (ret == 0) { *acceptfd = clientfd; ret = tcp_set_nonblocking(&clientfd); } @@ -229,7 +229,7 @@ static int server(WOLFSSL_CTX* server_ctx, SOCKET_T sockfd) /* Receive HTTP request */ if (ret == 0) ret = wolfssl_recv(server_ssl); - /* Send HTTP repsonse */ + /* Send HTTP response */ if (ret == 0) ret = wolfssl_send(server_ssl, msgHTTPIndex); diff --git a/embedded/tls-sock-threaded.c b/embedded/tls-sock-threaded.c index c89a2998..1f4aaa55 100644 --- a/embedded/tls-sock-threaded.c +++ b/embedded/tls-sock-threaded.c @@ -65,7 +65,7 @@ static int wolfssl_client_new(WOLFSSL_CTX** ctx, WOLFSSL** ssl) /* Load client certificates into WOLFSSL_CTX */ if (wolfSSL_CTX_load_verify_buffer(client_ctx, CA_CERTS, CA_CERTS_LEN, WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) { - printf("ERROR: failed to load CA certiifcate\n"); + printf("ERROR: failed to load CA certificate\n"); ret = -1; } } @@ -133,7 +133,7 @@ static int wolfssl_server_new(WOLFSSL_CTX** ctx, WOLFSSL** ssl) /* Load client certificates into WOLFSSL_CTX */ if (wolfSSL_CTX_use_certificate_buffer(server_ctx, SERVER_CERT, SERVER_CERT_LEN, WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) { - printf("ERROR: failed to load server certiifcate\n"); + printf("ERROR: failed to load server certificate\n"); ret = -1; } } @@ -281,7 +281,7 @@ static void join_thread(THREAD_TYPE thread) /* Accept the TCP connection from the client. */ int wolfssl_server_accept_tcp(WOLFSSL* ssl, SOCKET_T* fd, SOCKET_T* acceptfd) { - int ret = 0; + int ret = 0; SOCKET_T sockfd = WOLFSSL_SOCKET_INVALID; SOCKET_T clientfd = WOLFSSL_SOCKET_INVALID; word16 port = wolfSSLPort; @@ -292,7 +292,7 @@ int wolfssl_server_accept_tcp(WOLFSSL* ssl, SOCKET_T* fd, SOCKET_T* acceptfd) if (ret == 0) ret = tcp_accept(&sockfd, &clientfd); - if (ret == 0) { + if (ret == 0) { *acceptfd = clientfd; ret = tcp_set_nonblocking(&clientfd); } @@ -335,7 +335,7 @@ static THREAD_RETURN WOLFSSL_THREAD server_thread(void* args) } if (ret == 1) ret = 0; - /* Send HTTP repsonse */ + /* Send HTTP response */ if (ret == 0) ret = wolfssl_send(server_ssl, msgHTTPIndex); @@ -409,7 +409,7 @@ static int client() printf("Client Return: %d\n", ret); - /* Free client conenction data */ + /* Free client connection data */ wolfssl_free(client_ctx, client_ssl); if (sockfd != WOLFSSL_SOCKET_INVALID) diff --git a/embedded/tls-threaded.c b/embedded/tls-threaded.c index 2cb6d32a..00c3c19a 100644 --- a/embedded/tls-threaded.c +++ b/embedded/tls-threaded.c @@ -158,7 +158,7 @@ static int wolfssl_client_new(WOLFSSL_CTX** ctx, WOLFSSL** ssl) /* Load client certificates into WOLFSSL_CTX */ if (wolfSSL_CTX_load_verify_buffer(client_ctx, CA_CERTS, CA_CERTS_LEN, WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) { - printf("ERROR: failed to load CA certiifcate\n"); + printf("ERROR: failed to load CA certificate\n"); ret = -1; } } @@ -229,7 +229,7 @@ static int wolfssl_server_new(WOLFSSL_CTX** ctx, WOLFSSL** ssl) /* Load client certificates into WOLFSSL_CTX */ if (wolfSSL_CTX_use_certificate_buffer(server_ctx, SERVER_CERT, SERVER_CERT_LEN, WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) { - printf("ERROR: failed to load server certiifcate\n"); + printf("ERROR: failed to load server certificate\n"); ret = -1; } } @@ -400,7 +400,7 @@ static THREAD_RETURN WOLFSSL_THREAD server_thread(void* args) } if (ret == 1) ret = 0; - /* Send HTTP repsonse */ + /* Send HTTP response */ if (ret == 0) ret = wolfssl_send(server_ssl, msgHTTPIndex); @@ -447,7 +447,7 @@ static int client() printf("Client Return: %d\n", ret); - /* Free client conenction data */ + /* Free client connection data */ wolfssl_free(client_ctx, client_ssl); return ret;