mirror of https://github.com/wolfSSL/wolfssl.git
Fix new spelling errors
parent
8612f15d2e
commit
0915012b72
|
@ -17482,7 +17482,7 @@ int DoHandShakeMsgType(WOLFSSL* ssl, byte* input, word32* inOutIdx,
|
|||
|
||||
/* The server's decision to resume isn't known until after the
|
||||
* "server_hello". If subsequent handshake messages like
|
||||
* "certificate" or "server_key_exchange" are recevied then we
|
||||
* "certificate" or "server_key_exchange" are received then we
|
||||
* are doing a full handshake */
|
||||
|
||||
/* If the server included a session id then we
|
||||
|
|
|
@ -60426,7 +60426,7 @@ static int test_X509_STORE_untrusted(void)
|
|||
ExpectIntEQ(test_X509_STORE_untrusted_certs(untrusted3, 1, 0, 1),
|
||||
TEST_SUCCESS);
|
||||
/* Still needs properly loaded CA, while including it in untrusted
|
||||
* list is not an error, it also doesnt count for verify */
|
||||
* list is not an error, it also doesn't count for verify */
|
||||
ExpectIntEQ(test_X509_STORE_untrusted_certs(untrusted3, 0,
|
||||
X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY, 0),
|
||||
TEST_SUCCESS);
|
||||
|
|
|
@ -8063,7 +8063,7 @@ static void GHASH_FINAL(Aes* aes, byte* s, word32 sSz)
|
|||
GHASH_LEN_BLOCK(aes);
|
||||
/* Copy the result into s. */
|
||||
XMEMCPY(s, AES_TAG(aes), sSz);
|
||||
/* reset aes->gcm.H in case of re-use */
|
||||
/* reset aes->gcm.H in case of reuse */
|
||||
GHASH_INIT_EXTRA(aes);
|
||||
}
|
||||
#endif /* WOLFSSL_AESGCM_STREAM */
|
||||
|
|
Loading…
Reference in New Issue