Merge pull request #8043 from bandi13/addCodespell

Add Codespell test to PRs
pull/8141/head
Daniel Pouzzner 2024-11-01 21:20:29 -05:00 committed by GitHub
commit 6119c52802
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
82 changed files with 198 additions and 150 deletions

View File

@ -0,0 +1,18 @@
###############################################################################
# In this file, you should add the line of the file that needs to be ignored.
# The line should be exactly as it appears in the file.
###############################################################################
0x0b, 0x45, 0x6e, 0x67, 0x69, 0x6e, 0x65, 0x65, /* .Enginee */
0x66, 0x6f, 0x40, 0x77, 0x6f, 0x6c, 0x66, 0x73, /* fo@wolfs */
0x0a, 0x8b, 0x98, 0xf3, 0xe3, 0xff, 0x4e, 0x44, /* ......ND */
ot+3i9DAgBkcRcAtjOj4LaR0VknFBbVPFd5uRHg5h6h+u/N5GJG79G+dwfCMNYxd\n\
static const byte plaintext[] = "Lorem ipsum dolor sit amet, consectetur adipiscing elit. Cras lacus odio, pretium vel sagittis ac, facilisis quis diam. Vivamus condimentum velit sed dolor consequat interdum. Etiam eleifend ornare felis, eleifend egestas odio vulputate eu. Sed nec orci nunc. Etiam quis mi augue. Donec ullamcorper suscipit lorem, vel luctus augue cursus fermentum. Etiam a porta arcu, in convallis sem. Integer efficitur elementum diam, vel scelerisque felis posuere placerat. Donec vestibulum sit amet leo sit amet tincidunt. Etiam et vehicula turpis. Phasellus quis finibus sapien. Sed et tristique turpis. Nullam vitae sagittis tortor, et aliquet lorem. Cras a leo scelerisque, convallis lacus ut, fermentum urna. Mauris quis urna diam. Class aptent taciti sociosqu ad litora torquent per conubia nostra, per inceptos himenaeos. Nam aliquam vehicula orci id pulvinar. Proin mollis, libero sollicitudin tempor ultrices, massa augue tincidunt turpis, sit amet aliquam neque nibh nec dui. Fusce finibus massa quis rutrum suscipit cras amet";
rsource "Kconfig.tls-generic"
/* Loop over authenticated associated data AD1..ADn */
/* no easy answer [c'est la vie]. Just division */
const uint8_t* hashIn, int hashSz)
XMEMCPY(hash + (curveSz - hashSz), hashIn, hashSz);
0x63, 0x72, 0x65, 0x65, 0x6e, 0x20, 0x77, 0x6f, 0x75, 0x6c, 0x64, 0x20, 0x62, 0x65, 0x20, 0x69, /* creen would be i */
\pagenumbering{alph}
DES3_KEY_SIZE = 24, /* 3 des ede */
/* functions added to support above needed, removed TOOM and KARATSUBA */

30
.github/workflows/codespell.yml vendored 100644
View File

@ -0,0 +1,30 @@
name: Codespell test
on:
push:
branches: [ 'master', 'main', 'release/**' ]
pull_request:
branches: [ '*' ]
concurrency:
group: ${{ github.workflow }}-${{ github.ref }}
cancel-in-progress: true
# END OF COMMON SECTION
jobs:
codespell:
if: github.repository_owner == 'wolfssl'
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- uses: codespell-project/actions-codespell@v2.1
with:
check_filenames: true
check_hidden: true
# Add comma separated list of words that occur multiple times that should be ignored (sorted alphabetically, case sensitive)
ignore_words_list: adin,aNULL,carryIn,chainG,ciph,cLen,cliKs,dout,haveA,inCreated,inOut,inout,larg,LEAPYEAR,Merget,optionA,parm,parms,repid,rIn,userA,ser,siz,te,Te
# The exclude_file contains lines of code that should be ignored. This is useful for individual lines which have non-words that can safely be ignored.
exclude_file: '.codespellexcludelines'
# To skip files entirely from being processed, add it to the following list:
skip: '*.cproject,*.der,*.mtpj,*.pem,*.vcxproj,.git,*.launch,*.scfg'

View File

@ -41,7 +41,7 @@
# The maximum length of options is NOT 50 characters as documented.
# kconfcheck will complain that options should be 40 at most.
#
# Fix option lengths first. Superflous errors on other lines may occur.
# Fix option lengths first. Superfluous errors on other lines may occur.
#
# The maximum length of lines is 120 characters.
#

View File

@ -82,7 +82,7 @@ WOLFSSL_ROOT := ../../../../../../..
# "/mnt/c" is 4 directories up:
# 2 for `./test/demo` from where we run `make`, plus
# 2 more from the location of `component.mk` located
# in `[currect directory]/components/wolfssl`.
# in `[current directory]/components/wolfssl`.
#
# Thus we need 4 parent reference to find the relative path to wolfSSL:
# WOLFSSL_ROOT := ../../../../workspace/wolfssl-master

View File

@ -786,7 +786,7 @@
/***** END CONFIG_IDF_TARGET_ESP8684 *****/
#else
/* Anything else encountered, disable HW accleration */
/* Anything else encountered, disable HW acceleration */
#warning "Unexpected CONFIG_IDF_TARGET_NN value"
#define NO_ESP32_CRYPT
#define NO_WOLFSSL_ESP32_CRYPT_HASH

View File

@ -57,7 +57,7 @@ choice WOLFSSL_EXAMPLE_CHOOSE
config WOLFSSL_EXAMPLE_NAME_WOLFSSH_TEMPLATE
bool "SSH Template App"
help
Bare-bones Hellow World app that only compiles in wolfSSL and wolfSSH.
Bare-bones Hello World app that only compiles in wolfSSL and wolfSSH.
See wolfSSL/wolfssh on GitHub.
config WOLFSSL_EXAMPLE_NAME_WOLFSSH_ECHOSERVER

View File

@ -41,7 +41,7 @@
# The maximum length of options is NOT 50 characters as documented.
# kconfcheck will complain that options should be 40 at most.
#
# Fix option lengths first. Superflous errors on other lines may occur.
# Fix option lengths first. Superfluous errors on other lines may occur.
#
# The maximum length of lines is 120 characters.
#

View File

@ -82,7 +82,7 @@ WOLFSSL_ROOT := ../../../../../../..
# "/mnt/c" is 4 directories up:
# 2 for `./test/demo` from where we run `make`, plus
# 2 more from the location of `component.mk` located
# in `[currect directory]/components/wolfssl`.
# in `[current directory]/components/wolfssl`.
#
# Thus we need 4 parent reference to find the relative path to wolfSSL:
# WOLFSSL_ROOT := ../../../../workspace/wolfssl-master

View File

@ -786,7 +786,7 @@
/***** END CONFIG_IDF_TARGET_ESP8684 *****/
#else
/* Anything else encountered, disable HW accleration */
/* Anything else encountered, disable HW acceleration */
#warning "Unexpected CONFIG_IDF_TARGET_NN value"
#define NO_ESP32_CRYPT
#define NO_WOLFSSL_ESP32_CRYPT_HASH

View File

@ -167,7 +167,7 @@ I (735) system_api: read default base MAC address from EFUSE
I (755) wifi:wifi firmware version: 0d470ef
I (755) wifi:wifi certification version: v7.0
I (755) wifi:config NVS flash: enabled
I (755) wifi:config nano formating: disabled
I (755) wifi:config nano formatting: disabled
I (755) wifi:Init data frame dynamic rx buffer num: 32
I (765) wifi:Init management frame dynamic rx buffer num: 32
I (765) wifi:Init management short buffer num: 32

View File

@ -41,7 +41,7 @@
# The maximum length of options is NOT 50 characters as documented.
# kconfcheck will complain that options should be 40 at most.
#
# Fix option lengths first. Superflous errors on other lines may occur.
# Fix option lengths first. Superfluous errors on other lines may occur.
#
# The maximum length of lines is 120 characters.
#

View File

@ -82,7 +82,7 @@ WOLFSSL_ROOT := ../../../../../../..
# "/mnt/c" is 4 directories up:
# 2 for `./test/demo` from where we run `make`, plus
# 2 more from the location of `component.mk` located
# in `[currect directory]/components/wolfssl`.
# in `[current directory]/components/wolfssl`.
#
# Thus we need 4 parent reference to find the relative path to wolfSSL:
# WOLFSSL_ROOT := ../../../../workspace/wolfssl-master

View File

@ -786,7 +786,7 @@
/***** END CONFIG_IDF_TARGET_ESP8684 *****/
#else
/* Anything else encountered, disable HW accleration */
/* Anything else encountered, disable HW acceleration */
#warning "Unexpected CONFIG_IDF_TARGET_NN value"
#define NO_ESP32_CRYPT
#define NO_WOLFSSL_ESP32_CRYPT_HASH

View File

@ -34,7 +34,7 @@ choice WOLFSSL_EXAMPLE_CHOOSE
config WOLFSSL_EXAMPLE_NAME_WOLFSSH_TEMPLATE
bool "SSH Template App"
help
Bare-bones Hellow World app that only compiles in wolfSSL and wolfSSH.
Bare-bones Hello World app that only compiles in wolfSSL and wolfSSH.
See wolfSSL/wolfssh on GitHub.
config WOLFSSL_EXAMPLE_NAME_WOLFSSH_ECHOSERVER

View File

@ -87,7 +87,7 @@ WOLFSSL_ESP_TASK tls_smp_client_task(void* args);
/* init will create an RTOS task, otherwise server is simply function call. */
#if defined(SINGLE_THREADED)
/* no init neded */
/* no init needed */
#else
WOLFSSL_ESP_TASK tls_smp_client_init(void* args);
#endif

View File

@ -103,7 +103,7 @@
** the config you want - ie #define EXAMPLE_WIFI_SSID "mywifissid"
*/
#if defined(CONFIG_ESP_WIFI_SSID)
/* tyically from ESP32 with ESP-IDF v4 ot v5 */
/* tyically from ESP32 with ESP-IDF v4 to v5 */
#define EXAMPLE_ESP_WIFI_SSID CONFIG_ESP_WIFI_SSID
#elif defined(CONFIG_EXAMPLE_WIFI_SSID)
/* typically from ESP8266 rtos-sdk/v3.4 */

View File

@ -204,7 +204,7 @@ int set_time_from_string(const char* time_buffer)
int quote_offset = 0;
int ret = 0;
/* perform some basic sanity checkes */
/* perform some basic sanity checks */
ret = probably_valid_time_string(time_buffer);
if (ret == ESP_OK) {
/* we are expecting the string to be encapsulated in single quotes */
@ -218,7 +218,7 @@ int set_time_from_string(const char* time_buffer)
&day, &hour, &minute, &second, &year, &offset);
if (ret == 8) {
/* we found a match for all componets */
/* we found a match for all components */
const char *months[] = { "Jan", "Feb", "Mar", "Apr", "May", "Jun",
"Jul", "Aug", "Sep", "Oct", "Nov", "Dec"
@ -282,7 +282,7 @@ int set_time(void)
esp_show_current_datetime();
#ifdef LIBWOLFSSL_VERSION_GIT_HASH_DATE
/* initialy set a default approximate time from recent git commit */
/* initially set a default approximate time from recent git commit */
ESP_LOGI(TAG, "Found git hash date, attempting to set system date: %s",
LIBWOLFSSL_VERSION_GIT_HASH_DATE);
set_time_from_string(LIBWOLFSSL_VERSION_GIT_HASH_DATE"\0");

View File

@ -147,7 +147,7 @@ int wifi_init_sta(void)
};
/* Setting a password implies station will connect to all security modes including WEP/WPA.
* However these modes are deprecated and not advisable to be used. Incase your Access point
* However these modes are deprecated and not advisable to be used. In case your Access point
* doesn't support WPA2, these mode can be enabled by commenting below line */
if (strlen((char *)wifi_config.sta.password)) {
@ -325,7 +325,7 @@ int wifi_init_sta(void)
.ssid = EXAMPLE_ESP_WIFI_SSID,
.password = EXAMPLE_ESP_WIFI_PASS,
/* Authmode threshold resets to WPA2 as default if password matches
* WPA2 standards (pasword len => 8). If you want to connect the
* WPA2 standards (password len => 8). If you want to connect the
* device to deprecated WEP/WPA networks, Please set the threshold
* value WIFI_AUTH_WEP/WIFI_AUTH_WPA_PSK and set the password with
* length and format matching to WIFI_AUTH_WEP/WIFI_AUTH_WPA_PSK

View File

@ -82,7 +82,7 @@ After the server exits, remove the port proxy forward:
netsh interface portproxy delete v4tov4 listenport=11111 listenaddress=0.0.0.0
```
Cipers to consider
Ciphers to consider
```
TLS13-AES128-GCM-SHA256:

View File

@ -167,7 +167,7 @@ I (735) system_api: read default base MAC address from EFUSE
I (755) wifi:wifi firmware version: 0d470ef
I (755) wifi:wifi certification version: v7.0
I (755) wifi:config NVS flash: enabled
I (755) wifi:config nano formating: disabled
I (755) wifi:config nano formatting: disabled
I (755) wifi:Init data frame dynamic rx buffer num: 32
I (765) wifi:Init management frame dynamic rx buffer num: 32
I (765) wifi:Init management short buffer num: 32

View File

@ -41,7 +41,7 @@
# The maximum length of options is NOT 50 characters as documented.
# kconfcheck will complain that options should be 40 at most.
#
# Fix option lengths first. Superflous errors on other lines may occur.
# Fix option lengths first. Superfluous errors on other lines may occur.
#
# The maximum length of lines is 120 characters.
#

View File

@ -82,7 +82,7 @@ WOLFSSL_ROOT := ../../../../../../..
# "/mnt/c" is 4 directories up:
# 2 for `./test/demo` from where we run `make`, plus
# 2 more from the location of `component.mk` located
# in `[currect directory]/components/wolfssl`.
# in `[current directory]/components/wolfssl`.
#
# Thus we need 4 parent reference to find the relative path to wolfSSL:
# WOLFSSL_ROOT := ../../../../workspace/wolfssl-master

View File

@ -786,7 +786,7 @@
/***** END CONFIG_IDF_TARGET_ESP8684 *****/
#else
/* Anything else encountered, disable HW accleration */
/* Anything else encountered, disable HW acceleration */
#warning "Unexpected CONFIG_IDF_TARGET_NN value"
#define NO_ESP32_CRYPT
#define NO_WOLFSSL_ESP32_CRYPT_HASH

View File

@ -34,7 +34,7 @@ choice WOLFSSL_EXAMPLE_CHOOSE
config WOLFSSL_EXAMPLE_NAME_WOLFSSH_TEMPLATE
bool "SSH Template App"
help
Bare-bones Hellow World app that only compiles in wolfSSL and wolfSSH.
Bare-bones Hello World app that only compiles in wolfSSL and wolfSSH.
See wolfSSL/wolfssh on GitHub.
config WOLFSSL_EXAMPLE_NAME_WOLFSSH_ECHOSERVER

View File

@ -53,7 +53,7 @@ WOLFSSL_ESP_TASK tls_smp_server_task(void *args);
/* init will create an RTOS task, otherwise server is simply function call. */
#if defined(SINGLE_THREADED)
/* no init neded */
/* no init needed */
#else
WOLFSSL_ESP_TASK tls_smp_server_init(void* args);
#endif

View File

@ -109,7 +109,7 @@
** the config you want - ie #define EXAMPLE_WIFI_SSID "mywifissid"
*/
#if defined(CONFIG_ESP_WIFI_SSID)
/* tyically from ESP32 with ESP-IDF v4 ot v5 */
/* tyically from ESP32 with ESP-IDF v4 to v5 */
#define EXAMPLE_ESP_WIFI_SSID CONFIG_ESP_WIFI_SSID
#elif defined(CONFIG_EXAMPLE_WIFI_SSID)
/* typically from ESP8266 rtos-sdk/v3.4 */

View File

@ -185,7 +185,7 @@ int set_time_from_string(const char* time_buffer)
int quote_offset = 0;
int ret = 0;
/* perform some basic sanity checkes */
/* perform some basic sanity checks */
ret = probably_valid_time_string(time_buffer);
if (ret == ESP_OK) {
/* we are expecting the string to be encapsulated in single quotes */
@ -199,7 +199,7 @@ int set_time_from_string(const char* time_buffer)
&day, &hour, &minute, &second, &year, &offset);
if (ret == 8) {
/* we found a match for all componets */
/* we found a match for all components */
const char *months[] = { "Jan", "Feb", "Mar", "Apr", "May", "Jun",
"Jul", "Aug", "Sep", "Oct", "Nov", "Dec"
@ -263,7 +263,7 @@ int set_time(void)
esp_show_current_datetime();
#ifdef LIBWOLFSSL_VERSION_GIT_HASH_DATE
/* initialy set a default approximate time from recent git commit */
/* initially set a default approximate time from recent git commit */
ESP_LOGI(TAG, "Found git hash date, attempting to set system date: %s",
LIBWOLFSSL_VERSION_GIT_HASH_DATE);
set_time_from_string(LIBWOLFSSL_VERSION_GIT_HASH_DATE"\0");

View File

@ -146,7 +146,7 @@ int wifi_init_sta(void)
};
/* Setting a password implies station will connect to all security modes including WEP/WPA.
* However these modes are deprecated and not advisable to be used. Incase your Access point
* However these modes are deprecated and not advisable to be used. In case your Access point
* doesn't support WPA2, these mode can be enabled by commenting below line */
if (strlen((char *)wifi_config.sta.password)) {
@ -324,7 +324,7 @@ int wifi_init_sta(void)
.ssid = EXAMPLE_ESP_WIFI_SSID,
.password = EXAMPLE_ESP_WIFI_PASS,
/* Authmode threshold resets to WPA2 as default if password matches
* WPA2 standards (pasword len => 8). If you want to connect the
* WPA2 standards (password len => 8). If you want to connect the
* device to deprecated WEP/WPA networks, Please set the threshold
* value WIFI_AUTH_WEP/WIFI_AUTH_WPA_PSK and set the password with
* length and format matching to WIFI_AUTH_WEP/WIFI_AUTH_WPA_PSK

View File

@ -41,7 +41,7 @@
# The maximum length of options is NOT 50 characters as documented.
# kconfcheck will complain that options should be 40 at most.
#
# Fix option lengths first. Superflous errors on other lines may occur.
# Fix option lengths first. Superfluous errors on other lines may occur.
#
# The maximum length of lines is 120 characters.
#

View File

@ -82,7 +82,7 @@ WOLFSSL_ROOT := ../../../../../../..
# "/mnt/c" is 4 directories up:
# 2 for `./test/demo` from where we run `make`, plus
# 2 more from the location of `component.mk` located
# in `[currect directory]/components/wolfssl`.
# in `[current directory]/components/wolfssl`.
#
# Thus we need 4 parent reference to find the relative path to wolfSSL:
# WOLFSSL_ROOT := ../../../../workspace/wolfssl-master

View File

@ -786,7 +786,7 @@
/***** END CONFIG_IDF_TARGET_ESP8684 *****/
#else
/* Anything else encountered, disable HW accleration */
/* Anything else encountered, disable HW acceleration */
#warning "Unexpected CONFIG_IDF_TARGET_NN value"
#define NO_ESP32_CRYPT
#define NO_WOLFSSL_ESP32_CRYPT_HASH

View File

@ -13,7 +13,7 @@ factory, app, factory, 0x10000, 1500K,
# For other settings, see:
# https://docs.espressif.com/projects/esp-idf/en/latest/esp32/api-guides/partition-tables.html#creating-custom-tables
#
# Here is the summary printed for the “Single factory app, no OTA” configuration:
# Here is the summary printed for the "Single factory app, no OTA" configuration:
#
# # ESP-IDF Partition Table
# # Name, Type, SubType, Offset, Size, Flags
@ -22,7 +22,7 @@ factory, app, factory, 0x10000, 1500K,
# factory, app, factory, 0x10000, 1M,
#
#
# Here is the summary printed for the “Factory app, two OTA definitions” configuration:
# Here is the summary printed for the "Factory app, two OTA definitions" configuration:
#
# # ESP-IDF Partition Table
# # Name, Type, SubType, Offset, Size, Flags

Can't render this file because it contains an unexpected character in line 16 and column 39.

View File

@ -331,7 +331,7 @@
#define NO_WOLFSSL_ESP32_CRYPT_RSA_PRI
/***** END CONFIG_IDF_TARGET_ESP266 *****/
#else
/* Anything else encountered, disable HW accleration */
/* Anything else encountered, disable HW acceleration */
#define NO_ESP32_CRYPT
#define NO_WOLFSSL_ESP32_CRYPT_HASH
#define NO_WOLFSSL_ESP32_CRYPT_AES
@ -359,7 +359,7 @@
/* #define HASH_SIZE_LIMIT */ /* for test.c */
/* #define NO_HW_MATH_TEST */ /* Optionall turn off HW math checks */
/* #define NO_HW_MATH_TEST */ /* Optionally turn off HW math checks */
/* Optionally include alternate HW test library: alt_hw_test.h */
/* When enabling, the ./components/wolfssl/CMakeLists.txt file

View File

@ -937,7 +937,7 @@
</option>
<option>
<name>IarchiveOutput</name>
<state>###Unitialized###</state>
<state>###Uninitialized###</state>
</option>
</data>
</settings>

View File

@ -1593,7 +1593,7 @@
</option>
<option>
<name>IlinkOutputFile</name>
<state>###Unitialized###</state>
<state>###Uninitialized###</state>
</option>
<option>
<name>IlinkDebugInfoEnable</name>
@ -1879,7 +1879,7 @@
</option>
<option>
<name>IarchiveOutput</name>
<state>###Unitialized###</state>
<state>###Uninitialized###</state>
</option>
</data>
</settings>

View File

@ -937,7 +937,7 @@
</option>
<option>
<name>IarchiveOutput</name>
<state>###Unitialized###</state>
<state>###Uninitialized###</state>
</option>
</data>
</settings>

View File

@ -958,7 +958,7 @@
</option>
<option>
<name>IarchiveOutput</name>
<state>###Unitialized###</state>
<state>###Uninitialized###</state>
</option>
</data>
</settings>
@ -1627,7 +1627,7 @@
</option>
<option>
<name>IlinkOutputFile</name>
<state>###Unitialized###</state>
<state>###Uninitialized###</state>
</option>
<option>
<name>IlinkDebugInfoEnable</name>
@ -1917,7 +1917,7 @@
</option>
<option>
<name>IarchiveOutput</name>
<state>###Unitialized###</state>
<state>###Uninitialized###</state>
</option>
</data>
</settings>

View File

@ -1624,7 +1624,7 @@
</option>
<option>
<name>IlinkOutputFile</name>
<state>###Unitialized###</state>
<state>###Uninitialized###</state>
</option>
<option>
<name>IlinkDebugInfoEnable</name>
@ -1914,7 +1914,7 @@
</option>
<option>
<name>IarchiveOutput</name>
<state>###Unitialized###</state>
<state>###Uninitialized###</state>
</option>
</data>
</settings>

View File

@ -958,7 +958,7 @@
</option>
<option>
<name>IarchiveOutput</name>
<state>###Unitialized###</state>
<state>###Uninitialized###</state>
</option>
</data>
</settings>
@ -1627,7 +1627,7 @@
</option>
<option>
<name>IlinkOutputFile</name>
<state>###Unitialized###</state>
<state>###Uninitialized###</state>
</option>
<option>
<name>IlinkDebugInfoEnable</name>
@ -1917,7 +1917,7 @@
</option>
<option>
<name>IarchiveOutput</name>
<state>###Unitialized###</state>
<state>###Uninitialized###</state>
</option>
</data>
</settings>

View File

@ -38,7 +38,7 @@ steps below to generate that code.
2. Set the Project path to the wolfSSL/IDE/MPLABX16 and enter your PIC device
into the interface.
3. Select MCC Clasic as the content type and click `Finish`.
3. Select MCC Classic as the content type and click `Finish`.
4. Under the Device Resources section, find the UART entry and add the UART1
peripheral.

View File

@ -22,7 +22,7 @@
# clean remove built files from a configuration
# clobber remove all built files
# all build all configurations
# help print help mesage
# help print help message
#
# Targets .build-impl, .clean-impl, .clobber-impl, .all-impl, and
# .help-impl are implemented in nbproject/makefile-impl.mk.

View File

@ -22,7 +22,7 @@
# clean remove built files from a configuration
# clobber remove all built files
# all build all configurations
# help print help mesage
# help print help message
#
# Targets .build-impl, .clean-impl, .clobber-impl, .all-impl, and
# .help-impl are implemented in nbproject/makefile-impl.mk.

View File

@ -67,7 +67,7 @@ The following steps explain how to generate the missing files and where to place
|Thread Symbol|wolfssl_tst_thread|
|Thread Name|wolf_tst_thread|
|Thread Stack size|increase depending on your environment<br> e.g. 0xA000|
|Thread MemoryAllocation|Dyamic|
|Thread MemoryAllocation|Dynamic|
|Common General Use Mutexes|Enabled|
|Common General Enable Backward Compatibility|Enabled|
|Common Memory Allocation Support Dynamic Allocation|Enabled|

View File

@ -74,7 +74,7 @@ The wolfssl Project Summary is listed below and is relevant for every project.
|Thread Symbol|sce_tst_thread|
|Thread Name|sce_tst_thread|
|Thread Stack size|increase depending on your environment<br> e.g. 0xA000|
|Thread MemoryAllocation|Dyamic|
|Thread MemoryAllocation|Dynamic|
|Common General Use Mutexes|Enabled|
|Common General Enable Backward Compatibility|Enabled|
|Common Memory Allocation Support Dynamic Allocation|Enabled|

View File

@ -1,7 +1,7 @@
# Create/Update Signed CA
This document describes how to create/update Signed CA data that is used at an example program.
## Signed CA Creatation
## Signed CA Creation
### Generate RSA Key pair
```
2048 bit RSA key pair
@ -35,5 +35,5 @@ There are multiple example keys for testing in the `example_keys` folder.
|
+----+ rsa_private.pem an example 2048-bit rsa private key for signing CA cert
+ rsa_public.pem an example 2048-bit rsa public key for verifying CA cert
+ generate_signCA.sh an example script to genearte signed-certificate data for the example program
+ generate_signCA.sh an example script to generate signed-certificate data for the example program
```

View File

@ -37,7 +37,7 @@ openssl dgst -sha256 -sign $1 -sigopt $SIGOPT -sigopt $SIGOPT2 -out ${CURRENT}/$
echo Verify by private key
openssl dgst -sha256 -prverify $1 -sigopt $SIGOPT -sigopt $SIGOPT2 -signature ${CURRENT}/${signed_file}.sign $3
echo Verifiy by public key
echo Verify by public key
openssl dgst -sha256 -verify $2 -sigopt $SIGOPT -sigopt $SIGOPT2 -signature ${CURRENT}/${signed_file}.sign $3
# Convert Signed CA to c source

View File

@ -1,7 +1,7 @@
# Create/Update Signed CA
This document describes how to create/update Signed CA data that is used at an example program.
## Signed CA Creatation
## Signed CA Creation
### Generate RSA Key pair
```
2048 bit RSA key pair
@ -35,5 +35,5 @@ There are multiple example keys for testing in the `example_keys` folder.
|
+----+ rsa_private.pem an example 2048-bit rsa private key for signing CA cert
+ rsa_public.pem an example 2048-bit rsa public key for verifying CA cert
+ generate_signCA.sh an example script to genearte signed-certificate data for the example program
+ generate_signCA.sh an example script to generate signed-certificate data for the example program
```

View File

@ -37,7 +37,7 @@ openssl dgst -sha256 -sign $1 -sigopt $SIGOPT -sigopt $SIGOPT2 -out ${CURRENT}/$
echo Verify by private key
openssl dgst -sha256 -prverify $1 -sigopt $SIGOPT -sigopt $SIGOPT2 -signature ${CURRENT}/${signed_file}.sign $3
echo Verifiy by public key
echo Verify by public key
openssl dgst -sha256 -verify $2 -sigopt $SIGOPT -sigopt $SIGOPT2 -signature ${CURRENT}/${signed_file}.sign $3
# Convert Signed CA to c source

View File

@ -1,7 +1,7 @@
# Create/Update Signed CA
This document describes how to create/update Signed CA data that is used at an example program.
## Signed CA Creatation
## Signed CA Creation
### Generate RSA Key pair
```
2048 bit RSA key pair
@ -35,5 +35,5 @@ There are multiple example keys for testing in the `example_keys` folder.
|
+----+ rsa_private.pem an example 2048-bit rsa private key for signing CA cert
+ rsa_public.pem an example 2048-bit rsa public key for verifying CA cert
+ generate_signCA.sh an example script to genearte signed-certificate data for the example program
+ generate_signCA.sh an example script to generate signed-certificate data for the example program
```

View File

@ -37,7 +37,7 @@ openssl dgst -sha256 -sign $1 -sigopt $SIGOPT -sigopt $SIGOPT2 -out ${CURRENT}/$
echo Verify by private key
openssl dgst -sha256 -prverify $1 -sigopt $SIGOPT -sigopt $SIGOPT2 -signature ${CURRENT}/${signed_file}.sign $3
echo Verifiy by public key
echo Verify by public key
openssl dgst -sha256 -verify $2 -sigopt $SIGOPT -sigopt $SIGOPT2 -signature ${CURRENT}/${signed_file}.sign $3
# Convert Signed CA to c source

View File

@ -9644,7 +9644,7 @@ if test "$ENABLED_DH" != "no" && test "$ENABLED_DH" != "const"; then
LT_LIB_M
fi
# mulitple OCSP stapling for TLS 1.3 Certificate extension
# multiple OCSP stapling for TLS 1.3 Certificate extension
if test "$ENABLED_CERTIFICATE_STATUS_REQUEST" = "yes"
then
if test "$ENABLED_TLS13" = "yes"

View File

@ -2088,7 +2088,7 @@ int wolfSSL_get_using_nonblock(WOLFSSL*);
session if the handshake has not already been performed yet by
wolfSSL_connect() or wolfSSL_accept(). When using (D)TLSv1.3 and early data
feature is compiled in, this function progresses the handshake only up to
the point when it is possible to send data. Next invokations of
the point when it is possible to send data. Next invocations of
wolfSSL_Connect()/wolfSSL_Accept()/wolfSSL_read() will complete the
handshake. wolfSSL_write() works with both blocking and non-blocking I/O.
When the underlying I/O is non-blocking, wolfSSL_write() will return when
@ -14015,7 +14015,7 @@ int wolfSSL_write_early_data(WOLFSSL* ssl, const void* data,
Call this function instead of wolfSSL_accept() or wolfSSL_accept_TLSv13()
to accept a client and read any early data in the handshake. The function
should be invoked until wolfSSL_is_init_finished() returns true. Early data
may be sent by the client in multiple messsages. If there is no early data
may be sent by the client in multiple messages. If there is no early data
then the handshake will be processed as normal. This function is only used
with servers.
@ -15014,7 +15014,7 @@ WOLFSSL_CIPHERSUITE_INFO wolfSSL_get_ciphersuite_info(byte first,
\param [out] sigAlgo The enum Key_Sum of the authentication algorithm
\return 0 when info was correctly set
\return BAD_FUNC_ARG when either input paramters are NULL or the bytes
\return BAD_FUNC_ARG when either input parameters are NULL or the bytes
are not a recognized sigalg suite
_Example_

View File

@ -567,7 +567,7 @@ static int km_AesGcmSetAuthsize(struct crypto_aead *tfm, unsigned int authsize)
}
/*
* aead ciphers recieve data in scatterlists in following order:
* aead ciphers receive data in scatterlists in following order:
* encrypt
* req->src: aad||plaintext
* req->dst: aad||ciphertext||tag

View File

@ -305,7 +305,7 @@ static struct wc_thread_fpu_count_ent *wc_linuxkm_fpu_state_assoc_unlikely(int c
}
} else {
/* check for migration. this can happen despite our best efforts if any
* I/O occured while locked, e.g. kernel messages like "uninitialized
* I/O occurred while locked, e.g. kernel messages like "uninitialized
* urandom read". since we're locked now, we can safely migrate the
* entry in wc_linuxkm_fpu_states[], freeing up the slot on the previous
* cpu.

View File

@ -14817,7 +14817,7 @@ int ProcessPeerCerts(WOLFSSL* ssl, byte* input, word32* inOutIdx,
if (ssl->error == WC_NO_ERR_TRACE(OCSP_WANT_READ)) {
/* Re-entry after non-blocking OCSP */
#ifdef WOLFSSL_ASYNC_CRYPT
/* if async operationg not pending, reset error code */
/* if async operations not pending, reset error code */
if (ret == WC_NO_ERR_TRACE(WC_NO_PENDING_E))
ret = 0;
#endif
@ -17482,7 +17482,7 @@ int DoHandShakeMsgType(WOLFSSL* ssl, byte* input, word32* inOutIdx,
/* The server's decision to resume isn't known until after the
* "server_hello". If subsequent handshake messages like
* "certificate" or "server_key_exchange" are recevied then we
* "certificate" or "server_key_exchange" are received then we
* are doing a full handshake */
/* If the server included a session id then we

View File

@ -2332,7 +2332,7 @@ int ProcessBuffer(WOLFSSL_CTX* ctx, const unsigned char* buff, long sz,
#endif
}
else if (ret == 0) {
/* Processing a cerificate. */
/* Processing a certificate. */
if (userChain) {
/* Take original buffer and add to user chain to send in TLS
* handshake. */
@ -2707,7 +2707,7 @@ static int wolfssl_ctx_load_path(WOLFSSL_CTX* ctx, const char* path,
/* Load file. */
ret = wolfssl_ctx_load_path_file(ctx, name, verify, (int)flags,
&failCount, &successCount);
/* Get next filenmae. */
/* Get next filename. */
fileRet = wc_ReadDirNext(readCtx, path, &name);
}
/* Cleanup directory reading context. */
@ -4791,7 +4791,7 @@ int wolfSSL_CTX_add1_chain_cert(WOLFSSL_CTX* ctx, WOLFSSL_X509* x509)
/* Use the certificate. */
ret = wolfSSL_CTX_use_certificate(ctx, x509);
}
/* Increate reference count as we will store it. */
/* Increase reference count as we will store it. */
else if ((ret == 1) && ((ret = wolfSSL_X509_up_ref(x509)) == 1)) {
/* Load the DER encoding. */
ret = wolfSSL_CTX_load_verify_buffer(ctx, x509->derCert->buffer,
@ -5001,7 +5001,7 @@ int wolfSSL_CTX_use_certificate_ASN1(WOLFSSL_CTX *ctx, int derSz,
if ((ctx == NULL) || (der == NULL)) {
ret = 0;
}
/* Load DER encoded cerificate into SSL context. */
/* Load DER encoded certificate into SSL context. */
if ((ret == 1) && (wolfSSL_CTX_use_certificate_buffer(ctx, der, derSz,
WOLFSSL_FILETYPE_ASN1) != 1)) {
ret = 0;
@ -5060,7 +5060,7 @@ int wolfSSL_CTX_use_RSAPrivateKey(WOLFSSL_CTX* ctx, WOLFSSL_RSA* rsa)
}
if (ret == 1) {
/* Load DER encoded cerificate into SSL context. */
/* Load DER encoded certificate into SSL context. */
ret = wolfSSL_CTX_use_PrivateKey_buffer(ctx, der, derSize,
SSL_FILETYPE_ASN1);
if (ret != WOLFSSL_SUCCESS) {

View File

@ -3649,7 +3649,7 @@ int TLSX_CSR_InitRequest_ex(TLSX* extensions, DecodedCert* cert,
request = &csr->request.ocsp[req_cnt];
if (request->serial != NULL) {
/* clear request contents before re-use */
/* clear request contents before reuse */
FreeOcspRequest(request);
if (csr->requests > 0)
csr->requests--;

View File

@ -12799,7 +12799,7 @@ int DoTls13HandShakeMsgType(WOLFSSL* ssl, byte* input, word32* inOutIdx,
#ifdef WOLFSSL_QUIC
if (WOLFSSL_IS_QUIC(ssl) && ssl->earlyData != no_early_data) {
/* QUIC never sends/receives EndOfEarlyData, but having
* early data means the last encrpytion keys had not been
* early data means the last encryption keys had not been
* set yet. */
if ((ret = SetKeysSide(ssl, ENCRYPT_SIDE_ONLY)) != 0)
return ret;
@ -13035,7 +13035,7 @@ int wolfSSL_connect_TLSv13(WOLFSSL* ssl)
}
/* make sure this wolfSSL object has arrays and rng setup. Protects
* case where the WOLFSSL object is re-used via wolfSSL_clear() */
* case where the WOLFSSL object is reused via wolfSSL_clear() */
if ((ret = ReinitSSL(ssl, ssl->ctx, 0)) != 0) {
return ret;
}
@ -14136,7 +14136,7 @@ int wolfSSL_accept_TLSv13(WOLFSSL* ssl)
}
/* make sure this wolfSSL object has arrays and rng setup. Protects
* case where the WOLFSSL object is re-used via wolfSSL_clear() */
* case where the WOLFSSL object is reused via wolfSSL_clear() */
if ((ret = ReinitSSL(ssl, ssl->ctx, 0)) != 0) {
return ret;
}

View File

@ -116,7 +116,7 @@ Possible IO enable options:
*
* DTLS_RECEIVEFROM_NO_TIMEOUT_ON_INVALID_PEER: This flag has effect only if
* ASN_NO_TIME is enabled. If enabled invalid peers messages are ignored
* indefinetely. If not enabled EmbedReceiveFrom will return timeout after
* indefinitely. If not enabled EmbedReceiveFrom will return timeout after
* DTLS_RECEIVEFROM_MAX_INVALID_PEER number of packets from invalid peers. When
* enabled, without a timer, EmbedReceivefrom can't check if the timeout is
* expired and it may never return under a continuous flow of invalid packets.

View File

@ -20144,7 +20144,7 @@ static int test_wc_AesGcmEncryptDecrypt(void)
} /* END test_wc_AesGcmEncryptDecrypt */
/*
* test function for mixed (one-shot encrpytion + stream decryption) AES GCM
* test function for mixed (one-shot encryption + stream decryption) AES GCM
* using a long IV (older FIPS does NOT support long IVs). Relates to zd15423
*/
static int test_wc_AesGcmMixedEncDecLongIV(void)
@ -33002,7 +33002,7 @@ static int test_wc_dilithium_verify(void)
ExpectIntEQ(res, 0);
sig[100] ^= 0x80;
/* Set all indeces to 0. */
/* Set all indices to 0. */
XMEMSET(sig + sigLen - 4, 0, 4);
ExpectIntEQ(wc_dilithium_verify_msg(sig, sigLen, msg, 32, &res, key),
WC_NO_ERR_TRACE(SIG_VERIFY_E));
@ -60420,7 +60420,7 @@ static int test_X509_STORE_untrusted(void)
ExpectIntEQ(test_X509_STORE_untrusted_certs(untrusted3, 1, 0, 1),
TEST_SUCCESS);
/* Still needs properly loaded CA, while including it in untrusted
* list is not an error, it also doesnt count for verify */
* list is not an error, it also doesn't count for verify */
ExpectIntEQ(test_X509_STORE_untrusted_certs(untrusted3, 0,
X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY, 0),
TEST_SUCCESS);

View File

@ -8063,7 +8063,7 @@ static void GHASH_FINAL(Aes* aes, byte* s, word32 sSz)
GHASH_LEN_BLOCK(aes);
/* Copy the result into s. */
XMEMCPY(s, AES_TAG(aes), sSz);
/* reset aes->gcm.H in case of re-use */
/* reset aes->gcm.H in case of reuse */
GHASH_INIT_EXTRA(aes);
}
#endif /* WOLFSSL_AESGCM_STREAM */

View File

@ -76,7 +76,7 @@ Public domain.
/* implementation is located in wolfcrypt/src/port/arm/armv8-chacha.c */
#elif defined(WOLFSSL_RISCV_ASM)
/* implementation located in wolfcrypt/src/port/rsicv/riscv-64-chacha.c */
/* implementation located in wolfcrypt/src/port/riscv/riscv-64-chacha.c */
#else

View File

@ -3172,7 +3172,7 @@ int esp_mp_exptmod(MATH_INT_T* X, MATH_INT_T* Y, MATH_INT_T* M, MATH_INT_T* Z)
#endif /* !NO_RSA || HAVE_ECC */
/* Some optional metrics when using RSA HW Accleration */
/* Some optional metrics when using RSA HW Acceleration */
#if defined(WOLFSSL_ESP32_CRYPT_RSA_PRI) && defined(WOLFSSL_HW_METRICS)
int esp_hw_show_mp_metrics(void)
{

View File

@ -100,7 +100,7 @@ int esp_CryptHwMutexInit(wolfSSL_Mutex* mutex) {
/*
* Call the ESP-IDF mutex lock; xSemaphoreTake
* this is a general mutex locker, used for different mutex objects for
* different HW acclerators or other single-use HW features.
* different HW accelerators or other single-use HW features.
*
* We should already have known if the resource is in use or not.
*
@ -988,7 +988,7 @@ int hexToBinary(byte* toVar, const char* fromHexString, size_t szHexString ) {
sscanf(&fromHexString[i], "%2x", &decimalValue);
size_t index = i / 2;
#if (0)
/* Optionall peek at new values */
/* Optionally peek at new values */
byte new_val = (decimalValue & 0x0F) << ((i % 2) * 4);
ESP_LOGI("hex", "Current char = %d", toVar[index]);
ESP_LOGI("hex", "New val = %d", decimalValue);

View File

@ -44,7 +44,7 @@ until a PR is created for upstream support.
### Time
The wolfSSL libraries are by default considerably more robust and strict. As such, it is important to have an accurate
time and date setting for the certficate date ranges.. The wolfssL libraries include some
time and date setting for the certificate date ranges.. The wolfssL libraries include some
[time helper functions](https://github.com/wolfSSL/wolfssl/blob/master/wolfssl/wolfcrypt/port/Espressif/esp-sdk-lib.h).
These can be enabled with `#define USE_WOLFSSL_ESP_SDK_TIME` in the `user_settings.h`.

View File

@ -159,8 +159,8 @@ esp_err_t esp_crt_bundle_attach(void *conf)
*
* The default is having the bundle pre-sorted in the python script
* to allow for rapid binary cert match search at runtime. The unsorted
* seach ALWAYS works, but when expecting a sorted search the python
* script MUST presort the data, oherwise the connection will likely fail.
* search ALWAYS works, but when expecting a sorted search the python
* script MUST presort the data, otherwise the connection will likely fail.
*
* When debugging and using an unsorted bundle, define CERT_BUNDLE_UNSORTED
* Reminder: the actual sort occurs in gen_crt_bundly.py call from CMake. */
@ -677,7 +677,7 @@ static CB_INLINE int wolfssl_ssl_conf_verify_cb_no_signer(int preverify,
* NOTE: To save memory, the store `cert` from above is overwritten below.
* Any details needed from the store `cert` should have been saved.
*
* We'll proceed by assiging `cert` to each of the respective items in
* We'll proceed by assigning `cert` to each of the respective items in
* bundle as we attempt to find the desired cert: */
if (ret == WOLFSSL_SUCCESS) {
_cert_bundle_loaded = 1;
@ -843,7 +843,7 @@ static CB_INLINE int wolfssl_ssl_conf_verify_cb_no_signer(int preverify,
* so we don't need to clean them up explicitly.
*
* However, we'll start over with a freash bundle_cert for the
* next search interation. */
* next search iteration. */
if (bundle_cert != NULL) {
wolfSSL_X509_free(bundle_cert);
}
@ -918,7 +918,7 @@ static CB_INLINE int wolfssl_ssl_conf_verify_cb_no_signer(int preverify,
}
/* Note that although we are adding a certificate to the store
* now, it is too late to be used in the current TLS connecton
* now, it is too late to be used in the current TLS connection
* that caused the callback. See the Cerfiicate Manager for
* validation and possible overriding of preverify values. */
ESP_LOGCBI(TAG, "\n\nAdding Cert for Certificate Store!\n");
@ -993,7 +993,7 @@ static CB_INLINE int wolfssl_ssl_conf_verify_cb_no_signer(int preverify,
* for reference:
* typedef int (*VerifyCallback)(int, WOLFSSL_X509_STORE_CTX*);
*
* This is the callback for TLS handshake verify / valiation. See related:
* This is the callback for TLS handshake verify / validation. See related:
* wolfssl_ssl_conf_verify_cb_no_signer
* wolfssl_ssl_conf_verify_cb_before_date
* wolfssl_ssl_conf_verify_cb_after_date
@ -1133,7 +1133,7 @@ void CB_INLINE wolfssl_ssl_conf_verify(wolfssl_ssl_config *conf,
int (*f_vrfy) WOLFSSL_X509_VERIFY_CALLBACK,
void (*p_vrfy) )
{
/* Other Crytographic providers for reference:
/* Other Cryptographic providers for reference:
conf->f_vrfy = f_vrfy; (verification function callback)
conf->p_vrfy = p_vrfy; (pre-verification value)
*/
@ -1270,7 +1270,7 @@ esp_err_t esp_crt_bundle_is_valid(void)
/* Initialize the bundle into an array so we can do binary
* search for certs; the bundle generated by the python utility is
* normally already presorted by subject name attrbutes in ARBITRARY order!
* normally already presorted by subject name attributes in ARBITRARY order!
*
* See gen_crt_bundle.py regarding element extraction sort.
*
@ -1287,7 +1287,7 @@ static esp_err_t wolfssl_esp_crt_bundle_init(const uint8_t *x509_bundle,
int ret = ESP_OK;
WOLFSSL_ENTER("wolfssl_esp_crt_bundle_init");
_esp_crt_bundle_is_valid = ESP_OK; /* Assume valid until proven otherise. */
_esp_crt_bundle_is_valid = ESP_OK; /* Assume valid until proven otherwise. */
_cert_bundle_loaded = 0;
_crt_found = 0;

View File

@ -8045,7 +8045,7 @@ L_SHA3_transform_blocksx3_neon_begin:
eor x25, x25, x28
eor x24, x24, x0
eor x26, x26, x30
# Done tranforming
# Done transforming
ldp x27, x28, [x29, #48]
ldr x0, [x27], #8
subs x28, x28, #1
@ -8392,7 +8392,7 @@ L_SHA3_shake128_blocksx3_seed_neon_begin:
eor x26, x26, x28
eor x25, x25, x0
eor x27, x27, x30
# Done tranforming
# Done transforming
ldp x28, x1, [x29, #48]
ldr x0, [x28], #8
subs x1, x1, #1
@ -8739,7 +8739,7 @@ L_SHA3_shake256_blocksx3_seed_neon_begin:
eor x26, x26, x28
eor x25, x25, x0
eor x27, x27, x30
# Done tranforming
# Done transforming
ldp x28, x1, [x29, #48]
ldr x0, [x28], #8
subs x1, x1, #1
@ -9150,7 +9150,7 @@ L_SHA3_transform_blocksx3_neon_begin:
eor v22.16b, v22.16b, v27.16b
eor v23.16b, v23.16b, v28.16b
eor v24.16b, v24.16b, v29.16b
# Done tranforming
# Done transforming
ldp x27, x28, [x29, #48]
ldr x0, [x27], #8
subs x28, x28, #1
@ -9582,7 +9582,7 @@ L_SHA3_shake128_blocksx3_seed_neon_begin:
eor v22.16b, v22.16b, v27.16b
eor v23.16b, v23.16b, v28.16b
eor v24.16b, v24.16b, v29.16b
# Done tranforming
# Done transforming
ldp x28, x1, [x29, #48]
ldr x0, [x28], #8
subs x1, x1, #1
@ -10014,7 +10014,7 @@ L_SHA3_shake256_blocksx3_seed_neon_begin:
eor v22.16b, v22.16b, v27.16b
eor v23.16b, v23.16b, v28.16b
eor v24.16b, v24.16b, v29.16b
# Done tranforming
# Done transforming
ldp x28, x1, [x29, #48]
ldr x0, [x28], #8
subs x1, x1, #1

View File

@ -12411,7 +12411,7 @@ void kyber_sha3_blocksx3_neon(word64* state)
"eor x25, x25, x28\n\t"
"eor x24, x24, %x[state]\n\t"
"eor x26, x26, x30\n\t"
/* Done tranforming */
/* Done transforming */
"ldp x27, x28, [x29, #48]\n\t"
"ldr %x[state], [x27], #8\n\t"
"subs x28, x28, #1\n\t"
@ -12732,7 +12732,7 @@ void kyber_shake128_blocksx3_seed_neon(word64* state, byte* seed)
"eor x26, x26, x28\n\t"
"eor x25, x25, %x[state]\n\t"
"eor x27, x27, x30\n\t"
/* Done tranforming */
/* Done transforming */
"ldp x28, %x[seed], [x29, #48]\n\t"
"ldr %x[state], [x28], #8\n\t"
"subs %x[seed], %x[seed], #1\n\t"
@ -13053,7 +13053,7 @@ void kyber_shake256_blocksx3_seed_neon(word64* state, byte* seed)
"eor x26, x26, x28\n\t"
"eor x25, x25, %x[state]\n\t"
"eor x27, x27, x30\n\t"
/* Done tranforming */
/* Done transforming */
"ldp x28, %x[seed], [x29, #48]\n\t"
"ldr %x[state], [x28], #8\n\t"
"subs %x[seed], %x[seed], #1\n\t"
@ -13438,7 +13438,7 @@ void kyber_sha3_blocksx3_neon(word64* state)
"eor v22.16b, v22.16b, v27.16b\n\t"
"eor v23.16b, v23.16b, v28.16b\n\t"
"eor v24.16b, v24.16b, v29.16b\n\t"
/* Done tranforming */
/* Done transforming */
"ldp x27, x28, [x29, #48]\n\t"
"ldr %x[state], [x27], #8\n\t"
"subs x28, x28, #1\n\t"
@ -13844,7 +13844,7 @@ void kyber_shake128_blocksx3_seed_neon(word64* state, byte* seed)
"eor v22.16b, v22.16b, v27.16b\n\t"
"eor v23.16b, v23.16b, v28.16b\n\t"
"eor v24.16b, v24.16b, v29.16b\n\t"
/* Done tranforming */
/* Done transforming */
"ldp x28, %x[seed], [x29, #48]\n\t"
"ldr %x[state], [x28], #8\n\t"
"subs %x[seed], %x[seed], #1\n\t"
@ -14250,7 +14250,7 @@ void kyber_shake256_blocksx3_seed_neon(word64* state, byte* seed)
"eor v22.16b, v22.16b, v27.16b\n\t"
"eor v23.16b, v23.16b, v28.16b\n\t"
"eor v24.16b, v24.16b, v29.16b\n\t"
/* Done tranforming */
/* Done transforming */
"ldp x28, %x[seed], [x29, #48]\n\t"
"ldr %x[state], [x28], #8\n\t"
"subs %x[seed], %x[seed], #1\n\t"

View File

@ -420,7 +420,7 @@ L_SHA3_transform_base_begin:
eor x25, x25, x28
eor x24, x24, x0
eor x26, x26, x30
# Done tranforming
# Done transforming
ldp x27, x28, [x29, #48]
ldr x0, [x27], #8
subs x28, x28, #1

View File

@ -370,7 +370,7 @@ void BlockSha3(word64* state)
"eor x25, x25, x28\n\t"
"eor x24, x24, %x[state]\n\t"
"eor x26, x26, x30\n\t"
/* Done tranforming */
/* Done transforming */
"ldp x27, x28, [x29, #48]\n\t"
"ldr %x[state], [x27], #8\n\t"
"subs x28, x28, #1\n\t"

View File

@ -1031,7 +1031,7 @@ int wc_MXC_MAA_init(unsigned int len)
return wc_MXC_error(&status); /* Return Status of Init */
}
/* Unlocks mutex and preforms graceful shutdown of hardware */
/* Unlocks mutex and performs graceful shutdown of hardware */
int wc_MXC_MAA_Shutdown(void)
{
int status;
@ -1120,7 +1120,7 @@ int wc_MXC_MAA_zeroPad(mp_int* multiplier, mp_int* multiplicand,
}
XMEMSET(zero_tmp, 0x00, multiplier->size*sizeof(mp_digit));
/* Check for invalid arguments befor padding */
/* Check for invalid arguments before padding */
switch ((char)clc) {
case MXC_TPU_MAA_EXP:
/* Cannot be 0 for a^e mod m operation */
@ -1446,8 +1446,8 @@ int hw_exptmod(mp_int* base, mp_int* exp, mp_int* mod, mp_int* result)
}
/* No mod function available with hardware, however preform a submod */
/* (a - 0) mod m will essentially preform the same operation as a mod m */
/* No mod function available with hardware, however perform a submod */
/* (a - 0) mod m will essentially perform the same operation as a mod m */
int hw_mod(mp_int* a, mp_int* mod, mp_int* result)
{
mp_int b;

View File

@ -4082,7 +4082,7 @@ static WC_INLINE void IncrementAesCounter(byte* inOutCtr)
{
int i;
/* Big-endian aray - start at last element and move back. */
/* Big-endian array - start at last element and move back. */
for (i = AES_BLOCK_SIZE - 1; i >= 0; i--) {
/* Result not zero means no carry. */
if ((++inOutCtr[i]) != 0) {
@ -4093,7 +4093,7 @@ static WC_INLINE void IncrementAesCounter(byte* inOutCtr)
/* Encrypt blocks of data using AES-CTR.
*
* Implemenation uses wc_AesEncrypt().
* Implementation uses wc_AesEncrypt().
*
* @param [in] aes AES object.
* @param [out] out Encrypted blocks.
@ -8788,7 +8788,7 @@ static WC_INLINE void IncrementGcmCounter(byte* inOutCtr)
{
int i;
/* Big-endian aray - start at last element and move back. */
/* Big-endian array - start at last element and move back. */
for (i = AES_BLOCK_SIZE - 1; i >= AES_BLOCK_SIZE - CTR_SZ; i--) {
/* Result not zero means no carry. */
if ((++inOutCtr[i]) != 0) {

View File

@ -698,7 +698,7 @@ static WC_INLINE void wc_chacha_encrypt_384(const word32* input, const byte* m,
* v12-v15 - fourth block
* v16-v19 - fifth block
* v20-v24 - temp/message
* v25-v27 - indeces for rotating words in vector
* v25-v27 - indices for rotating words in vector
* v28-v31 - input
*
* v0 0 1 2 3
@ -1342,7 +1342,7 @@ static WC_INLINE int wc_chacha_encrypt_256(const word32* input, const byte* m,
* v12-v15 - message
* v16-v19 - input
* v20-v22 - temp
* v23-v25 - indeces for rotating words in vector
* v23-v25 - indices for rotating words in vector
*
* v0 0 1 2 3
* v1 4 5 6 7
@ -1588,7 +1588,7 @@ static WC_INLINE int wc_chacha_encrypt_128(const word32* input, const byte* m,
* v12-v15 - message
* v16-v19 - input
* v20-v22 - temp
* v23-v25 - indeces for rotating words in vector
* v23-v25 - indices for rotating words in vector
*
* v0 0 1 2 3
* v1 4 5 6 7

View File

@ -76,7 +76,7 @@ static const FLASH_QUALIFIER ALIGN32 word32 K[64] = {
0x90BEFFFAL, 0xA4506CEBL, 0xBEF9A3F7L, 0xC67178F2L
};
/* Initialze SHA-256 object for hashing.
/* Initialize SHA-256 object for hashing.
*
* @param [in, out] sha256 SHA-256 object.
*/
@ -1192,7 +1192,7 @@ int wc_Sha256HashBlock(wc_Sha256* sha256, const unsigned char* data,
#ifdef WOLFSSL_SHA224
/* Initialze SHA-224 object for hashing.
/* Initialize SHA-224 object for hashing.
*
* @param [in, out] sha224 SHA-224 object.
*/

View File

@ -129,7 +129,7 @@ static int InitSha512(wc_Sha512* sha512, void* heap, int devId)
return ret;
}
/* Initialze SHA-512 object for hashing.
/* Initialize SHA-512 object for hashing.
*
* @param [in, out] sha512 SHA-512 object.
*/
@ -1493,7 +1493,7 @@ int wc_Sha512_256Transform(wc_Sha512* sha512, const unsigned char* data)
#ifdef WOLFSSL_SHA384
/* Initialze SHA-384 object for hashing.
/* Initialize SHA-384 object for hashing.
*
* @param [in, out] sha384 SHA-384 object.
*/

View File

@ -1390,10 +1390,10 @@ static void sp_256_mont_inv_10(sp_digit* r, const sp_digit* a, sp_digit* td)
}
/* Map the Montgomery form projective co-ordinate point to an affine point.
/* Map the Montgomery form projective coordinate point to an affine point.
*
* r Resulting affine co-ordinate point.
* p Montgomery form projective co-ordinate point.
* r Resulting affine coordinate point.
* p Montgomery form projective coordinate point.
* t Temporary ordinate data.
*/
static void sp_256_map_10(sp_point* r, const sp_point* p, sp_digit* t)
@ -1910,7 +1910,7 @@ static void sp_256_proj_point_add_10(sp_point* r, const sp_point* p, const sp_po
#ifdef WOLFSSL_SP_SMALL
/* Multiply the point by the scalar and return the result.
* If map is true then convert result to affine co-ordinates.
* If map is true then convert result to affine coordinates.
*
* r Resulting point.
* g Point to multiply.
@ -2006,7 +2006,7 @@ static int sp_256_ecc_mulmod_10(sp_point* r, const sp_point* g, const sp_digit*
#elif !defined(WC_NO_CACHE_RESISTANT)
/* Multiply the point by the scalar and return the result.
* If map is true then convert result to affine co-ordinates.
* If map is true then convert result to affine coordinates.
*
* r Resulting point.
* g Point to multiply.
@ -2119,7 +2119,7 @@ typedef struct sp_table_entry {
} sp_table_entry;
/* Multiply the point by the scalar and return the result.
* If map is true then convert result to affine co-ordinates.
* If map is true then convert result to affine coordinates.
*
* r Resulting point.
* g Point to multiply.
@ -2517,7 +2517,7 @@ static int sp_256_gen_stripe_table_10(const sp_point* a,
#endif /* FP_ECC */
/* Multiply the point by the scalar and return the result.
* If map is true then convert result to affine co-ordinates.
* If map is true then convert result to affine coordinates.
*
* r Resulting point.
* k Scalar to multiply by.
@ -2679,7 +2679,7 @@ static void sp_ecc_get_cache(const sp_point* g, sp_cache_t** cache)
#endif /* FP_ECC */
/* Multiply the base point of P256 by the scalar and return the result.
* If map is true then convert result to affine co-ordinates.
* If map is true then convert result to affine coordinates.
*
* r Resulting point.
* g Point to multiply.
@ -2735,7 +2735,7 @@ static int sp_256_ecc_mulmod_10(sp_point* r, const sp_point* g, const sp_digit*
#ifdef WOLFSSL_SP_SMALL
/* Multiply the base point of P256 by the scalar and return the result.
* If map is true then convert result to affine co-ordinates.
* If map is true then convert result to affine coordinates.
*
* r Resulting point.
* k Scalar to multiply by.
@ -4033,7 +4033,7 @@ static const sp_table_entry p256_table[256] = {
};
/* Multiply the base point of P256 by the scalar and return the result.
* If map is true then convert result to affine co-ordinates.
* If map is true then convert result to affine coordinates.
*
* r Resulting point.
* k Scalar to multiply by.

View File

@ -49,7 +49,7 @@
* WOLFSSL_SMALL_STACK Default: OFF
* Use less stack by dynamically allocating local variables.
*
* WOLFSSL_KYBER_NTT_UNROLL Defualt: OFF
* WOLFSSL_KYBER_NTT_UNROLL Default: OFF
* Enable an alternative NTT implementation that may be faster on some
* platforms and is smaller in code size.
* WOLFSSL_KYBER_INVNTT_UNROLL Default: OFF

View File

@ -31,7 +31,7 @@
/* WOLFSSL_USER_SETTINGS must be defined, typically in the CMakeLists.txt: */
/* set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -DWOLFSSL_USER_SETTINGS") */
#ifndef WOLFSSL_USER_SETTINGS
#error "WOLFSSL_USER_SETTINGS must be defined for Espressif targts"
#error "WOLFSSL_USER_SETTINGS must be defined for Espressif targets"
#endif
/* FreeRTOS */

View File

@ -30,7 +30,7 @@
#if defined(WOLFSSL_ESPIDF) /* Entire file is only for Espressif EDP-IDF */
#ifndef WOLFSSL_USER_SETTINGS
#error "WOLFSSL_USER_SETTINGS must be defined for Espressif targts"
#error "WOLFSSL_USER_SETTINGS must be defined for Espressif targets"
#endif
#include "sdkconfig.h" /* ensure ESP-IDF settings are available everywhere */

View File

@ -76,7 +76,7 @@
#if defined(WOLFSSL_ESPIDF) /* Entire file is only for Espressif EDP-IDF */
#ifndef WOLFSSL_USER_SETTINGS
#error "WOLFSSL_USER_SETTINGS must be defined for Espressif targts"
#error "WOLFSSL_USER_SETTINGS must be defined for Espressif targets"
#endif
#if defined(CONFIG_ESP_TLS_USING_WOLFSSL) || \

View File

@ -232,15 +232,15 @@
/* Store 8 Vector register. */
#define VS8R_V(vs3, rs1) VSR_V(vs3, rs1, 8)
/* Move from vector register to vector registor. */
/* Move from vector register to vector register. */
#define VMV_V_V(vd, vs1) \
ASM_WORD((0b1010111 << 0) | (0b000 << 12) | (0b1 << 25) | \
(0b010111 << 26) | ((vd) << 7) | ((vs1) << 15))
/* Splat register to each component of the vector registor. */
/* Splat register to each component of the vector register. */
#define VMV_V_X(vd, rs1) \
ASM_WORD((0b1010111 << 0) | (0b100 << 12) | (0b1 << 25) | \
(0b010111 << 26) | ((vd) << 7) | ((rs1) << 15))
/* Splat immediate to each component of the vector registor. */
/* Splat immediate to each component of the vector register. */
#define VMV_V_I(vd, imm) \
ASM_WORD((0b1010111 << 0) | (0b011 << 12) | (0b1 << 25) | \
(0b010111 << 26) | ((vd) << 7) | ((imm) << 15))
@ -403,19 +403,19 @@
* Vector Bit Manipulation
*/
/* Reverse order of bytes in words of vector regsiter. */
/* Reverse order of bytes in words of vector register. */
#define VREV8(vd, vs2) \
ASM_WORD((0b010010 << 26) | (0b1 << 25) | (0b01001<< 15) | \
(0b010 << 12) | (0b1010111 << 0) | \
(vs2 << 20) | (vd << 7))
/* Rotate left bits of vector regsiter. */
/* Rotate left bits of vector register. */
#define VROL_VX(vd, vs2, rs) \
ASM_WORD((0b010101 << 26) | (0b1 << 25) | (0b100 << 12) | \
(0b1010111 << 0) | \
(vs2 << 20) | (rs << 15) | (vd << 7))
/* Rotate right bits of vector regsiter. */
/* Rotate right bits of vector register. */
#define VROR_VI(vd, imm, vs2) \
ASM_WORD((0b01010 << 27) | (0b1 << 25) | (0b011 << 12) | \
(0b1010111 << 0) | ((imm >> 5) << 26) | \

View File

@ -1641,7 +1641,7 @@ namespace wolfSSL.CSharp
}
finally
{
/* Clenup */
/* Cleanup */
if (inMsgPtr != IntPtr.Zero) Marshal.FreeHGlobal(inMsgPtr);
if (outMsgPtr != IntPtr.Zero) Marshal.FreeHGlobal(outMsgPtr);
}