Fix spelling warnings

This commit is contained in:
Eric Blankenhorn
2023-11-22 12:34:56 -06:00
parent dda72dc19c
commit 7223b5a708
34 changed files with 114 additions and 114 deletions

View File

@ -23,7 +23,7 @@ NOTE: * --enable-heapmath is being deprecated and will be removed by 2024
* Added LMS/HSS and XMSS/XMSS^MT wolfcrypt hooks, both normal and verify-only options. * Added LMS/HSS and XMSS/XMSS^MT wolfcrypt hooks, both normal and verify-only options.
* Added support for the AES EAX mode of operation * Added support for the AES EAX mode of operation
* Port for use with Hitch (https://github.com/varnish/hitch) added * Port for use with Hitch (https://github.com/varnish/hitch) added
* Add XTS API's to handle multiple sectors in new port ot VeraCrypt * Add XTS API's to handle multiple sectors in new port to VeraCrypt
## Enhancements and Optimizations ## Enhancements and Optimizations

View File

@ -27,7 +27,7 @@
/* wolfCrypt_Init/wolfCrypt_Cleanup to turn CryptoCell hardware on/off */ /* wolfCrypt_Init/wolfCrypt_Cleanup to turn CryptoCell hardware on/off */
#include <wolfssl/wolfcrypt/wc_port.h> #include <wolfssl/wolfcrypt/wc_port.h>
/* SEGGER_RTT_Init, you can potential replace it with other serial terminal */ /* SEGGER_RTT_Init, you can potentially replace it with other serial terminal */
#include "SEGGER_RTT.h" #include "SEGGER_RTT.h"
int main(void) int main(void)

View File

@ -206,7 +206,7 @@ else()
"\"${WOLFSSL_ROOT}/wolfcrypt/src\"" "\"${WOLFSSL_ROOT}/wolfcrypt/src\""
"\"${WOLFSSL_ROOT}/wolfcrypt/src/port/Espressif\"" "\"${WOLFSSL_ROOT}/wolfcrypt/src/port/Espressif\""
"\"${WOLFSSL_ROOT}/wolfcrypt/src/port/atmel\"" "\"${WOLFSSL_ROOT}/wolfcrypt/src/port/atmel\""
# TODO: Make this a univeral makefile that detects if bechmark / test needed # TODO: Make this a universal makefile that detects if benchmark / test needed
# Sometimes problematic with SM; consider gating detection. # Sometimes problematic with SM; consider gating detection.
#"\"${WOLFSSL_ROOT}/wolfcrypt/benchmark\"" # the benchmark application #"\"${WOLFSSL_ROOT}/wolfcrypt/benchmark\"" # the benchmark application
#"\"${WOLFSSL_ROOT}/wolfcrypt/test\"" # the test application #"\"${WOLFSSL_ROOT}/wolfcrypt/test\"" # the test application

View File

@ -206,7 +206,7 @@ else()
"\"${WOLFSSL_ROOT}/wolfcrypt/src\"" "\"${WOLFSSL_ROOT}/wolfcrypt/src\""
"\"${WOLFSSL_ROOT}/wolfcrypt/src/port/Espressif\"" "\"${WOLFSSL_ROOT}/wolfcrypt/src/port/Espressif\""
"\"${WOLFSSL_ROOT}/wolfcrypt/src/port/atmel\"" "\"${WOLFSSL_ROOT}/wolfcrypt/src/port/atmel\""
# TODO: Make this a univeral makefile that detects if bechmark / test needed # TODO: Make this a universal makefile that detects if benchmark / test needed
# Sometimes problematic with SM; consider gating detection. # Sometimes problematic with SM; consider gating detection.
#"\"${WOLFSSL_ROOT}/wolfcrypt/benchmark\"" # the benchmark application #"\"${WOLFSSL_ROOT}/wolfcrypt/benchmark\"" # the benchmark application
#"\"${WOLFSSL_ROOT}/wolfcrypt/test\"" # the test application #"\"${WOLFSSL_ROOT}/wolfcrypt/test\"" # the test application

View File

@ -241,6 +241,6 @@ void app_main(void)
#else #else
vTaskDelay(60000); vTaskDelay(60000);
#endif #endif
} /* done whle */ } /* done while */
#endif #endif
} }

View File

@ -12,7 +12,7 @@ Setup process:
- Unzip wolfssl under the same directory - Unzip wolfssl under the same directory
2. Set up wolfSSL 2. Set up wolfSSL
- open wolfssl\IDE\Renesas\cs+\Projec/wolfssl\lib.mtpj with CS+ and build - open wolfssl\IDE\Renesas\cs+\Projects\wolfssl\lib.mtpj with CS+ and build
- open t4_demo.mtpj and build. This create demo program library. - open t4_demo.mtpj and build. This create demo program library.
3. Set up AlphaProject 3. Set up AlphaProject

View File

@ -152,7 +152,7 @@ $./examples/server/server -b -d -i -v 4
+ For ECDSA sign and verify use, + For ECDSA sign and verify use,
Enable the `USE_CERT_BUFFER_256` macro in `wolfssl_demo.h` Enable the `USE_CERT_BUFFER_256` macro in `wolfssl_demo.h`
Disble the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h` Disable the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h`
+ launch server with the following option. + launch server with the following option.
``` ```
@ -214,7 +214,7 @@ $./examples/server/server -b -d -i -v 3
+ For ECDSA sign and verify use, + For ECDSA sign and verify use,
Enable the `USE_CERT_BUFFER_256` macro in `wolfssl_demo.h` Enable the `USE_CERT_BUFFER_256` macro in `wolfssl_demo.h`
Disble the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h` Disable the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h`
+ launch server with the following option. + launch server with the following option.
``` ```
@ -281,7 +281,7 @@ static const byte ucIPAddress[4] = { 192, 168, 11, 241 };
+ For ECDSA sign and verify use, + For ECDSA sign and verify use,
Enable the `USE_CERT_BUFFER_256` macro in `wolfssl_demo.h` Enable the `USE_CERT_BUFFER_256` macro in `wolfssl_demo.h`
Disble the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h` Disable the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h`
+ launch server from e2studio + launch server from e2studio
@ -311,7 +311,7 @@ Cleaning up socket and wolfSSL objects.
Waiting connection.... Waiting connection....
``` ```
You will see the follwoing message on Linux terminal. You will see the following message on Linux terminal.
``` ```
$ ./examples/client/client -h 192.168.11.241 -p 11111 -v 4 $ ./examples/client/client -h 192.168.11.241 -p 11111 -v 4
SSL version is TLSv1.3 SSL version is TLSv1.3
@ -333,7 +333,7 @@ Received: hello wolfssl!
Cleaning up socket and wolfSSL objects. Cleaning up socket and wolfSSL objects.
Waiting connection.... Waiting connection....
``` ```
You will see the follwoing message on Linux terminal. You will see the following message on Linux terminal.
``` ```
$ ./examples/client/client -h 192.168.11.241 -p 11111 -v 4 -A ./certs/ca-ecc-cert.pem -c ./certs/client-ecc-cert.pem -k ./cert $ ./examples/client/client -h 192.168.11.241 -p 11111 -v 4 -A ./certs/ca-ecc-cert.pem -c ./certs/client-ecc-cert.pem -k ./cert
s/ecc-client-key.pem s/ecc-client-key.pem
@ -359,7 +359,7 @@ static const byte ucIPAddress[4] = { 192, 168, 11, 241 };
+ For ECDSA sign and verify use, + For ECDSA sign and verify use,
Enable the `USE_CERT_BUFFER_256` macro in `wolfssl_demo.h` Enable the `USE_CERT_BUFFER_256` macro in `wolfssl_demo.h`
Disble the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h` Disable the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h`
+ launch server from e2studio + launch server from e2studio
@ -389,7 +389,7 @@ Cleaning up socket and wolfSSL objects.
Waiting connection.... Waiting connection....
``` ```
You will see the follwoing message on Linux terminal. You will see the following message on Linux terminal.
``` ```
$ ./examples/client/client -h 192.168.11.241 -p 11111 -v 3 $ ./examples/client/client -h 192.168.11.241 -p 11111 -v 3
SSL version is TLSv1.2 SSL version is TLSv1.2
@ -411,7 +411,7 @@ Received: hello wolfssl!
Cleaning up socket and wolfSSL objects. Cleaning up socket and wolfSSL objects.
Waiting connection.... Waiting connection....
``` ```
You will see the follwoing message on Linux terminal. You will see the following message on Linux terminal.
``` ```
$ ./examples/client/client -h 192.168.11.241 -p 11111 -v 3 -A ./certs/ca-ecc-cert.pem -c ./certs/client-ecc-cert.pem -k ./certs/ecc-client-key.pem $ ./examples/client/client -h 192.168.11.241 -p 11111 -v 3 -A ./certs/ca-ecc-cert.pem -c ./certs/client-ecc-cert.pem -k ./certs/ecc-client-key.pem
SSL version is TLSv1.2 SSL version is TLSv1.2

View File

@ -131,7 +131,7 @@ void RSIP_KeyGeneration(FSPSM_ST *g)
} }
/* only pointer sets to NULL */ /* only pointer sets to NULL */
/* onwer of keys should be freed */ /* owner of keys should be freed */
void Clr_CallbackCtx(FSPSM_ST *g) void Clr_CallbackCtx(FSPSM_ST *g)
{ {
(void) g; (void) g;

2
README
View File

@ -95,7 +95,7 @@ NOTE: * --enable-heapmath is being deprecated and will be removed by 2024
* Added LMS/HSS and XMSS/XMSS^MT wolfcrypt hooks, both normal and verify-only options. * Added LMS/HSS and XMSS/XMSS^MT wolfcrypt hooks, both normal and verify-only options.
* Added support for the AES EAX mode of operation * Added support for the AES EAX mode of operation
* Port for use with Hitch (https://github.com/varnish/hitch) added * Port for use with Hitch (https://github.com/varnish/hitch) added
* Add XTS API's to handle multiple sectors in new port ot VeraCrypt * Add XTS API's to handle multiple sectors in new port to VeraCrypt
## Enhancements and Optimizations ## Enhancements and Optimizations

View File

@ -100,7 +100,7 @@ NOTE: * --enable-heapmath is being deprecated and will be removed by 2024
* Added LMS/HSS and XMSS/XMSS^MT wolfcrypt hooks, both normal and verify-only options. * Added LMS/HSS and XMSS/XMSS^MT wolfcrypt hooks, both normal and verify-only options.
* Added support for the AES EAX mode of operation * Added support for the AES EAX mode of operation
* Port for use with Hitch (https://github.com/varnish/hitch) added * Port for use with Hitch (https://github.com/varnish/hitch) added
* Add XTS API's to handle multiple sectors in new port ot VeraCrypt * Add XTS API's to handle multiple sectors in new port to VeraCrypt
## Enhancements and Optimizations ## Enhancements and Optimizations

View File

@ -1533,7 +1533,7 @@ WOLFSSL_API int wc_AesEaxEncryptFinal(AesEax* eax,
\ref wc_AesEaxInit. When done using the \c AesEax context structure, make \ref wc_AesEaxInit. When done using the \c AesEax context structure, make
sure to free it using \ref wc_AesEaxFree. sure to free it using \ref wc_AesEaxFree.
\return 0 if data is authenticated succesfully \return 0 if data is authenticated successfully
\return AES_EAX_AUTH_E if the authentication tag does not match the \return AES_EAX_AUTH_E if the authentication tag does not match the
supplied authentication code vector \c authIn supplied authentication code vector \c authIn
\return other error code on failure \return other error code on failure

View File

@ -27,7 +27,7 @@
THREAD_RETURN WOLFSSL_THREAD server_test(void* args); THREAD_RETURN WOLFSSL_THREAD server_test(void* args);
/* Echo bytes using buffer of blockSize until [echoData] bytes are complete. */ /* Echo bytes using buffer of blockSize until [echoData] bytes are complete. */
/* If [bechmarkThroughput] set the statistcs will be output at the end */ /* If [benchmarkThroughput] set the statistics will be output at the end */
int ServerEchoData(WOLFSSL* ssl, int clientfd, int echoData, int blockSize, int ServerEchoData(WOLFSSL* ssl, int clientfd, int echoData, int blockSize,
size_t benchmarkThroughput); size_t benchmarkThroughput);

View File

@ -20394,7 +20394,7 @@ int ProcessReplyEx(WOLFSSL* ssl, int allowSocketErr)
case getRecordLayerHeader: case getRecordLayerHeader:
/* DTLSv1.3 record numbers in the header are encrypted, and AAD /* DTLSv1.3 record numbers in the header are encrypted, and AAD
* uses the unecrypted form. Because of this we need to modify the * uses the unencrypted form. Because of this we need to modify the
* header, decrypting the numbers inside * header, decrypting the numbers inside
* DtlsParseUnifiedRecordLayer(). This violates the const attribute * DtlsParseUnifiedRecordLayer(). This violates the const attribute
* of the buffer parameter of GetRecordHeader() used here. */ * of the buffer parameter of GetRecordHeader() used here. */

View File

@ -8432,7 +8432,7 @@ static int LoadSystemCaCertsWindows(WOLFSSL_CTX* ctx, byte* loaded)
* directly into wolfSSL "the old way". * directly into wolfSSL "the old way".
* *
* As of MacOS 14.0 we are still able to use this method to access system * As of MacOS 14.0 we are still able to use this method to access system
* certificates. Accessiblity of this API is indicated by the presence of the * certificates. Accessibility of this API is indicated by the presence of the
* Security/SecTrustSettings.h header. In the likely event that Apple removes * Security/SecTrustSettings.h header. In the likely event that Apple removes
* access to this API on Macs, this function should be removed and the * access to this API on Macs, this function should be removed and the
* DoAppleNativeCertValidation() routine should be used for all devices. * DoAppleNativeCertValidation() routine should be used for all devices.
@ -8579,7 +8579,7 @@ int wolfSSL_CTX_load_system_CA_certs(WOLFSSL_CTX* ctx)
#if defined(HAVE_SECURITY_SECTRUSTSETTINGS_H) \ #if defined(HAVE_SECURITY_SECTRUSTSETTINGS_H) \
&& !defined(WOLFSSL_APPLE_NATIVE_CERT_VALIDATION) && !defined(WOLFSSL_APPLE_NATIVE_CERT_VALIDATION)
/* As of MacOS 14.0 we are still able to access system certificates and /* As of MacOS 14.0 we are still able to access system certificates and
* load them manually into wolfSSL "the old way". Accessiblity of this API * load them manually into wolfSSL "the old way". Accessibility of this API
* is indicated by the presence of the Security/SecTrustSettings.h header */ * is indicated by the presence of the Security/SecTrustSettings.h header */
ret = LoadSystemCaCertsMac(ctx, &loaded); ret = LoadSystemCaCertsMac(ctx, &loaded);
#elif defined(WOLFSSL_APPLE_NATIVE_CERT_VALIDATION) #elif defined(WOLFSSL_APPLE_NATIVE_CERT_VALIDATION)

View File

@ -1616,8 +1616,8 @@ WOLFSSL_HMAC_CTX* wolfSSL_HMAC_CTX_new(void)
* *
* Not an OpenSSL compatibility API. * Not an OpenSSL compatibility API.
* *
* @param [in, out] ctx HMAC contect object. * @param [in, out] ctx HMAC context object.
* @return 1 inficating success. * @return 1 indicating success.
*/ */
int wolfSSL_HMAC_CTX_Init(WOLFSSL_HMAC_CTX* ctx) int wolfSSL_HMAC_CTX_Init(WOLFSSL_HMAC_CTX* ctx)
{ {

View File

@ -35690,7 +35690,7 @@ static int test_X509_STORE_untrusted(void)
NULL NULL
}; };
/* Only immediate issuer in untrusted chaing. Fails since can't build chain /* Only immediate issuer in untrusted chain. Fails since can't build chain
* to loaded CA. */ * to loaded CA. */
ExpectIntEQ(test_X509_STORE_untrusted_certs(untrusted1, 0, ExpectIntEQ(test_X509_STORE_untrusted_certs(untrusted1, 0,
X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY, 1), TEST_SUCCESS); X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY, 1), TEST_SUCCESS);

View File

@ -231,7 +231,7 @@ const char * wc_LmsKey_RcToStr(enum wc_LmsRc lmsEc)
/* Init an LMS key. /* Init an LMS key.
* *
* Call this before setting the parms of an LMS key. * Call this before setting the params of an LMS key.
* *
* Returns 0 on success. * Returns 0 on success.
* */ * */
@ -404,7 +404,7 @@ int wc_LmsKey_SetParameters(LmsKey * key, int levels, int height,
key->lm_ots_type[i] = ots; key->lm_ots_type[i] = ots;
} }
/* Move the state to parms set. /* Move the state to params set.
* Key is ready for MakeKey or Reload. */ * Key is ready for MakeKey or Reload. */
key->state = WC_LMS_STATE_PARMSET; key->state = WC_LMS_STATE_PARMSET;
@ -656,7 +656,7 @@ int wc_LmsKey_MakeKey(LmsKey* key, WC_RNG * rng)
return 0; return 0;
} }
/* Reload a key that has been prepared with the appropriate parms and /* Reload a key that has been prepared with the appropriate params and
* data. Use this if you wish to resume signing with an existing key. * data. Use this if you wish to resume signing with an existing key.
* *
* Write/read callbacks, and context data, must be set prior. * Write/read callbacks, and context data, must be set prior.

View File

@ -97,7 +97,7 @@ static int sha256_cb(const unsigned char *in, unsigned long long inlen,
/* Init an XMSS key. /* Init an XMSS key.
* *
* Call this before setting the parms of an XMSS key. * Call this before setting the params of an XMSS key.
* *
* key [in] The XMSS key to init. * key [in] The XMSS key to init.
* heap [in] Unused. * heap [in] Unused.
@ -201,7 +201,7 @@ static int wc_XmssKey_SetOid(XmssKey * key, uint32_t oid, int is_xmssmt)
/* Set the XMSS key parameter string. /* Set the XMSS key parameter string.
* *
* The input string must be one of the supported parm set names in * The input string must be one of the supported param set names in
* the "Name" section from the table in wolfssl/wolfcrypt/xmss.h, * the "Name" section from the table in wolfssl/wolfcrypt/xmss.h,
* e.g. "XMSS-SHA2_10_256" or "XMSSMT-SHA2_20/4_256". * e.g. "XMSS-SHA2_10_256" or "XMSSMT-SHA2_20/4_256".
* *

View File

@ -818,7 +818,7 @@ int esp_mp_montgomery_init(MATH_INT_T* X, MATH_INT_T* Y, MATH_INT_T* M,
return MP_HW_FALLBACK; return MP_HW_FALLBACK;
} }
if ((X == NULL) || (Y == NULL) || (M == NULL) ) { if ((X == NULL) || (Y == NULL) || (M == NULL) ) {
/* if a bad oprand passed, we cannot use HW */ /* if a bad operand passed, we cannot use HW */
ESP_LOGE(TAG, "ERROR: Bad montgomery operand, falling back to SW"); ESP_LOGE(TAG, "ERROR: Bad montgomery operand, falling back to SW");
return MP_HW_FALLBACK; return MP_HW_FALLBACK;
} }
@ -1437,10 +1437,10 @@ int esp_mp_mulmod(MATH_INT_T* X, MATH_INT_T* Y, MATH_INT_T* M, MATH_INT_T* Z)
SET_HW_VALIDATION; SET_HW_VALIDATION;
reti = mp_mulmod(X2, Y2, M2, Z2); reti = mp_mulmod(X2, Y2, M2, Z2);
if (reti == 0) { if (reti == 0) {
ESP_LOGV(TAG, "wolfSSL mp_mulmod during vaidation success"); ESP_LOGV(TAG, "wolfSSL mp_mulmod during validation success");
} }
else { else {
ESP_LOGE(TAG, "wolfSSL mp_mulmod during vaidation failed"); ESP_LOGE(TAG, "wolfSSL mp_mulmod during validation failed");
} }
CLR_HW_VALIDATION; CLR_HW_VALIDATION;
} }

View File

@ -1882,7 +1882,7 @@ static int Aes128GcmEncrypt(Aes* aes, byte* out, const byte* in, word32 sz,
byte counter[AES_BLOCK_SIZE]; byte counter[AES_BLOCK_SIZE];
byte scratch[AES_BLOCK_SIZE]; byte scratch[AES_BLOCK_SIZE];
/* Noticed different optimization levels treated head of array different. /* Noticed different optimization levels treated head of array different.
* Some cases was stack pointer plus offset others was a regester containing * Some cases was stack pointer plus offset others was a register containing
* address. To make uniform for passing in to inline assembly code am using * address. To make uniform for passing in to inline assembly code am using
* pointers to the head of each local array. * pointers to the head of each local array.
*/ */
@ -3528,7 +3528,7 @@ static int Aes192GcmEncrypt(Aes* aes, byte* out, const byte* in, word32 sz,
byte counter[AES_BLOCK_SIZE]; byte counter[AES_BLOCK_SIZE];
byte scratch[AES_BLOCK_SIZE]; byte scratch[AES_BLOCK_SIZE];
/* Noticed different optimization levels treated head of array different. /* Noticed different optimization levels treated head of array different.
* Some cases was stack pointer plus offset others was a regester containing * Some cases was stack pointer plus offset others was a register containing
* address. To make uniform for passing in to inline assembly code am using * address. To make uniform for passing in to inline assembly code am using
* pointers to the head of each local array. * pointers to the head of each local array.
*/ */
@ -5291,7 +5291,7 @@ static int Aes256GcmEncrypt(Aes* aes, byte* out, const byte* in, word32 sz,
byte counter[AES_BLOCK_SIZE]; byte counter[AES_BLOCK_SIZE];
byte scratch[AES_BLOCK_SIZE]; byte scratch[AES_BLOCK_SIZE];
/* Noticed different optimization levels treated head of array different. /* Noticed different optimization levels treated head of array different.
* Some cases was stack pointer plus offset others was a regester containing * Some cases was stack pointer plus offset others was a register containing
* address. To make uniform for passing in to inline assembly code am using * address. To make uniform for passing in to inline assembly code am using
* pointers to the head of each local array. * pointers to the head of each local array.
*/ */

View File

@ -1228,7 +1228,7 @@ word32 wc_SECO_WrapKey(word32 keyId, byte* in, word32 inSz, byte* iv,
} }
/* trasnlates the HSM error to wolfSSL error and does debug print out */ /* Translates the HSM error to wolfSSL error and does debug print out */
int wc_TranslateHSMError(int current, hsm_err_t err) int wc_TranslateHSMError(int current, hsm_err_t err)
{ {
int ret = -1; int ret = -1;

View File

@ -79129,7 +79129,7 @@ int sp_ecc_verify_256_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */ #endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY #ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* point EC point. * point EC point.
* heap Heap to use if dynamically allocating. * heap Heap to use if dynamically allocating.
@ -79185,7 +79185,7 @@ static int sp_256_ecc_is_point_8(const sp_point_256* point,
return err; return err;
} }
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* pX X ordinate of EC point. * pX X ordinate of EC point.
* pY Y ordinate of EC point. * pY Y ordinate of EC point.
@ -97205,7 +97205,7 @@ int sp_ecc_verify_384_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */ #endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY #ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* point EC point. * point EC point.
* heap Heap to use if dynamically allocating. * heap Heap to use if dynamically allocating.
@ -97261,7 +97261,7 @@ static int sp_384_ecc_is_point_12(const sp_point_384* point,
return err; return err;
} }
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* pX X ordinate of EC point. * pX X ordinate of EC point.
* pY Y ordinate of EC point. * pY Y ordinate of EC point.
@ -126155,7 +126155,7 @@ int sp_ecc_verify_521_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */ #endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY #ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* point EC point. * point EC point.
* heap Heap to use if dynamically allocating. * heap Heap to use if dynamically allocating.
@ -126211,7 +126211,7 @@ static int sp_521_ecc_is_point_17(const sp_point_521* point,
return err; return err;
} }
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* pX X ordinate of EC point. * pX X ordinate of EC point.
* pY Y ordinate of EC point. * pY Y ordinate of EC point.
@ -156590,7 +156590,7 @@ static void sp_1024_from_bin(sp_digit* r, int size, const byte* a, int n)
} }
} }
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* point EC point. * point EC point.
* heap Heap to use if dynamically allocating. * heap Heap to use if dynamically allocating.
@ -156650,7 +156650,7 @@ static int sp_1024_ecc_is_point_32(const sp_point_1024* point,
return err; return err;
} }
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* pX X ordinate of EC point. * pX X ordinate of EC point.
* pY Y ordinate of EC point. * pY Y ordinate of EC point.

View File

@ -99,7 +99,7 @@ static void sp_2048_from_bin(sp_digit* r, int size, const byte* a, int n)
"subs x6, %[n], 8\n\t" "subs x6, %[n], 8\n\t"
"mov x7, xzr\n\t" "mov x7, xzr\n\t"
"blt 2f\n\t" "blt 2f\n\t"
/* Put in mulitples of 8 bytes. */ /* Put in multiples of 8 bytes. */
"1:\n\t" "1:\n\t"
"ldr x8, [x4], -8\n\t" "ldr x8, [x4], -8\n\t"
"subs x6, x6, 8\n\t" "subs x6, x6, 8\n\t"
@ -6992,7 +6992,7 @@ static void sp_3072_from_bin(sp_digit* r, int size, const byte* a, int n)
"subs x6, %[n], 8\n\t" "subs x6, %[n], 8\n\t"
"mov x7, xzr\n\t" "mov x7, xzr\n\t"
"blt 2f\n\t" "blt 2f\n\t"
/* Put in mulitples of 8 bytes. */ /* Put in multiples of 8 bytes. */
"1:\n\t" "1:\n\t"
"ldr x8, [x4], -8\n\t" "ldr x8, [x4], -8\n\t"
"subs x6, x6, 8\n\t" "subs x6, x6, 8\n\t"
@ -16595,7 +16595,7 @@ static void sp_4096_from_bin(sp_digit* r, int size, const byte* a, int n)
"subs x6, %[n], 8\n\t" "subs x6, %[n], 8\n\t"
"mov x7, xzr\n\t" "mov x7, xzr\n\t"
"blt 2f\n\t" "blt 2f\n\t"
/* Put in mulitples of 8 bytes. */ /* Put in multiples of 8 bytes. */
"1:\n\t" "1:\n\t"
"ldr x8, [x4], -8\n\t" "ldr x8, [x4], -8\n\t"
"subs x6, x6, 8\n\t" "subs x6, x6, 8\n\t"
@ -39685,7 +39685,7 @@ static void sp_256_from_bin(sp_digit* r, int size, const byte* a, int n)
"subs x6, %[n], 8\n\t" "subs x6, %[n], 8\n\t"
"mov x7, xzr\n\t" "mov x7, xzr\n\t"
"blt 2f\n\t" "blt 2f\n\t"
/* Put in mulitples of 8 bytes. */ /* Put in multiples of 8 bytes. */
"1:\n\t" "1:\n\t"
"ldr x8, [x4], -8\n\t" "ldr x8, [x4], -8\n\t"
"subs x6, x6, 8\n\t" "subs x6, x6, 8\n\t"
@ -42127,7 +42127,7 @@ SP_NOINLINE static void sp_256_mont_add_4(sp_digit* r, const sp_digit* a,
(void)m; (void)m;
} }
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* point EC point. * point EC point.
* heap Heap to use if dynamically allocating. * heap Heap to use if dynamically allocating.
@ -42183,7 +42183,7 @@ static int sp_256_ecc_is_point_4(const sp_point_256* point,
return err; return err;
} }
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* pX X ordinate of EC point. * pX X ordinate of EC point.
* pY Y ordinate of EC point. * pY Y ordinate of EC point.
@ -66452,7 +66452,7 @@ static void sp_384_from_bin(sp_digit* r, int size, const byte* a, int n)
"subs x6, %[n], 8\n\t" "subs x6, %[n], 8\n\t"
"mov x7, xzr\n\t" "mov x7, xzr\n\t"
"blt 2f\n\t" "blt 2f\n\t"
/* Put in mulitples of 8 bytes. */ /* Put in multiples of 8 bytes. */
"1:\n\t" "1:\n\t"
"ldr x8, [x4], -8\n\t" "ldr x8, [x4], -8\n\t"
"subs x6, x6, 8\n\t" "subs x6, x6, 8\n\t"
@ -68207,7 +68207,7 @@ int sp_ecc_verify_384_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */ #endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY #ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* point EC point. * point EC point.
* heap Heap to use if dynamically allocating. * heap Heap to use if dynamically allocating.
@ -68263,7 +68263,7 @@ static int sp_384_ecc_is_point_6(const sp_point_384* point,
return err; return err;
} }
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* pX X ordinate of EC point. * pX X ordinate of EC point.
* pY Y ordinate of EC point. * pY Y ordinate of EC point.
@ -111616,7 +111616,7 @@ static void sp_521_from_bin(sp_digit* r, int size, const byte* a, int n)
"subs x6, %[n], 8\n\t" "subs x6, %[n], 8\n\t"
"mov x7, xzr\n\t" "mov x7, xzr\n\t"
"blt 2f\n\t" "blt 2f\n\t"
/* Put in mulitples of 8 bytes. */ /* Put in multiples of 8 bytes. */
"1:\n\t" "1:\n\t"
"ldr x8, [x4], -8\n\t" "ldr x8, [x4], -8\n\t"
"subs x6, x6, 8\n\t" "subs x6, x6, 8\n\t"
@ -113151,7 +113151,7 @@ int sp_ecc_verify_521_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */ #endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY #ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* point EC point. * point EC point.
* heap Heap to use if dynamically allocating. * heap Heap to use if dynamically allocating.
@ -113207,7 +113207,7 @@ static int sp_521_ecc_is_point_9(const sp_point_521* point,
return err; return err;
} }
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* pX X ordinate of EC point. * pX X ordinate of EC point.
* pY Y ordinate of EC point. * pY Y ordinate of EC point.
@ -125240,7 +125240,7 @@ static void sp_1024_from_bin(sp_digit* r, int size, const byte* a, int n)
"subs x6, %[n], 8\n\t" "subs x6, %[n], 8\n\t"
"mov x7, xzr\n\t" "mov x7, xzr\n\t"
"blt 2f\n\t" "blt 2f\n\t"
/* Put in mulitples of 8 bytes. */ /* Put in multiples of 8 bytes. */
"1:\n\t" "1:\n\t"
"ldr x8, [x4], -8\n\t" "ldr x8, [x4], -8\n\t"
"subs x6, x6, 8\n\t" "subs x6, x6, 8\n\t"
@ -125334,7 +125334,7 @@ static void sp_1024_from_bin(sp_digit* r, int size, const byte* a, int n)
); );
} }
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* point EC point. * point EC point.
* heap Heap to use if dynamically allocating. * heap Heap to use if dynamically allocating.
@ -125394,7 +125394,7 @@ static int sp_1024_ecc_is_point_16(const sp_point_1024* point,
return err; return err;
} }
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* pX X ordinate of EC point. * pX X ordinate of EC point.
* pY Y ordinate of EC point. * pY Y ordinate of EC point.

View File

@ -107674,7 +107674,7 @@ int sp_ecc_verify_256_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */ #endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY #ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* point EC point. * point EC point.
* heap Heap to use if dynamically allocating. * heap Heap to use if dynamically allocating.
@ -107730,7 +107730,7 @@ static int sp_256_ecc_is_point_8(const sp_point_256* point,
return err; return err;
} }
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* pX X ordinate of EC point. * pX X ordinate of EC point.
* pY Y ordinate of EC point. * pY Y ordinate of EC point.
@ -118870,7 +118870,7 @@ int sp_ecc_verify_384_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */ #endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY #ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* point EC point. * point EC point.
* heap Heap to use if dynamically allocating. * heap Heap to use if dynamically allocating.
@ -118926,7 +118926,7 @@ static int sp_384_ecc_is_point_12(const sp_point_384* point,
return err; return err;
} }
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* pX X ordinate of EC point. * pX X ordinate of EC point.
* pY Y ordinate of EC point. * pY Y ordinate of EC point.
@ -135812,7 +135812,7 @@ int sp_ecc_verify_521_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */ #endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY #ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* point EC point. * point EC point.
* heap Heap to use if dynamically allocating. * heap Heap to use if dynamically allocating.
@ -135868,7 +135868,7 @@ static int sp_521_ecc_is_point_17(const sp_point_521* point,
return err; return err;
} }
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* pX X ordinate of EC point. * pX X ordinate of EC point.
* pY Y ordinate of EC point. * pY Y ordinate of EC point.
@ -218581,7 +218581,7 @@ static void sp_1024_from_bin(sp_digit* r, int size, const byte* a, int n)
} }
} }
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* point EC point. * point EC point.
* heap Heap to use if dynamically allocating. * heap Heap to use if dynamically allocating.
@ -218641,7 +218641,7 @@ static int sp_1024_ecc_is_point_32(const sp_point_1024* point,
return err; return err;
} }
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* pX X ordinate of EC point. * pX X ordinate of EC point.
* pY Y ordinate of EC point. * pY Y ordinate of EC point.

View File

@ -26541,7 +26541,7 @@ int sp_ecc_verify_256_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */ #endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY #ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* point EC point. * point EC point.
* heap Heap to use if dynamically allocating. * heap Heap to use if dynamically allocating.
@ -26597,7 +26597,7 @@ static int sp_256_ecc_is_point_9(const sp_point_256* point,
return err; return err;
} }
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* pX X ordinate of EC point. * pX X ordinate of EC point.
* pY Y ordinate of EC point. * pY Y ordinate of EC point.
@ -34622,7 +34622,7 @@ int sp_ecc_verify_384_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */ #endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY #ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* point EC point. * point EC point.
* heap Heap to use if dynamically allocating. * heap Heap to use if dynamically allocating.
@ -34678,7 +34678,7 @@ static int sp_384_ecc_is_point_15(const sp_point_384* point,
return err; return err;
} }
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* pX X ordinate of EC point. * pX X ordinate of EC point.
* pY Y ordinate of EC point. * pY Y ordinate of EC point.
@ -42796,7 +42796,7 @@ int sp_ecc_verify_521_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */ #endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY #ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* point EC point. * point EC point.
* heap Heap to use if dynamically allocating. * heap Heap to use if dynamically allocating.
@ -42852,7 +42852,7 @@ static int sp_521_ecc_is_point_21(const sp_point_521* point,
return err; return err;
} }
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* pX X ordinate of EC point. * pX X ordinate of EC point.
* pY Y ordinate of EC point. * pY Y ordinate of EC point.
@ -54685,7 +54685,7 @@ static void sp_1024_from_bin(sp_digit* r, int size, const byte* a, int n)
} }
} }
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* point EC point. * point EC point.
* heap Heap to use if dynamically allocating. * heap Heap to use if dynamically allocating.
@ -54745,7 +54745,7 @@ static int sp_1024_ecc_is_point_42(const sp_point_1024* point,
return err; return err;
} }
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* pX X ordinate of EC point. * pX X ordinate of EC point.
* pY Y ordinate of EC point. * pY Y ordinate of EC point.

View File

@ -27435,7 +27435,7 @@ int sp_ecc_verify_256_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */ #endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY #ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* point EC point. * point EC point.
* heap Heap to use if dynamically allocating. * heap Heap to use if dynamically allocating.
@ -27491,7 +27491,7 @@ static int sp_256_ecc_is_point_5(const sp_point_256* point,
return err; return err;
} }
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* pX X ordinate of EC point. * pX X ordinate of EC point.
* pY Y ordinate of EC point. * pY Y ordinate of EC point.
@ -34903,7 +34903,7 @@ int sp_ecc_verify_384_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */ #endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY #ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* point EC point. * point EC point.
* heap Heap to use if dynamically allocating. * heap Heap to use if dynamically allocating.
@ -34959,7 +34959,7 @@ static int sp_384_ecc_is_point_7(const sp_point_384* point,
return err; return err;
} }
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* pX X ordinate of EC point. * pX X ordinate of EC point.
* pY Y ordinate of EC point. * pY Y ordinate of EC point.
@ -42387,7 +42387,7 @@ int sp_ecc_verify_521_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */ #endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY #ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* point EC point. * point EC point.
* heap Heap to use if dynamically allocating. * heap Heap to use if dynamically allocating.
@ -42443,7 +42443,7 @@ static int sp_521_ecc_is_point_9(const sp_point_521* point,
return err; return err;
} }
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* pX X ordinate of EC point. * pX X ordinate of EC point.
* pY Y ordinate of EC point. * pY Y ordinate of EC point.
@ -53269,7 +53269,7 @@ static void sp_1024_from_bin(sp_digit* r, int size, const byte* a, int n)
} }
} }
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* point EC point. * point EC point.
* heap Heap to use if dynamically allocating. * heap Heap to use if dynamically allocating.
@ -53329,7 +53329,7 @@ static int sp_1024_ecc_is_point_18(const sp_point_1024* point,
return err; return err;
} }
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* pX X ordinate of EC point. * pX X ordinate of EC point.
* pY Y ordinate of EC point. * pY Y ordinate of EC point.

View File

@ -40873,7 +40873,7 @@ int sp_ecc_verify_256_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */ #endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY #ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* point EC point. * point EC point.
* heap Heap to use if dynamically allocating. * heap Heap to use if dynamically allocating.
@ -40929,7 +40929,7 @@ static int sp_256_ecc_is_point_8(const sp_point_256* point,
return err; return err;
} }
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* pX X ordinate of EC point. * pX X ordinate of EC point.
* pY Y ordinate of EC point. * pY Y ordinate of EC point.
@ -50738,7 +50738,7 @@ int sp_ecc_verify_384_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */ #endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY #ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* point EC point. * point EC point.
* heap Heap to use if dynamically allocating. * heap Heap to use if dynamically allocating.
@ -50794,7 +50794,7 @@ static int sp_384_ecc_is_point_12(const sp_point_384* point,
return err; return err;
} }
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* pX X ordinate of EC point. * pX X ordinate of EC point.
* pY Y ordinate of EC point. * pY Y ordinate of EC point.
@ -64067,7 +64067,7 @@ int sp_ecc_verify_521_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */ #endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY #ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* point EC point. * point EC point.
* heap Heap to use if dynamically allocating. * heap Heap to use if dynamically allocating.
@ -64123,7 +64123,7 @@ static int sp_521_ecc_is_point_17(const sp_point_521* point,
return err; return err;
} }
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* pX X ordinate of EC point. * pX X ordinate of EC point.
* pY Y ordinate of EC point. * pY Y ordinate of EC point.
@ -80497,7 +80497,7 @@ static void sp_1024_from_bin(sp_digit* r, int size, const byte* a, int n)
} }
} }
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* point EC point. * point EC point.
* heap Heap to use if dynamically allocating. * heap Heap to use if dynamically allocating.
@ -80557,7 +80557,7 @@ static int sp_1024_ecc_is_point_32(const sp_point_1024* point,
return err; return err;
} }
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* pX X ordinate of EC point. * pX X ordinate of EC point.
* pY Y ordinate of EC point. * pY Y ordinate of EC point.

View File

@ -6346,7 +6346,7 @@ static WC_INLINE sp_int_digit sp_div_word(sp_int_digit hi, sp_int_digit lo,
if (r > SP_HALF_MAX) { if (r > SP_HALF_MAX) {
r = SP_HALF_MAX; r = SP_HALF_MAX;
} }
/* Shift up result for trial division calucation. */ /* Shift up result for trial division calculation. */
r <<= SP_HALF_SIZE; r <<= SP_HALF_SIZE;
/* Calculate trial value. */ /* Calculate trial value. */
trial = r * (sp_int_word)d; trial = r * (sp_int_word)d;
@ -12416,7 +12416,7 @@ static int _sp_invmod_mont_ct(const sp_int* a, const sp_int* m, sp_int* r,
int bit = sp_is_bit_set(e, (unsigned int)i); int bit = sp_is_bit_set(e, (unsigned int)i);
/* 6.2. j += bit /* 6.2. j += bit
* Update count of consequitive 1 bits. * Update count of consecutive 1 bits.
*/ */
j += bit; j += bit;
/* 6.3. s += 1 /* 6.3. s += 1
@ -13107,7 +13107,7 @@ static int _sp_exptmod_mont_ex(const sp_int* b, const sp_int* e, int bits,
DECL_SP_INT_ARRAY(t, m->used * 2 + 1, (1 << 6) + 1); DECL_SP_INT_ARRAY(t, m->used * 2 + 1, (1 << 6) + 1);
/* Window bits based on number of pre-calculations versus number of loop /* Window bits based on number of pre-calculations versus number of loop
* calculcations. * calculations.
* Exponents for RSA and DH will result in 6-bit windows. * Exponents for RSA and DH will result in 6-bit windows.
*/ */
if (bits > 450) { if (bits > 450) {

View File

@ -26392,7 +26392,7 @@ int sp_ecc_verify_256_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */ #endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY #ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* point EC point. * point EC point.
* heap Heap to use if dynamically allocating. * heap Heap to use if dynamically allocating.
@ -26448,7 +26448,7 @@ static int sp_256_ecc_is_point_4(const sp_point_256* point,
return err; return err;
} }
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* pX X ordinate of EC point. * pX X ordinate of EC point.
* pY Y ordinate of EC point. * pY Y ordinate of EC point.
@ -51339,7 +51339,7 @@ int sp_ecc_verify_384_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */ #endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY #ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* point EC point. * point EC point.
* heap Heap to use if dynamically allocating. * heap Heap to use if dynamically allocating.
@ -51395,7 +51395,7 @@ static int sp_384_ecc_is_point_6(const sp_point_384* point,
return err; return err;
} }
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* pX X ordinate of EC point. * pX X ordinate of EC point.
* pY Y ordinate of EC point. * pY Y ordinate of EC point.
@ -92477,7 +92477,7 @@ int sp_ecc_verify_521_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
#endif /* HAVE_ECC_VERIFY */ #endif /* HAVE_ECC_VERIFY */
#ifdef HAVE_ECC_CHECK_KEY #ifdef HAVE_ECC_CHECK_KEY
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* point EC point. * point EC point.
* heap Heap to use if dynamically allocating. * heap Heap to use if dynamically allocating.
@ -92533,7 +92533,7 @@ static int sp_521_ecc_is_point_9(const sp_point_521* point,
return err; return err;
} }
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* pX X ordinate of EC point. * pX X ordinate of EC point.
* pY Y ordinate of EC point. * pY Y ordinate of EC point.
@ -105408,7 +105408,7 @@ static void sp_1024_from_bin(sp_digit* r, int size, const byte* a, int n)
} }
} }
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* point EC point. * point EC point.
* heap Heap to use if dynamically allocating. * heap Heap to use if dynamically allocating.
@ -105468,7 +105468,7 @@ static int sp_1024_ecc_is_point_16(const sp_point_1024* point,
return err; return err;
} }
/* Check that the x and y oridinates are a valid point on the curve. /* Check that the x and y ordinates are a valid point on the curve.
* *
* pX X ordinate of EC point. * pX X ordinate of EC point.
* pY Y ordinate of EC point. * pY Y ordinate of EC point.

View File

@ -2042,7 +2042,7 @@ int wc_MakeRsaKey(RsaKey* key, int size, long e, WC_RNG* rng)
{ {
IppStatus ret; IppStatus ret;
int scratchSz; int scratchSz;
int i; /* for trys on calling make key */ int i; /* for tries on calling make key */
int ctxSz; int ctxSz;
IppsBigNumState* pSrcPublicExp = NULL; IppsBigNumState* pSrcPublicExp = NULL;
@ -2178,7 +2178,7 @@ int wc_MakeRsaKey(RsaKey* key, int size, long e, WC_RNG* rng)
goto makeKeyEnd; goto makeKeyEnd;
} }
/* call IPP to generate keys, if inseficent entropy error call again */ /* call IPP to generate keys, if insufficient entropy error call again */
ret = ippStsInsufficientEntropy; ret = ippStsInsufficientEntropy;
while (ret == ippStsInsufficientEntropy) { while (ret == ippStsInsufficientEntropy) {
ret = ippsRSA_GenerateKeys(pSrcPublicExp, key->n, key->e, ret = ippsRSA_GenerateKeys(pSrcPublicExp, key->n, key->e,

View File

@ -1764,7 +1764,7 @@ enum Misc {
#ifndef ECDHE_SIZE /* allow this to be overridden at compile-time */ #ifndef ECDHE_SIZE /* allow this to be overridden at compile-time */
ECDHE_SIZE = 32, /* ECDHE server size defaults to 256 bit */ ECDHE_SIZE = 32, /* ECDHE server size defaults to 256 bit */
#endif #endif
MAX_EXPORT_ECC_SZ = 256, /* Export ANS X9.62 max future size */ MAX_EXPORT_ECC_SZ = 256, /* Export ANSI X9.62 max future size */
MAX_CURVE_NAME_SZ = 16, /* Maximum size of curve name string */ MAX_CURVE_NAME_SZ = 16, /* Maximum size of curve name string */
NEW_SA_MAJOR = 8, /* Most significant byte used with new sig algos */ NEW_SA_MAJOR = 8, /* Most significant byte used with new sig algos */
@ -3576,7 +3576,7 @@ struct WOLFSSL_CTX {
byte sendVerify:2; /* for client side (can not be single bit) */ byte sendVerify:2; /* for client side (can not be single bit) */
byte haveRSA:1; /* RSA available */ byte haveRSA:1; /* RSA available */
byte haveECC:1; /* ECC available */ byte haveECC:1; /* ECC available */
byte haveDH:1; /* server DH parms set by user */ byte haveDH:1; /* server DH params set by user */
byte haveECDSAsig:1; /* server cert signed w/ ECDSA */ byte haveECDSAsig:1; /* server cert signed w/ ECDSA */
byte haveFalconSig:1; /* server cert signed w/ Falcon */ byte haveFalconSig:1; /* server cert signed w/ Falcon */
byte haveDilithiumSig:1;/* server cert signed w/ Dilithium */ byte haveDilithiumSig:1;/* server cert signed w/ Dilithium */
@ -4630,7 +4630,7 @@ struct Options {
word16 usingCompression:1; /* are we using compression */ word16 usingCompression:1; /* are we using compression */
word16 haveRSA:1; /* RSA available */ word16 haveRSA:1; /* RSA available */
word16 haveECC:1; /* ECC available */ word16 haveECC:1; /* ECC available */
word16 haveDH:1; /* server DH parms set by user */ word16 haveDH:1; /* server DH params set by user */
word16 haveECDSAsig:1; /* server ECDSA signed cert */ word16 haveECDSAsig:1; /* server ECDSA signed cert */
word16 haveStaticECC:1; /* static server ECC private key */ word16 haveStaticECC:1; /* static server ECC private key */
word16 haveFalconSig:1; /* server Falcon signed cert */ word16 haveFalconSig:1; /* server Falcon signed cert */

View File

@ -48,8 +48,8 @@ typedef struct hss_extra_info hss_extra_info;
struct LmsKey { struct LmsKey {
unsigned levels; /* Number of tree levels. */ unsigned levels; /* Number of tree levels. */
param_set_t lm_type[MAX_HSS_LEVELS]; /* Height parm per level. */ param_set_t lm_type[MAX_HSS_LEVELS]; /* Height param per level. */
param_set_t lm_ots_type[MAX_HSS_LEVELS]; /* Winternitz parm per level. */ param_set_t lm_ots_type[MAX_HSS_LEVELS]; /* Winternitz param per level. */
unsigned char pub[HSS_MAX_PUBLIC_KEY_LEN]; unsigned char pub[HSS_MAX_PUBLIC_KEY_LEN];
#ifndef WOLFSSL_LMS_VERIFY_ONLY #ifndef WOLFSSL_LMS_VERIFY_ONLY
hss_working_key * working_key; hss_working_key * working_key;

View File

@ -94,8 +94,8 @@ enum wc_LmsParm {
/* enum wc_LmsState is to help track the state of an LMS/HSS Key. */ /* enum wc_LmsState is to help track the state of an LMS/HSS Key. */
enum wc_LmsState { enum wc_LmsState {
WC_LMS_STATE_FREED, /* Key has been freed from memory. */ WC_LMS_STATE_FREED, /* Key has been freed from memory. */
WC_LMS_STATE_INITED, /* Key has been inited, ready to set parms.*/ WC_LMS_STATE_INITED, /* Key has been inited, ready to set params.*/
WC_LMS_STATE_PARMSET, /* Parms are set, ready to MakeKey or Reload. */ WC_LMS_STATE_PARMSET, /* Params are set, ready to MakeKey or Reload. */
WC_LMS_STATE_OK, /* Able to sign signatures and verify. */ WC_LMS_STATE_OK, /* Able to sign signatures and verify. */
WC_LMS_STATE_VERIFYONLY, /* A public only LmsKey. */ WC_LMS_STATE_VERIFYONLY, /* A public only LmsKey. */
WC_LMS_STATE_BAD, /* Can't guarantee key's state. */ WC_LMS_STATE_BAD, /* Can't guarantee key's state. */

View File

@ -104,8 +104,8 @@ enum wc_XmssRc {
/* enum wc_XmssState is to help track the state of an XMSS Key. */ /* enum wc_XmssState is to help track the state of an XMSS Key. */
enum wc_XmssState { enum wc_XmssState {
WC_XMSS_STATE_FREED, /* Key has been freed from memory. */ WC_XMSS_STATE_FREED, /* Key has been freed from memory. */
WC_XMSS_STATE_INITED, /* Key has been inited, ready to set parms.*/ WC_XMSS_STATE_INITED, /* Key has been inited, ready to set params.*/
WC_XMSS_STATE_PARMSET, /* Parms are set, ready to MakeKey or Reload. */ WC_XMSS_STATE_PARMSET, /* Params are set, ready to MakeKey or Reload. */
WC_XMSS_STATE_OK, /* Able to sign signatures and verify. */ WC_XMSS_STATE_OK, /* Able to sign signatures and verify. */
WC_XMSS_STATE_VERIFYONLY, /* A public only XmssKey. */ WC_XMSS_STATE_VERIFYONLY, /* A public only XmssKey. */
WC_XMSS_STATE_BAD, /* Can't guarantee key's state. */ WC_XMSS_STATE_BAD, /* Can't guarantee key's state. */