Fix residual typos found by codespell

pull/6660/head
Dimitri Papadopoulos 2023-07-28 09:29:28 +02:00
parent 5043ecefc1
commit 52f91e4ab9
No known key found for this signature in database
GPG Key ID: 95998121D9D25F5D
4 changed files with 11 additions and 11 deletions

View File

@ -3255,7 +3255,7 @@ More info can be found on-line at //http://wolfssl.com/yaSSL/Docs.html
a) If using wolfSSL for DTLS on the server side of a publicly accessible
machine you MUST update.
b) If using wolfSSL for TLS on the server side with private RSA keys allowing
ephemeral key exchange without low memory optimziations you MUST update and
ephemeral key exchange without low memory optimizations you MUST update and
regenerate the private RSA keys.
Please see https://www.wolfssl.com/wolfSSL/Blog/Blog.html for more details

View File

@ -6,7 +6,7 @@
/** Firmware update data and user key data */
typedef struct user_key_block_data
{
/* Provisioning key wapped by Renesas DLM */
/* Provisioning key wrapped by Renesas DLM */
uint8_t encrypted_provisioning_key[HW_SCE_AES_CBC_IV_BYTE_SIZE * 2];
/* Initial vector to be used when creating encrypted key */
uint8_t iv[HW_SCE_AES_CBC_IV_BYTE_SIZE];

View File

@ -311,7 +311,7 @@ static int check_sha256(void)
}
if (memcmp(mcDigest, defDigest, CRYPT_SHA256_DIGEST_SIZE) != 0) {
printf("sha256 final memcmp fialed\n");
printf("sha256 final memcmp failed\n");
return -1;
}
printf("sha256 mcapi test passed\n");
@ -351,7 +351,7 @@ static int check_sha384(void)
}
if (memcmp(mcDigest, defDigest, CRYPT_SHA384_DIGEST_SIZE) != 0) {
printf("sha384 final memcmp fialed\n");
printf("sha384 final memcmp failed\n");
return -1;
}
printf("sha384 mcapi test passed\n");
@ -391,7 +391,7 @@ static int check_sha512(void)
}
if (memcmp(mcDigest, defDigest, CRYPT_SHA512_DIGEST_SIZE) != 0) {
printf("sha512 final memcmp fialed\n");
printf("sha512 final memcmp failed\n");
return -1;
}
printf("sha512 mcapi test passed\n");
@ -434,7 +434,7 @@ static int check_hmac(void)
}
if (memcmp(mcDigest, defDigest, CRYPT_SHA_DIGEST_SIZE) != 0) {
printf("hmac sha final memcmp fialed\n");
printf("hmac sha final memcmp failed\n");
return -1;
}
printf("hmac sha mcapi test passed\n");
@ -462,7 +462,7 @@ static int check_hmac(void)
}
if (memcmp(mcDigest, defDigest, CRYPT_SHA256_DIGEST_SIZE) != 0) {
printf("hmac sha256 final memcmp fialed\n");
printf("hmac sha256 final memcmp failed\n");
return -1;
}
printf("hmac sha256 mcapi test passed\n");
@ -490,7 +490,7 @@ static int check_hmac(void)
}
if (memcmp(mcDigest, defDigest, CRYPT_SHA384_DIGEST_SIZE) != 0) {
printf("hmac sha384 final memcmp fialed\n");
printf("hmac sha384 final memcmp failed\n");
return -1;
}
printf("hmac sha384 mcapi test passed\n");
@ -518,7 +518,7 @@ static int check_hmac(void)
}
if (memcmp(mcDigest, defDigest, CRYPT_SHA512_DIGEST_SIZE) != 0) {
printf("hmac sha512 final memcmp fialed\n");
printf("hmac sha512 final memcmp failed\n");
return -1;
}
printf("hmac sha512 mcapi test passed\n");

View File

@ -7,7 +7,7 @@ using the WolfSSL Ada binding. The implementation is cross-platform
and compiles on Linux, Mac OS X and Windows.
Security: The WolfSSL Ada binding avoids usage of the
Seconday Stack. The GNAT compiler has a number of hardening
Secondary Stack. The GNAT compiler has a number of hardening
features for example Stack Scrubbing; the compiler can generate
code to zero-out stack frames used by subprograms.
Unfortunately this works well for the primary stack but not
@ -108,4 +108,4 @@ found in the files:
spark_sockets.ads
spark_sockets.adb
spark_terminal.ads
spark_terminal.adb
spark_terminal.adb