forked from wolfSSL/wolfssl
misc. spelling fixes
This commit is contained in:
2
.github/workflows/codespell.yml
vendored
2
.github/workflows/codespell.yml
vendored
@ -23,7 +23,7 @@ jobs:
|
||||
check_filenames: true
|
||||
check_hidden: true
|
||||
# Add comma separated list of words that occur multiple times that should be ignored (sorted alphabetically, case sensitive)
|
||||
ignore_words_list: adin,aNULL,carryIn,chainG,ciph,cLen,cliKs,dout,haveA,inCreated,inOut,inout,larg,LEAPYEAR,Merget,optionA,parm,parms,repid,rIn,userA,ser,siz,te,Te
|
||||
ignore_words_list: adin,aNULL,brunch,carryIn,chainG,ciph,cLen,cliKs,dout,haveA,inCreated,inOut,inout,larg,LEAPYEAR,Merget,optionA,parm,parms,repid,rIn,userA,ser,siz,te,Te
|
||||
# The exclude_file contains lines of code that should be ignored. This is useful for individual lines which have non-words that can safely be ignored.
|
||||
exclude_file: '.codespellexcludelines'
|
||||
# To skip files entirely from being processed, add it to the following list:
|
||||
|
2
src/pk.c
2
src/pk.c
@ -12361,7 +12361,7 @@ WOLFSSL_EC_KEY* wolfSSL_d2i_ECPrivateKey(WOLFSSL_EC_KEY** key,
|
||||
*
|
||||
* @param [in] key EC key to encode.
|
||||
* @param [in, out] out On in, reference to buffer to place DER encoding into.
|
||||
* On out, reference to buffer adter the encoding.
|
||||
* On out, reference to buffer after the encoding.
|
||||
* May be NULL.
|
||||
* @return Length of DER encoding on success.
|
||||
* @return 0 on error.
|
||||
|
12
tests/api.c
12
tests/api.c
@ -8795,7 +8795,7 @@ static void test_client_reuse_WOLFSSLobj(void* args, cbType cb,
|
||||
if (ssl == NULL) {
|
||||
goto done;
|
||||
}
|
||||
/* keep handshake resources for re-using WOLFSSL obj */
|
||||
/* keep handshake resources for reusing WOLFSSL obj */
|
||||
wolfSSL_KeepArrays(ssl);
|
||||
if (wolfSSL_KeepHandshakeResources(ssl)) {
|
||||
/* err_sys("SSL_KeepHandshakeResources failed"); */
|
||||
@ -8859,7 +8859,7 @@ static void test_client_reuse_WOLFSSLobj(void* args, cbType cb,
|
||||
fprintf(stderr, "Server response: %s\n", reply);
|
||||
}
|
||||
|
||||
/* Session Resumption by re-using WOLFSSL object */
|
||||
/* Session Resumption by reusing WOLFSSL object */
|
||||
wolfSSL_set_quiet_shutdown(ssl, 1);
|
||||
if (wolfSSL_shutdown(ssl) != WOLFSSL_SUCCESS) {
|
||||
/* err_sys ("SSL shutdown failed"); */
|
||||
@ -9499,7 +9499,7 @@ static int test_wolfSSL_reuse_WOLFSSLobj(void)
|
||||
EXPECT_DECLS;
|
||||
#if defined(OPENSSL_EXTRA) && !defined(NO_SESSION_CACHE) && \
|
||||
!defined(WOLFSSL_NO_TLS12)
|
||||
/* The unit test for session resumption by re-using WOLFSSL object.
|
||||
/* The unit test for session resumption by reusing WOLFSSL object.
|
||||
* WOLFSSL object is not cleared after first session. It reuse the object
|
||||
* for second connection.
|
||||
*/
|
||||
@ -55867,7 +55867,7 @@ static int test_wolfSSL_X509_NAME_print_ex(void)
|
||||
membio = NULL;
|
||||
|
||||
/* Test with XN_FLAG_ONELINE which should enable XN_FLAG_SPC_EQ for
|
||||
spaces aroun '=' */
|
||||
spaces around '=' */
|
||||
ExpectNotNull(membio = BIO_new(BIO_s_mem()));
|
||||
ExpectIntEQ(X509_NAME_print_ex(membio, name, 0, XN_FLAG_ONELINE),
|
||||
WOLFSSL_SUCCESS);
|
||||
@ -68103,7 +68103,7 @@ static int test_openssl_hmac(const WOLFSSL_EVP_MD* md, int md_len)
|
||||
ExpectIntEQ(HMAC_Init_ex(NULL, (void*)key, (int)sizeof(key), md, e), 0);
|
||||
ExpectIntEQ(HMAC_Init_ex(hmac, (void*)key, (int)sizeof(key), md, e), 1);
|
||||
|
||||
/* re-using test key as data to hash */
|
||||
/* reusing test key as data to hash */
|
||||
ExpectIntEQ(HMAC_Update(NULL, key, (int)sizeof(key)), 0);
|
||||
ExpectIntEQ(HMAC_Update(hmac, key, (int)sizeof(key)), 1);
|
||||
ExpectIntEQ(HMAC_Update(hmac, key, 0), 1);
|
||||
@ -68210,7 +68210,7 @@ static int test_wolfSSL_CMAC(void)
|
||||
ExpectNotNull(CMAC_CTX_get0_cipher_ctx(cmacCtx));
|
||||
ExpectIntEQ(CMAC_Init(cmacCtx, key, AES_128_KEY_SIZE, EVP_aes_128_cbc(),
|
||||
NULL), 1);
|
||||
/* re-using test key as data to hash */
|
||||
/* reusing test key as data to hash */
|
||||
ExpectIntEQ(CMAC_Update(cmacCtx, key, AES_128_KEY_SIZE), 1);
|
||||
ExpectIntEQ(CMAC_Update(cmacCtx, NULL, 0), 1);
|
||||
ExpectIntEQ(CMAC_Final(cmacCtx, out, &outLen), 1);
|
||||
|
@ -369,7 +369,7 @@ int ge448_scalarmult_base(ge448_p2* h, const byte* a)
|
||||
return 0;
|
||||
}
|
||||
|
||||
/* Perform a scalar multplication of the base point and public point.
|
||||
/* Perform a scalar multiplication of the base point and public point.
|
||||
* r = a * p + b * base
|
||||
* Uses a sliding window of 5 bits.
|
||||
* Not constant time.
|
||||
|
@ -5782,7 +5782,7 @@ struct WOLFSSL {
|
||||
WOLFSSL_CTX* initial_ctx; /* preserve session key materials */
|
||||
#endif
|
||||
Suites* suites; /* Only need during handshake. Can be NULL when
|
||||
* re-using the context's object. When WOLFSSL
|
||||
* reusing the context's object. When WOLFSSL
|
||||
* object needs separate instance of suites use
|
||||
* AllocateSuites(). */
|
||||
#ifdef OPENSSL_EXTRA
|
||||
|
Reference in New Issue
Block a user