forked from wolfSSL/wolfssl
Fix residual typos found by codespell
This commit is contained in:
@@ -3255,7 +3255,7 @@ More info can be found on-line at //http://wolfssl.com/yaSSL/Docs.html
|
|||||||
a) If using wolfSSL for DTLS on the server side of a publicly accessible
|
a) If using wolfSSL for DTLS on the server side of a publicly accessible
|
||||||
machine you MUST update.
|
machine you MUST update.
|
||||||
b) If using wolfSSL for TLS on the server side with private RSA keys allowing
|
b) If using wolfSSL for TLS on the server side with private RSA keys allowing
|
||||||
ephemeral key exchange without low memory optimziations you MUST update and
|
ephemeral key exchange without low memory optimizations you MUST update and
|
||||||
regenerate the private RSA keys.
|
regenerate the private RSA keys.
|
||||||
|
|
||||||
Please see https://www.wolfssl.com/wolfSSL/Blog/Blog.html for more details
|
Please see https://www.wolfssl.com/wolfSSL/Blog/Blog.html for more details
|
||||||
|
@@ -6,7 +6,7 @@
|
|||||||
/** Firmware update data and user key data */
|
/** Firmware update data and user key data */
|
||||||
typedef struct user_key_block_data
|
typedef struct user_key_block_data
|
||||||
{
|
{
|
||||||
/* Provisioning key wapped by Renesas DLM */
|
/* Provisioning key wrapped by Renesas DLM */
|
||||||
uint8_t encrypted_provisioning_key[HW_SCE_AES_CBC_IV_BYTE_SIZE * 2];
|
uint8_t encrypted_provisioning_key[HW_SCE_AES_CBC_IV_BYTE_SIZE * 2];
|
||||||
/* Initial vector to be used when creating encrypted key */
|
/* Initial vector to be used when creating encrypted key */
|
||||||
uint8_t iv[HW_SCE_AES_CBC_IV_BYTE_SIZE];
|
uint8_t iv[HW_SCE_AES_CBC_IV_BYTE_SIZE];
|
||||||
|
@@ -311,7 +311,7 @@ static int check_sha256(void)
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (memcmp(mcDigest, defDigest, CRYPT_SHA256_DIGEST_SIZE) != 0) {
|
if (memcmp(mcDigest, defDigest, CRYPT_SHA256_DIGEST_SIZE) != 0) {
|
||||||
printf("sha256 final memcmp fialed\n");
|
printf("sha256 final memcmp failed\n");
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
printf("sha256 mcapi test passed\n");
|
printf("sha256 mcapi test passed\n");
|
||||||
@@ -351,7 +351,7 @@ static int check_sha384(void)
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (memcmp(mcDigest, defDigest, CRYPT_SHA384_DIGEST_SIZE) != 0) {
|
if (memcmp(mcDigest, defDigest, CRYPT_SHA384_DIGEST_SIZE) != 0) {
|
||||||
printf("sha384 final memcmp fialed\n");
|
printf("sha384 final memcmp failed\n");
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
printf("sha384 mcapi test passed\n");
|
printf("sha384 mcapi test passed\n");
|
||||||
@@ -391,7 +391,7 @@ static int check_sha512(void)
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (memcmp(mcDigest, defDigest, CRYPT_SHA512_DIGEST_SIZE) != 0) {
|
if (memcmp(mcDigest, defDigest, CRYPT_SHA512_DIGEST_SIZE) != 0) {
|
||||||
printf("sha512 final memcmp fialed\n");
|
printf("sha512 final memcmp failed\n");
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
printf("sha512 mcapi test passed\n");
|
printf("sha512 mcapi test passed\n");
|
||||||
@@ -434,7 +434,7 @@ static int check_hmac(void)
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (memcmp(mcDigest, defDigest, CRYPT_SHA_DIGEST_SIZE) != 0) {
|
if (memcmp(mcDigest, defDigest, CRYPT_SHA_DIGEST_SIZE) != 0) {
|
||||||
printf("hmac sha final memcmp fialed\n");
|
printf("hmac sha final memcmp failed\n");
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
printf("hmac sha mcapi test passed\n");
|
printf("hmac sha mcapi test passed\n");
|
||||||
@@ -462,7 +462,7 @@ static int check_hmac(void)
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (memcmp(mcDigest, defDigest, CRYPT_SHA256_DIGEST_SIZE) != 0) {
|
if (memcmp(mcDigest, defDigest, CRYPT_SHA256_DIGEST_SIZE) != 0) {
|
||||||
printf("hmac sha256 final memcmp fialed\n");
|
printf("hmac sha256 final memcmp failed\n");
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
printf("hmac sha256 mcapi test passed\n");
|
printf("hmac sha256 mcapi test passed\n");
|
||||||
@@ -490,7 +490,7 @@ static int check_hmac(void)
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (memcmp(mcDigest, defDigest, CRYPT_SHA384_DIGEST_SIZE) != 0) {
|
if (memcmp(mcDigest, defDigest, CRYPT_SHA384_DIGEST_SIZE) != 0) {
|
||||||
printf("hmac sha384 final memcmp fialed\n");
|
printf("hmac sha384 final memcmp failed\n");
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
printf("hmac sha384 mcapi test passed\n");
|
printf("hmac sha384 mcapi test passed\n");
|
||||||
@@ -518,7 +518,7 @@ static int check_hmac(void)
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (memcmp(mcDigest, defDigest, CRYPT_SHA512_DIGEST_SIZE) != 0) {
|
if (memcmp(mcDigest, defDigest, CRYPT_SHA512_DIGEST_SIZE) != 0) {
|
||||||
printf("hmac sha512 final memcmp fialed\n");
|
printf("hmac sha512 final memcmp failed\n");
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
printf("hmac sha512 mcapi test passed\n");
|
printf("hmac sha512 mcapi test passed\n");
|
||||||
|
@@ -7,7 +7,7 @@ using the WolfSSL Ada binding. The implementation is cross-platform
|
|||||||
and compiles on Linux, Mac OS X and Windows.
|
and compiles on Linux, Mac OS X and Windows.
|
||||||
|
|
||||||
Security: The WolfSSL Ada binding avoids usage of the
|
Security: The WolfSSL Ada binding avoids usage of the
|
||||||
Seconday Stack. The GNAT compiler has a number of hardening
|
Secondary Stack. The GNAT compiler has a number of hardening
|
||||||
features for example Stack Scrubbing; the compiler can generate
|
features for example Stack Scrubbing; the compiler can generate
|
||||||
code to zero-out stack frames used by subprograms.
|
code to zero-out stack frames used by subprograms.
|
||||||
Unfortunately this works well for the primary stack but not
|
Unfortunately this works well for the primary stack but not
|
||||||
@@ -108,4 +108,4 @@ found in the files:
|
|||||||
spark_sockets.ads
|
spark_sockets.ads
|
||||||
spark_sockets.adb
|
spark_sockets.adb
|
||||||
spark_terminal.ads
|
spark_terminal.ads
|
||||||
spark_terminal.adb
|
spark_terminal.adb
|
||||||
|
Reference in New Issue
Block a user