Fix spelling warnings

This commit is contained in:
Eric Blankenhorn
2023-11-22 12:34:56 -06:00
parent dda72dc19c
commit 7223b5a708
34 changed files with 114 additions and 114 deletions

View File

@ -23,7 +23,7 @@ NOTE: * --enable-heapmath is being deprecated and will be removed by 2024
* Added LMS/HSS and XMSS/XMSS^MT wolfcrypt hooks, both normal and verify-only options.
* Added support for the AES EAX mode of operation
* Port for use with Hitch (https://github.com/varnish/hitch) added
* Add XTS API's to handle multiple sectors in new port ot VeraCrypt
* Add XTS API's to handle multiple sectors in new port to VeraCrypt
## Enhancements and Optimizations

View File

@ -27,7 +27,7 @@
/* wolfCrypt_Init/wolfCrypt_Cleanup to turn CryptoCell hardware on/off */
#include <wolfssl/wolfcrypt/wc_port.h>
/* SEGGER_RTT_Init, you can potential replace it with other serial terminal */
/* SEGGER_RTT_Init, you can potentially replace it with other serial terminal */
#include "SEGGER_RTT.h"
int main(void)

View File

@ -206,7 +206,7 @@ else()
"\"${WOLFSSL_ROOT}/wolfcrypt/src\""
"\"${WOLFSSL_ROOT}/wolfcrypt/src/port/Espressif\""
"\"${WOLFSSL_ROOT}/wolfcrypt/src/port/atmel\""
# TODO: Make this a univeral makefile that detects if bechmark / test needed
# TODO: Make this a universal makefile that detects if benchmark / test needed
# Sometimes problematic with SM; consider gating detection.
#"\"${WOLFSSL_ROOT}/wolfcrypt/benchmark\"" # the benchmark application
#"\"${WOLFSSL_ROOT}/wolfcrypt/test\"" # the test application

View File

@ -206,7 +206,7 @@ else()
"\"${WOLFSSL_ROOT}/wolfcrypt/src\""
"\"${WOLFSSL_ROOT}/wolfcrypt/src/port/Espressif\""
"\"${WOLFSSL_ROOT}/wolfcrypt/src/port/atmel\""
# TODO: Make this a univeral makefile that detects if bechmark / test needed
# TODO: Make this a universal makefile that detects if benchmark / test needed
# Sometimes problematic with SM; consider gating detection.
#"\"${WOLFSSL_ROOT}/wolfcrypt/benchmark\"" # the benchmark application
#"\"${WOLFSSL_ROOT}/wolfcrypt/test\"" # the test application

View File

@ -241,6 +241,6 @@ void app_main(void)
#else
vTaskDelay(60000);
#endif
} /* done whle */
} /* done while */
#endif
}

View File

@ -12,7 +12,7 @@ Setup process:
- Unzip wolfssl under the same directory
2. Set up wolfSSL
- open wolfssl\IDE\Renesas\cs+\Projec/wolfssl\lib.mtpj with CS+ and build
- open wolfssl\IDE\Renesas\cs+\Projects\wolfssl\lib.mtpj with CS+ and build
- open t4_demo.mtpj and build. This create demo program library.
3. Set up AlphaProject

View File

@ -152,7 +152,7 @@ $./examples/server/server -b -d -i -v 4
+ For ECDSA sign and verify use,
Enable the `USE_CERT_BUFFER_256` macro in `wolfssl_demo.h`
Disble the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h`
Disable the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h`
+ launch server with the following option.
```
@ -214,7 +214,7 @@ $./examples/server/server -b -d -i -v 3
+ For ECDSA sign and verify use,
Enable the `USE_CERT_BUFFER_256` macro in `wolfssl_demo.h`
Disble the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h`
Disable the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h`
+ launch server with the following option.
```
@ -281,7 +281,7 @@ static const byte ucIPAddress[4] = { 192, 168, 11, 241 };
+ For ECDSA sign and verify use,
Enable the `USE_CERT_BUFFER_256` macro in `wolfssl_demo.h`
Disble the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h`
Disable the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h`
+ launch server from e2studio
@ -311,7 +311,7 @@ Cleaning up socket and wolfSSL objects.
Waiting connection....
```
You will see the follwoing message on Linux terminal.
You will see the following message on Linux terminal.
```
$ ./examples/client/client -h 192.168.11.241 -p 11111 -v 4
SSL version is TLSv1.3
@ -333,7 +333,7 @@ Received: hello wolfssl!
Cleaning up socket and wolfSSL objects.
Waiting connection....
```
You will see the follwoing message on Linux terminal.
You will see the following message on Linux terminal.
```
$ ./examples/client/client -h 192.168.11.241 -p 11111 -v 4 -A ./certs/ca-ecc-cert.pem -c ./certs/client-ecc-cert.pem -k ./cert
s/ecc-client-key.pem
@ -359,7 +359,7 @@ static const byte ucIPAddress[4] = { 192, 168, 11, 241 };
+ For ECDSA sign and verify use,
Enable the `USE_CERT_BUFFER_256` macro in `wolfssl_demo.h`
Disble the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h`
Disable the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h`
+ launch server from e2studio
@ -389,7 +389,7 @@ Cleaning up socket and wolfSSL objects.
Waiting connection....
```
You will see the follwoing message on Linux terminal.
You will see the following message on Linux terminal.
```
$ ./examples/client/client -h 192.168.11.241 -p 11111 -v 3
SSL version is TLSv1.2
@ -411,7 +411,7 @@ Received: hello wolfssl!
Cleaning up socket and wolfSSL objects.
Waiting connection....
```
You will see the follwoing message on Linux terminal.
You will see the following message on Linux terminal.
```
$ ./examples/client/client -h 192.168.11.241 -p 11111 -v 3 -A ./certs/ca-ecc-cert.pem -c ./certs/client-ecc-cert.pem -k ./certs/ecc-client-key.pem
SSL version is TLSv1.2

View File

@ -131,7 +131,7 @@ void RSIP_KeyGeneration(FSPSM_ST *g)
}
/* only pointer sets to NULL */
/* onwer of keys should be freed */
/* owner of keys should be freed */
void Clr_CallbackCtx(FSPSM_ST *g)
{
(void) g;

2
README
View File

@ -95,7 +95,7 @@ NOTE: * --enable-heapmath is being deprecated and will be removed by 2024
* Added LMS/HSS and XMSS/XMSS^MT wolfcrypt hooks, both normal and verify-only options.
* Added support for the AES EAX mode of operation
* Port for use with Hitch (https://github.com/varnish/hitch) added
* Add XTS API's to handle multiple sectors in new port ot VeraCrypt
* Add XTS API's to handle multiple sectors in new port to VeraCrypt
## Enhancements and Optimizations

View File

@ -100,7 +100,7 @@ NOTE: * --enable-heapmath is being deprecated and will be removed by 2024
* Added LMS/HSS and XMSS/XMSS^MT wolfcrypt hooks, both normal and verify-only options.
* Added support for the AES EAX mode of operation
* Port for use with Hitch (https://github.com/varnish/hitch) added
* Add XTS API's to handle multiple sectors in new port ot VeraCrypt
* Add XTS API's to handle multiple sectors in new port to VeraCrypt
## Enhancements and Optimizations

View File

@ -1533,7 +1533,7 @@ WOLFSSL_API int wc_AesEaxEncryptFinal(AesEax* eax,
\ref wc_AesEaxInit. When done using the \c AesEax context structure, make
sure to free it using \ref wc_AesEaxFree.
\return 0 if data is authenticated succesfully
\return 0 if data is authenticated successfully
\return AES_EAX_AUTH_E if the authentication tag does not match the
supplied authentication code vector \c authIn
\return other error code on failure

View File

@ -27,7 +27,7 @@
THREAD_RETURN WOLFSSL_THREAD server_test(void* args);
/* Echo bytes using buffer of blockSize until [echoData] bytes are complete. */
/* If [bechmarkThroughput] set the statistcs will be output at the end */
/* If [benchmarkThroughput] set the statistics will be output at the end */
int ServerEchoData(WOLFSSL* ssl, int clientfd, int echoData, int blockSize,
size_t benchmarkThroughput);

View File

@ -20394,7 +20394,7 @@ int ProcessReplyEx(WOLFSSL* ssl, int allowSocketErr)
case getRecordLayerHeader:
/* DTLSv1.3 record numbers in the header are encrypted, and AAD
* uses the unecrypted form. Because of this we need to modify the
* uses the unencrypted form. Because of this we need to modify the
* header, decrypting the numbers inside
* DtlsParseUnifiedRecordLayer(). This violates the const attribute
* of the buffer parameter of GetRecordHeader() used here. */

View File

@ -8432,7 +8432,7 @@ static int LoadSystemCaCertsWindows(WOLFSSL_CTX* ctx, byte* loaded)
* directly into wolfSSL "the old way".
*
* As of MacOS 14.0 we are still able to use this method to access system
* certificates. Accessiblity of this API is indicated by the presence of the
* certificates. Accessibility of this API is indicated by the presence of the
* Security/SecTrustSettings.h header. In the likely event that Apple removes
* access to this API on Macs, this function should be removed and the
* DoAppleNativeCertValidation() routine should be used for all devices.
@ -8579,7 +8579,7 @@ int wolfSSL_CTX_load_system_CA_certs(WOLFSSL_CTX* ctx)
#if defined(HAVE_SECURITY_SECTRUSTSETTINGS_H) \
&& !defined(WOLFSSL_APPLE_NATIVE_CERT_VALIDATION)
/* As of MacOS 14.0 we are still able to access system certificates and
* load them manually into wolfSSL "the old way". Accessiblity of this API
* load them manually into wolfSSL "the old way". Accessibility of this API
* is indicated by the presence of the Security/SecTrustSettings.h header */
ret = LoadSystemCaCertsMac(ctx, &loaded);
#elif defined(WOLFSSL_APPLE_NATIVE_CERT_VALIDATION)

View File

@ -1616,8 +1616,8 @@ WOLFSSL_HMAC_CTX* wolfSSL_HMAC_CTX_new(void)
*
* Not an OpenSSL compatibility API.
*
* @param [in, out] ctx HMAC contect object.
* @return 1 inficating success.
* @param [in, out] ctx HMAC context object.
* @return 1 indicating success.
*/
int wolfSSL_HMAC_CTX_Init(WOLFSSL_HMAC_CTX* ctx)
{

View File

@ -35690,7 +35690,7 @@ static int test_X509_STORE_untrusted(void)
NULL
};
/* Only immediate issuer in untrusted chaing. Fails since can't build chain
/* Only immediate issuer in untrusted chain. Fails since can't build chain
* to loaded CA. */
ExpectIntEQ(test_X509_STORE_untrusted_certs(untrusted1, 0,
X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY, 1), TEST_SUCCESS);

View File

@ -231,7 +231,7 @@ const char * wc_LmsKey_RcToStr(enum wc_LmsRc lmsEc)
/* Init an LMS key.
*
* Call this before setting the parms of an LMS key.
* Call this before setting the params of an LMS key.
*
* Returns 0 on success.
* */
@ -404,7 +404,7 @@ int wc_LmsKey_SetParameters(LmsKey * key, int levels, int height,
key->lm_ots_type[i] = ots;
}
/* Move the state to parms set.
/* Move the state to params set.
* Key is ready for MakeKey or Reload. */
key->state = WC_LMS_STATE_PARMSET;
@ -656,7 +656,7 @@ int wc_LmsKey_MakeKey(LmsKey* key, WC_RNG * rng)
return 0;
}
/* Reload a key that has been prepared with the appropriate parms and
/* Reload a key that has been prepared with the appropriate params and
* data. Use this if you wish to resume signing with an existing key.
*
* Write/read callbacks, and context data, must be set prior.

View File

@ -97,7 +97,7 @@ static int sha256_cb(const unsigned char *in, unsigned long long inlen,
/* Init an XMSS key.
*
* Call this before setting the parms of an XMSS key.
* Call this before setting the params of an XMSS key.
*
* key [in] The XMSS key to init.
* heap [in] Unused.
@ -201,7 +201,7 @@ static int wc_XmssKey_SetOid(XmssKey * key, uint32_t oid, int is_xmssmt)
/* Set the XMSS key parameter string.
*
* The input string must be one of the supported parm set names in
* The input string must be one of the supported param set names in
* the "Name" section from the table in wolfssl/wolfcrypt/xmss.h,
* e.g. "XMSS-SHA2_10_256" or "XMSSMT-SHA2_20/4_256".
*

View File

@ -818,7 +818,7 @@ int esp_mp_montgomery_init(MATH_INT_T* X, MATH_INT_T* Y, MATH_INT_T* M,
return MP_HW_FALLBACK;
}
if ((X == NULL) || (Y == NULL) || (M == NULL) ) {
/* if a bad oprand passed, we cannot use HW */
/* if a bad operand passed, we cannot use HW */
ESP_LOGE(TAG, "ERROR: Bad montgomery operand, falling back to SW");
return MP_HW_FALLBACK;
}
@ -1437,10 +1437,10 @@ int esp_mp_mulmod(MATH_INT_T* X, MATH_INT_T* Y, MATH_INT_T* M, MATH_INT_T* Z)
SET_HW_VALIDATION;
reti = mp_mulmod(X2, Y2, M2, Z2);
if (reti == 0) {
ESP_LOGV(TAG, "wolfSSL mp_mulmod during vaidation success");
ESP_LOGV(TAG, "wolfSSL mp_mulmod during validation success");
}
else {
ESP_LOGE(TAG, "wolfSSL mp_mulmod during vaidation failed");
ESP_LOGE(TAG, "wolfSSL mp_mulmod during validation failed");
}
CLR_HW_VALIDATION;
}

View File

@ -1882,7 +1882,7 @@ static int Aes128GcmEncrypt(Aes* aes, byte* out, const byte* in, word32 sz,
byte counter[AES_BLOCK_SIZE];
byte scratch[AES_BLOCK_SIZE];
/* Noticed different optimization levels treated head of array different.
* Some cases was stack pointer plus offset others was a regester containing
* Some cases was stack pointer plus offset others was a register containing
* address. To make uniform for passing in to inline assembly code am using
* pointers to the head of each local array.
*/
@ -3528,7 +3528,7 @@ static int Aes192GcmEncrypt(Aes* aes, byte* out, const byte* in, word32 sz,
byte counter[AES_BLOCK_SIZE];
byte scratch[AES_BLOCK_SIZE];
/* Noticed different optimization levels treated head of array different.
* Some cases was stack pointer plus offset others was a regester containing
* Some cases was stack pointer plus offset others was a register containing
* address. To make uniform for passing in to inline assembly code am using
* pointers to the head of each local array.
*/
@ -5291,7 +5291,7 @@ static int Aes256GcmEncrypt(Aes* aes, byte* out, const byte* in, word32 sz,
byte counter[AES_BLOCK_SIZE];
byte scratch[AES_BLOCK_SIZE];
/* Noticed different optimization levels treated head of array different.
* Some cases was stack pointer plus offset others was a regester containing
* Some cases was stack pointer plus offset others was a register containing
* address. To make uniform for passing in to inline assembly code am using
* pointers to the head of each local array.
*/

View File

@ -1228,7 +1228,7 @@ word32 wc_SECO_WrapKey(word32 keyId, byte* in, word32 inSz, byte* iv,
}
/* trasnlates the HSM error to wolfSSL error and does debug print out */
/* Translates the HSM error to wolfSSL error and does debug print out */
int wc_TranslateHSMError(int current, hsm_err_t err)
{
int ret = -1;

View File

@ -79129,7 +79129,7 @@ int sp_ecc_verify_256_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* point EC point.
* heap Heap to use if dynamically allocating.
@ -79185,7 +79185,7 @@ static int sp_256_ecc_is_point_8(const sp_point_256* point,
return err;
}
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* pX X ordinate of EC point.
* pY Y ordinate of EC point.
@ -97205,7 +97205,7 @@ int sp_ecc_verify_384_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* point EC point.
* heap Heap to use if dynamically allocating.
@ -97261,7 +97261,7 @@ static int sp_384_ecc_is_point_12(const sp_point_384* point,
return err;
}
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* pX X ordinate of EC point.
* pY Y ordinate of EC point.
@ -126155,7 +126155,7 @@ int sp_ecc_verify_521_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* point EC point.
* heap Heap to use if dynamically allocating.
@ -126211,7 +126211,7 @@ static int sp_521_ecc_is_point_17(const sp_point_521* point,
return err;
}
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* pX X ordinate of EC point.
* pY Y ordinate of EC point.
@ -156590,7 +156590,7 @@ static void sp_1024_from_bin(sp_digit* r, int size, const byte* a, int n)
}
}
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* point EC point.
* heap Heap to use if dynamically allocating.
@ -156650,7 +156650,7 @@ static int sp_1024_ecc_is_point_32(const sp_point_1024* point,
return err;
}
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* pX X ordinate of EC point.
* pY Y ordinate of EC point.

View File

@ -99,7 +99,7 @@ static void sp_2048_from_bin(sp_digit* r, int size, const byte* a, int n)
"subs x6, %[n], 8\n\t"
"mov x7, xzr\n\t"
"blt 2f\n\t"
/* Put in mulitples of 8 bytes. */
/* Put in multiples of 8 bytes. */
"1:\n\t"
"ldr x8, [x4], -8\n\t"
"subs x6, x6, 8\n\t"
@ -6992,7 +6992,7 @@ static void sp_3072_from_bin(sp_digit* r, int size, const byte* a, int n)
"subs x6, %[n], 8\n\t"
"mov x7, xzr\n\t"
"blt 2f\n\t"
/* Put in mulitples of 8 bytes. */
/* Put in multiples of 8 bytes. */
"1:\n\t"
"ldr x8, [x4], -8\n\t"
"subs x6, x6, 8\n\t"
@ -16595,7 +16595,7 @@ static void sp_4096_from_bin(sp_digit* r, int size, const byte* a, int n)
"subs x6, %[n], 8\n\t"
"mov x7, xzr\n\t"
"blt 2f\n\t"
/* Put in mulitples of 8 bytes. */
/* Put in multiples of 8 bytes. */
"1:\n\t"
"ldr x8, [x4], -8\n\t"
"subs x6, x6, 8\n\t"
@ -39685,7 +39685,7 @@ static void sp_256_from_bin(sp_digit* r, int size, const byte* a, int n)
"subs x6, %[n], 8\n\t"
"mov x7, xzr\n\t"
"blt 2f\n\t"
/* Put in mulitples of 8 bytes. */
/* Put in multiples of 8 bytes. */
"1:\n\t"
"ldr x8, [x4], -8\n\t"
"subs x6, x6, 8\n\t"
@ -42127,7 +42127,7 @@ SP_NOINLINE static void sp_256_mont_add_4(sp_digit* r, const sp_digit* a,
(void)m;
}
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* point EC point.
* heap Heap to use if dynamically allocating.
@ -42183,7 +42183,7 @@ static int sp_256_ecc_is_point_4(const sp_point_256* point,
return err;
}
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* pX X ordinate of EC point.
* pY Y ordinate of EC point.
@ -66452,7 +66452,7 @@ static void sp_384_from_bin(sp_digit* r, int size, const byte* a, int n)
"subs x6, %[n], 8\n\t"
"mov x7, xzr\n\t"
"blt 2f\n\t"
/* Put in mulitples of 8 bytes. */
/* Put in multiples of 8 bytes. */
"1:\n\t"
"ldr x8, [x4], -8\n\t"
"subs x6, x6, 8\n\t"
@ -68207,7 +68207,7 @@ int sp_ecc_verify_384_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* point EC point.
* heap Heap to use if dynamically allocating.
@ -68263,7 +68263,7 @@ static int sp_384_ecc_is_point_6(const sp_point_384* point,
return err;
}
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* pX X ordinate of EC point.
* pY Y ordinate of EC point.
@ -111616,7 +111616,7 @@ static void sp_521_from_bin(sp_digit* r, int size, const byte* a, int n)
"subs x6, %[n], 8\n\t"
"mov x7, xzr\n\t"
"blt 2f\n\t"
/* Put in mulitples of 8 bytes. */
/* Put in multiples of 8 bytes. */
"1:\n\t"
"ldr x8, [x4], -8\n\t"
"subs x6, x6, 8\n\t"
@ -113151,7 +113151,7 @@ int sp_ecc_verify_521_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* point EC point.
* heap Heap to use if dynamically allocating.
@ -113207,7 +113207,7 @@ static int sp_521_ecc_is_point_9(const sp_point_521* point,
return err;
}
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* pX X ordinate of EC point.
* pY Y ordinate of EC point.
@ -125240,7 +125240,7 @@ static void sp_1024_from_bin(sp_digit* r, int size, const byte* a, int n)
"subs x6, %[n], 8\n\t"
"mov x7, xzr\n\t"
"blt 2f\n\t"
/* Put in mulitples of 8 bytes. */
/* Put in multiples of 8 bytes. */
"1:\n\t"
"ldr x8, [x4], -8\n\t"
"subs x6, x6, 8\n\t"
@ -125334,7 +125334,7 @@ static void sp_1024_from_bin(sp_digit* r, int size, const byte* a, int n)
);
}
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* point EC point.
* heap Heap to use if dynamically allocating.
@ -125394,7 +125394,7 @@ static int sp_1024_ecc_is_point_16(const sp_point_1024* point,
return err;
}
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* pX X ordinate of EC point.
* pY Y ordinate of EC point.

View File

@ -107674,7 +107674,7 @@ int sp_ecc_verify_256_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* point EC point.
* heap Heap to use if dynamically allocating.
@ -107730,7 +107730,7 @@ static int sp_256_ecc_is_point_8(const sp_point_256* point,
return err;
}
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* pX X ordinate of EC point.
* pY Y ordinate of EC point.
@ -118870,7 +118870,7 @@ int sp_ecc_verify_384_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* point EC point.
* heap Heap to use if dynamically allocating.
@ -118926,7 +118926,7 @@ static int sp_384_ecc_is_point_12(const sp_point_384* point,
return err;
}
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* pX X ordinate of EC point.
* pY Y ordinate of EC point.
@ -135812,7 +135812,7 @@ int sp_ecc_verify_521_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* point EC point.
* heap Heap to use if dynamically allocating.
@ -135868,7 +135868,7 @@ static int sp_521_ecc_is_point_17(const sp_point_521* point,
return err;
}
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* pX X ordinate of EC point.
* pY Y ordinate of EC point.
@ -218581,7 +218581,7 @@ static void sp_1024_from_bin(sp_digit* r, int size, const byte* a, int n)
}
}
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* point EC point.
* heap Heap to use if dynamically allocating.
@ -218641,7 +218641,7 @@ static int sp_1024_ecc_is_point_32(const sp_point_1024* point,
return err;
}
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* pX X ordinate of EC point.
* pY Y ordinate of EC point.

View File

@ -26541,7 +26541,7 @@ int sp_ecc_verify_256_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* point EC point.
* heap Heap to use if dynamically allocating.
@ -26597,7 +26597,7 @@ static int sp_256_ecc_is_point_9(const sp_point_256* point,
return err;
}
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* pX X ordinate of EC point.
* pY Y ordinate of EC point.
@ -34622,7 +34622,7 @@ int sp_ecc_verify_384_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* point EC point.
* heap Heap to use if dynamically allocating.
@ -34678,7 +34678,7 @@ static int sp_384_ecc_is_point_15(const sp_point_384* point,
return err;
}
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* pX X ordinate of EC point.
* pY Y ordinate of EC point.
@ -42796,7 +42796,7 @@ int sp_ecc_verify_521_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* point EC point.
* heap Heap to use if dynamically allocating.
@ -42852,7 +42852,7 @@ static int sp_521_ecc_is_point_21(const sp_point_521* point,
return err;
}
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* pX X ordinate of EC point.
* pY Y ordinate of EC point.
@ -54685,7 +54685,7 @@ static void sp_1024_from_bin(sp_digit* r, int size, const byte* a, int n)
}
}
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* point EC point.
* heap Heap to use if dynamically allocating.
@ -54745,7 +54745,7 @@ static int sp_1024_ecc_is_point_42(const sp_point_1024* point,
return err;
}
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* pX X ordinate of EC point.
* pY Y ordinate of EC point.

View File

@ -27435,7 +27435,7 @@ int sp_ecc_verify_256_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* point EC point.
* heap Heap to use if dynamically allocating.
@ -27491,7 +27491,7 @@ static int sp_256_ecc_is_point_5(const sp_point_256* point,
return err;
}
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* pX X ordinate of EC point.
* pY Y ordinate of EC point.
@ -34903,7 +34903,7 @@ int sp_ecc_verify_384_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* point EC point.
* heap Heap to use if dynamically allocating.
@ -34959,7 +34959,7 @@ static int sp_384_ecc_is_point_7(const sp_point_384* point,
return err;
}
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* pX X ordinate of EC point.
* pY Y ordinate of EC point.
@ -42387,7 +42387,7 @@ int sp_ecc_verify_521_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* point EC point.
* heap Heap to use if dynamically allocating.
@ -42443,7 +42443,7 @@ static int sp_521_ecc_is_point_9(const sp_point_521* point,
return err;
}
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* pX X ordinate of EC point.
* pY Y ordinate of EC point.
@ -53269,7 +53269,7 @@ static void sp_1024_from_bin(sp_digit* r, int size, const byte* a, int n)
}
}
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* point EC point.
* heap Heap to use if dynamically allocating.
@ -53329,7 +53329,7 @@ static int sp_1024_ecc_is_point_18(const sp_point_1024* point,
return err;
}
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* pX X ordinate of EC point.
* pY Y ordinate of EC point.

View File

@ -40873,7 +40873,7 @@ int sp_ecc_verify_256_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* point EC point.
* heap Heap to use if dynamically allocating.
@ -40929,7 +40929,7 @@ static int sp_256_ecc_is_point_8(const sp_point_256* point,
return err;
}
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* pX X ordinate of EC point.
* pY Y ordinate of EC point.
@ -50738,7 +50738,7 @@ int sp_ecc_verify_384_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* point EC point.
* heap Heap to use if dynamically allocating.
@ -50794,7 +50794,7 @@ static int sp_384_ecc_is_point_12(const sp_point_384* point,
return err;
}
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* pX X ordinate of EC point.
* pY Y ordinate of EC point.
@ -64067,7 +64067,7 @@ int sp_ecc_verify_521_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* point EC point.
* heap Heap to use if dynamically allocating.
@ -64123,7 +64123,7 @@ static int sp_521_ecc_is_point_17(const sp_point_521* point,
return err;
}
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* pX X ordinate of EC point.
* pY Y ordinate of EC point.
@ -80497,7 +80497,7 @@ static void sp_1024_from_bin(sp_digit* r, int size, const byte* a, int n)
}
}
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* point EC point.
* heap Heap to use if dynamically allocating.
@ -80557,7 +80557,7 @@ static int sp_1024_ecc_is_point_32(const sp_point_1024* point,
return err;
}
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* pX X ordinate of EC point.
* pY Y ordinate of EC point.

View File

@ -6346,7 +6346,7 @@ static WC_INLINE sp_int_digit sp_div_word(sp_int_digit hi, sp_int_digit lo,
if (r > SP_HALF_MAX) {
r = SP_HALF_MAX;
}
/* Shift up result for trial division calucation. */
/* Shift up result for trial division calculation. */
r <<= SP_HALF_SIZE;
/* Calculate trial value. */
trial = r * (sp_int_word)d;
@ -12416,7 +12416,7 @@ static int _sp_invmod_mont_ct(const sp_int* a, const sp_int* m, sp_int* r,
int bit = sp_is_bit_set(e, (unsigned int)i);
/* 6.2. j += bit
* Update count of consequitive 1 bits.
* Update count of consecutive 1 bits.
*/
j += bit;
/* 6.3. s += 1
@ -13107,7 +13107,7 @@ static int _sp_exptmod_mont_ex(const sp_int* b, const sp_int* e, int bits,
DECL_SP_INT_ARRAY(t, m->used * 2 + 1, (1 << 6) + 1);
/* Window bits based on number of pre-calculations versus number of loop
* calculcations.
* calculations.
* Exponents for RSA and DH will result in 6-bit windows.
*/
if (bits > 450) {

View File

@ -26392,7 +26392,7 @@ int sp_ecc_verify_256_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* point EC point.
* heap Heap to use if dynamically allocating.
@ -26448,7 +26448,7 @@ static int sp_256_ecc_is_point_4(const sp_point_256* point,
return err;
}
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* pX X ordinate of EC point.
* pY Y ordinate of EC point.
@ -51339,7 +51339,7 @@ int sp_ecc_verify_384_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* point EC point.
* heap Heap to use if dynamically allocating.
@ -51395,7 +51395,7 @@ static int sp_384_ecc_is_point_6(const sp_point_384* point,
return err;
}
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* pX X ordinate of EC point.
* pY Y ordinate of EC point.
@ -92477,7 +92477,7 @@ int sp_ecc_verify_521_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* point EC point.
* heap Heap to use if dynamically allocating.
@ -92533,7 +92533,7 @@ static int sp_521_ecc_is_point_9(const sp_point_521* point,
return err;
}
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* pX X ordinate of EC point.
* pY Y ordinate of EC point.
@ -105408,7 +105408,7 @@ static void sp_1024_from_bin(sp_digit* r, int size, const byte* a, int n)
}
}
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* point EC point.
* heap Heap to use if dynamically allocating.
@ -105468,7 +105468,7 @@ static int sp_1024_ecc_is_point_16(const sp_point_1024* point,
return err;
}
/* Check that the x and y oridinates are a valid point on the curve.
/* Check that the x and y ordinates are a valid point on the curve.
*
* pX X ordinate of EC point.
* pY Y ordinate of EC point.

View File

@ -2042,7 +2042,7 @@ int wc_MakeRsaKey(RsaKey* key, int size, long e, WC_RNG* rng)
{
IppStatus ret;
int scratchSz;
int i; /* for trys on calling make key */
int i; /* for tries on calling make key */
int ctxSz;
IppsBigNumState* pSrcPublicExp = NULL;
@ -2178,7 +2178,7 @@ int wc_MakeRsaKey(RsaKey* key, int size, long e, WC_RNG* rng)
goto makeKeyEnd;
}
/* call IPP to generate keys, if inseficent entropy error call again */
/* call IPP to generate keys, if insufficient entropy error call again */
ret = ippStsInsufficientEntropy;
while (ret == ippStsInsufficientEntropy) {
ret = ippsRSA_GenerateKeys(pSrcPublicExp, key->n, key->e,

View File

@ -1764,7 +1764,7 @@ enum Misc {
#ifndef ECDHE_SIZE /* allow this to be overridden at compile-time */
ECDHE_SIZE = 32, /* ECDHE server size defaults to 256 bit */
#endif
MAX_EXPORT_ECC_SZ = 256, /* Export ANS X9.62 max future size */
MAX_EXPORT_ECC_SZ = 256, /* Export ANSI X9.62 max future size */
MAX_CURVE_NAME_SZ = 16, /* Maximum size of curve name string */
NEW_SA_MAJOR = 8, /* Most significant byte used with new sig algos */
@ -3576,7 +3576,7 @@ struct WOLFSSL_CTX {
byte sendVerify:2; /* for client side (can not be single bit) */
byte haveRSA:1; /* RSA available */
byte haveECC:1; /* ECC available */
byte haveDH:1; /* server DH parms set by user */
byte haveDH:1; /* server DH params set by user */
byte haveECDSAsig:1; /* server cert signed w/ ECDSA */
byte haveFalconSig:1; /* server cert signed w/ Falcon */
byte haveDilithiumSig:1;/* server cert signed w/ Dilithium */
@ -4630,7 +4630,7 @@ struct Options {
word16 usingCompression:1; /* are we using compression */
word16 haveRSA:1; /* RSA available */
word16 haveECC:1; /* ECC available */
word16 haveDH:1; /* server DH parms set by user */
word16 haveDH:1; /* server DH params set by user */
word16 haveECDSAsig:1; /* server ECDSA signed cert */
word16 haveStaticECC:1; /* static server ECC private key */
word16 haveFalconSig:1; /* server Falcon signed cert */

View File

@ -48,8 +48,8 @@ typedef struct hss_extra_info hss_extra_info;
struct LmsKey {
unsigned levels; /* Number of tree levels. */
param_set_t lm_type[MAX_HSS_LEVELS]; /* Height parm per level. */
param_set_t lm_ots_type[MAX_HSS_LEVELS]; /* Winternitz parm per level. */
param_set_t lm_type[MAX_HSS_LEVELS]; /* Height param per level. */
param_set_t lm_ots_type[MAX_HSS_LEVELS]; /* Winternitz param per level. */
unsigned char pub[HSS_MAX_PUBLIC_KEY_LEN];
#ifndef WOLFSSL_LMS_VERIFY_ONLY
hss_working_key * working_key;

View File

@ -94,8 +94,8 @@ enum wc_LmsParm {
/* enum wc_LmsState is to help track the state of an LMS/HSS Key. */
enum wc_LmsState {
WC_LMS_STATE_FREED, /* Key has been freed from memory. */
WC_LMS_STATE_INITED, /* Key has been inited, ready to set parms.*/
WC_LMS_STATE_PARMSET, /* Parms are set, ready to MakeKey or Reload. */
WC_LMS_STATE_INITED, /* Key has been inited, ready to set params.*/
WC_LMS_STATE_PARMSET, /* Params are set, ready to MakeKey or Reload. */
WC_LMS_STATE_OK, /* Able to sign signatures and verify. */
WC_LMS_STATE_VERIFYONLY, /* A public only LmsKey. */
WC_LMS_STATE_BAD, /* Can't guarantee key's state. */

View File

@ -104,8 +104,8 @@ enum wc_XmssRc {
/* enum wc_XmssState is to help track the state of an XMSS Key. */
enum wc_XmssState {
WC_XMSS_STATE_FREED, /* Key has been freed from memory. */
WC_XMSS_STATE_INITED, /* Key has been inited, ready to set parms.*/
WC_XMSS_STATE_PARMSET, /* Parms are set, ready to MakeKey or Reload. */
WC_XMSS_STATE_INITED, /* Key has been inited, ready to set params.*/
WC_XMSS_STATE_PARMSET, /* Params are set, ready to MakeKey or Reload. */
WC_XMSS_STATE_OK, /* Able to sign signatures and verify. */
WC_XMSS_STATE_VERIFYONLY, /* A public only XmssKey. */
WC_XMSS_STATE_BAD, /* Can't guarantee key's state. */