Spelling fixes.
parent
7ed94abe13
commit
b18ca7aec0
|
@ -164,7 +164,7 @@ static int wolfssl_client_new(WOLFSSL_CTX** ctx, WOLFSSL** ssl)
|
||||||
/* Load CA certificates into WOLFSSL_CTX */
|
/* Load CA certificates into WOLFSSL_CTX */
|
||||||
if (wolfSSL_CTX_load_verify_buffer(client_ctx, CA_CERTS, CA_CERTS_LEN,
|
if (wolfSSL_CTX_load_verify_buffer(client_ctx, CA_CERTS, CA_CERTS_LEN,
|
||||||
WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) {
|
WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) {
|
||||||
printf("ERROR: failed to load CA certiifcate\n");
|
printf("ERROR: failed to load CA certificate\n");
|
||||||
ret = -1;
|
ret = -1;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -240,7 +240,7 @@ static int wolfssl_server_new(WOLFSSL_CTX** ctx, WOLFSSL** ssl)
|
||||||
/* Load client certificates into WOLFSSL_CTX */
|
/* Load client certificates into WOLFSSL_CTX */
|
||||||
if (wolfSSL_CTX_use_certificate_buffer(server_ctx, SERVER_CERT,
|
if (wolfSSL_CTX_use_certificate_buffer(server_ctx, SERVER_CERT,
|
||||||
SERVER_CERT_LEN, WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) {
|
SERVER_CERT_LEN, WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) {
|
||||||
printf("ERROR: failed to load server certiifcate\n");
|
printf("ERROR: failed to load server certificate\n");
|
||||||
ret = -1;
|
ret = -1;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -47,7 +47,7 @@ static int wolfssl_client_ctx_new(WOLFSSL_CTX** ctx)
|
||||||
/* Load client certificates into WOLFSSL_CTX */
|
/* Load client certificates into WOLFSSL_CTX */
|
||||||
if (wolfSSL_CTX_load_verify_buffer(client_ctx, CA_CERTS, CA_CERTS_LEN,
|
if (wolfSSL_CTX_load_verify_buffer(client_ctx, CA_CERTS, CA_CERTS_LEN,
|
||||||
WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) {
|
WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) {
|
||||||
printf("ERROR: failed to load CA certiifcate\n");
|
printf("ERROR: failed to load CA certificate\n");
|
||||||
ret = -1;
|
ret = -1;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -56,7 +56,7 @@ static int wolfssl_client_ctx_new(WOLFSSL_CTX** ctx)
|
||||||
/* Load client certificates into WOLFSSL_CTX */
|
/* Load client certificates into WOLFSSL_CTX */
|
||||||
if (wolfSSL_CTX_use_certificate_buffer(client_ctx, CLIENT_CERT,
|
if (wolfSSL_CTX_use_certificate_buffer(client_ctx, CLIENT_CERT,
|
||||||
CLIENT_CERT_LEN, WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) {
|
CLIENT_CERT_LEN, WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) {
|
||||||
printf("ERROR: failed to load client certiifcate\n");
|
printf("ERROR: failed to load client certificate\n");
|
||||||
ret = -1;
|
ret = -1;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -45,7 +45,7 @@ static int wolfssl_client_ctx_new(WOLFSSL_CTX** ctx)
|
||||||
/* Load client certificates into WOLFSSL_CTX */
|
/* Load client certificates into WOLFSSL_CTX */
|
||||||
if (wolfSSL_CTX_load_verify_buffer(client_ctx, CA_CERTS, CA_CERTS_LEN,
|
if (wolfSSL_CTX_load_verify_buffer(client_ctx, CA_CERTS, CA_CERTS_LEN,
|
||||||
WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) {
|
WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) {
|
||||||
printf("ERROR: failed to load CA certiifcate\n");
|
printf("ERROR: failed to load CA certificate\n");
|
||||||
ret = -1;
|
ret = -1;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -60,7 +60,7 @@ static int wolfssl_server_ctx_new(WOLFSSL_CTX** ctx)
|
||||||
/* Load client certificates into WOLFSSL_CTX */
|
/* Load client certificates into WOLFSSL_CTX */
|
||||||
if (wolfSSL_CTX_use_certificate_buffer(server_ctx, SERVER_CERT,
|
if (wolfSSL_CTX_use_certificate_buffer(server_ctx, SERVER_CERT,
|
||||||
SERVER_CERT_LEN, WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) {
|
SERVER_CERT_LEN, WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) {
|
||||||
printf("ERROR: failed to load server certiifcate\n");
|
printf("ERROR: failed to load server certificate\n");
|
||||||
ret = -1;
|
ret = -1;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -81,7 +81,7 @@ static int wolfssl_server_ctx_new(WOLFSSL_CTX** ctx)
|
||||||
/* Load server certificates into WOLFSSL_CTX */
|
/* Load server certificates into WOLFSSL_CTX */
|
||||||
if (wolfSSL_CTX_load_verify_buffer(server_ctx, CLIENT_CERT,
|
if (wolfSSL_CTX_load_verify_buffer(server_ctx, CLIENT_CERT,
|
||||||
CLIENT_CERT_LEN, WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) {
|
CLIENT_CERT_LEN, WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) {
|
||||||
printf("ERROR: failed to load CA certiifcate\n");
|
printf("ERROR: failed to load CA certificate\n");
|
||||||
ret = -1;
|
ret = -1;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -243,7 +243,7 @@ static int server(WOLFSSL_CTX* server_ctx, SOCKET_T sockfd)
|
||||||
/* Receive HTTP request */
|
/* Receive HTTP request */
|
||||||
if (ret == 0)
|
if (ret == 0)
|
||||||
ret = wolfssl_recv(server_ssl);
|
ret = wolfssl_recv(server_ssl);
|
||||||
/* Send HTTP repsonse */
|
/* Send HTTP response */
|
||||||
if (ret == 0)
|
if (ret == 0)
|
||||||
ret = wolfssl_send(server_ssl, msgHTTPIndex);
|
ret = wolfssl_send(server_ssl, msgHTTPIndex);
|
||||||
|
|
||||||
|
|
|
@ -58,7 +58,7 @@ static int wolfssl_server_ctx_new(WOLFSSL_CTX** ctx)
|
||||||
/* Load client certificates into WOLFSSL_CTX */
|
/* Load client certificates into WOLFSSL_CTX */
|
||||||
if (wolfSSL_CTX_use_certificate_buffer(server_ctx, SERVER_CERT,
|
if (wolfSSL_CTX_use_certificate_buffer(server_ctx, SERVER_CERT,
|
||||||
SERVER_CERT_LEN, WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) {
|
SERVER_CERT_LEN, WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) {
|
||||||
printf("ERROR: failed to load server certiifcate\n");
|
printf("ERROR: failed to load server certificate\n");
|
||||||
ret = -1;
|
ret = -1;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -229,7 +229,7 @@ static int server(WOLFSSL_CTX* server_ctx, SOCKET_T sockfd)
|
||||||
/* Receive HTTP request */
|
/* Receive HTTP request */
|
||||||
if (ret == 0)
|
if (ret == 0)
|
||||||
ret = wolfssl_recv(server_ssl);
|
ret = wolfssl_recv(server_ssl);
|
||||||
/* Send HTTP repsonse */
|
/* Send HTTP response */
|
||||||
if (ret == 0)
|
if (ret == 0)
|
||||||
ret = wolfssl_send(server_ssl, msgHTTPIndex);
|
ret = wolfssl_send(server_ssl, msgHTTPIndex);
|
||||||
|
|
||||||
|
|
|
@ -65,7 +65,7 @@ static int wolfssl_client_new(WOLFSSL_CTX** ctx, WOLFSSL** ssl)
|
||||||
/* Load client certificates into WOLFSSL_CTX */
|
/* Load client certificates into WOLFSSL_CTX */
|
||||||
if (wolfSSL_CTX_load_verify_buffer(client_ctx, CA_CERTS, CA_CERTS_LEN,
|
if (wolfSSL_CTX_load_verify_buffer(client_ctx, CA_CERTS, CA_CERTS_LEN,
|
||||||
WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) {
|
WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) {
|
||||||
printf("ERROR: failed to load CA certiifcate\n");
|
printf("ERROR: failed to load CA certificate\n");
|
||||||
ret = -1;
|
ret = -1;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -133,7 +133,7 @@ static int wolfssl_server_new(WOLFSSL_CTX** ctx, WOLFSSL** ssl)
|
||||||
/* Load client certificates into WOLFSSL_CTX */
|
/* Load client certificates into WOLFSSL_CTX */
|
||||||
if (wolfSSL_CTX_use_certificate_buffer(server_ctx, SERVER_CERT,
|
if (wolfSSL_CTX_use_certificate_buffer(server_ctx, SERVER_CERT,
|
||||||
SERVER_CERT_LEN, WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) {
|
SERVER_CERT_LEN, WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) {
|
||||||
printf("ERROR: failed to load server certiifcate\n");
|
printf("ERROR: failed to load server certificate\n");
|
||||||
ret = -1;
|
ret = -1;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -335,7 +335,7 @@ static THREAD_RETURN WOLFSSL_THREAD server_thread(void* args)
|
||||||
}
|
}
|
||||||
if (ret == 1)
|
if (ret == 1)
|
||||||
ret = 0;
|
ret = 0;
|
||||||
/* Send HTTP repsonse */
|
/* Send HTTP response */
|
||||||
if (ret == 0)
|
if (ret == 0)
|
||||||
ret = wolfssl_send(server_ssl, msgHTTPIndex);
|
ret = wolfssl_send(server_ssl, msgHTTPIndex);
|
||||||
|
|
||||||
|
@ -409,7 +409,7 @@ static int client()
|
||||||
|
|
||||||
printf("Client Return: %d\n", ret);
|
printf("Client Return: %d\n", ret);
|
||||||
|
|
||||||
/* Free client conenction data */
|
/* Free client connection data */
|
||||||
wolfssl_free(client_ctx, client_ssl);
|
wolfssl_free(client_ctx, client_ssl);
|
||||||
|
|
||||||
if (sockfd != WOLFSSL_SOCKET_INVALID)
|
if (sockfd != WOLFSSL_SOCKET_INVALID)
|
||||||
|
|
|
@ -158,7 +158,7 @@ static int wolfssl_client_new(WOLFSSL_CTX** ctx, WOLFSSL** ssl)
|
||||||
/* Load client certificates into WOLFSSL_CTX */
|
/* Load client certificates into WOLFSSL_CTX */
|
||||||
if (wolfSSL_CTX_load_verify_buffer(client_ctx, CA_CERTS, CA_CERTS_LEN,
|
if (wolfSSL_CTX_load_verify_buffer(client_ctx, CA_CERTS, CA_CERTS_LEN,
|
||||||
WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) {
|
WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) {
|
||||||
printf("ERROR: failed to load CA certiifcate\n");
|
printf("ERROR: failed to load CA certificate\n");
|
||||||
ret = -1;
|
ret = -1;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -229,7 +229,7 @@ static int wolfssl_server_new(WOLFSSL_CTX** ctx, WOLFSSL** ssl)
|
||||||
/* Load client certificates into WOLFSSL_CTX */
|
/* Load client certificates into WOLFSSL_CTX */
|
||||||
if (wolfSSL_CTX_use_certificate_buffer(server_ctx, SERVER_CERT,
|
if (wolfSSL_CTX_use_certificate_buffer(server_ctx, SERVER_CERT,
|
||||||
SERVER_CERT_LEN, WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) {
|
SERVER_CERT_LEN, WOLFSSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) {
|
||||||
printf("ERROR: failed to load server certiifcate\n");
|
printf("ERROR: failed to load server certificate\n");
|
||||||
ret = -1;
|
ret = -1;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -400,7 +400,7 @@ static THREAD_RETURN WOLFSSL_THREAD server_thread(void* args)
|
||||||
}
|
}
|
||||||
if (ret == 1)
|
if (ret == 1)
|
||||||
ret = 0;
|
ret = 0;
|
||||||
/* Send HTTP repsonse */
|
/* Send HTTP response */
|
||||||
if (ret == 0)
|
if (ret == 0)
|
||||||
ret = wolfssl_send(server_ssl, msgHTTPIndex);
|
ret = wolfssl_send(server_ssl, msgHTTPIndex);
|
||||||
|
|
||||||
|
@ -447,7 +447,7 @@ static int client()
|
||||||
|
|
||||||
printf("Client Return: %d\n", ret);
|
printf("Client Return: %d\n", ret);
|
||||||
|
|
||||||
/* Free client conenction data */
|
/* Free client connection data */
|
||||||
wolfssl_free(client_ctx, client_ssl);
|
wolfssl_free(client_ctx, client_ssl);
|
||||||
|
|
||||||
return ret;
|
return ret;
|
||||||
|
|
Loading…
Reference in New Issue