mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2025-08-02 20:24:39 +02:00
Used codespell and fixed obvious typos.
This commit is contained in:
@@ -2104,7 +2104,7 @@ THREAD_RETURN WOLFSSL_THREAD client_test(void* args)
|
|||||||
#endif
|
#endif
|
||||||
|
|
||||||
#ifdef WOLFSSL_DUAL_ALG_CERTS
|
#ifdef WOLFSSL_DUAL_ALG_CERTS
|
||||||
/* Set our preference for verfication to be for both the native and
|
/* Set our preference for verification to be for both the native and
|
||||||
* alternative chains. Ultimately, its the server's choice. This will be
|
* alternative chains. Ultimately, its the server's choice. This will be
|
||||||
* used in the call to wolfSSL_UseCKS(). */
|
* used in the call to wolfSSL_UseCKS(). */
|
||||||
byte cks_order[3] = {
|
byte cks_order[3] = {
|
||||||
|
26
src/pk.c
26
src/pk.c
@@ -14423,7 +14423,7 @@ int wolfSSL_ED25519_generate_key(unsigned char *priv, unsigned int *privSz,
|
|||||||
* @param [in] priv ED25519 private key data.
|
* @param [in] priv ED25519 private key data.
|
||||||
* @param [in] privSz Length in bytes of private key data.
|
* @param [in] privSz Length in bytes of private key data.
|
||||||
* @param [out] sig Signature buffer.
|
* @param [out] sig Signature buffer.
|
||||||
* @param [in, out] sigSz On in, the length of the siganture buffer in bytes.
|
* @param [in, out] sigSz On in, the length of the signature buffer in bytes.
|
||||||
* On out, the length of the signature in bytes.
|
* On out, the length of the signature in bytes.
|
||||||
* @return 1 on success
|
* @return 1 on success
|
||||||
* @return 0 on failure.
|
* @return 0 on failure.
|
||||||
@@ -14889,7 +14889,7 @@ int wolfSSL_ED448_generate_key(unsigned char *priv, unsigned int *privSz,
|
|||||||
* @param [in] priv ED448 private key data.
|
* @param [in] priv ED448 private key data.
|
||||||
* @param [in] privSz Length in bytes of private key data.
|
* @param [in] privSz Length in bytes of private key data.
|
||||||
* @param [out] sig Signature buffer.
|
* @param [out] sig Signature buffer.
|
||||||
* @param [in, out] sigSz On in, the length of the siganture buffer in bytes.
|
* @param [in, out] sigSz On in, the length of the signature buffer in bytes.
|
||||||
* On out, the length of the signature in bytes.
|
* On out, the length of the signature in bytes.
|
||||||
* @return 1 on success
|
* @return 1 on success
|
||||||
* @return 0 on failure.
|
* @return 0 on failure.
|
||||||
@@ -15143,7 +15143,7 @@ int wolfSSL_PEM_write_bio_PUBKEY(WOLFSSL_BIO* bio, WOLFSSL_EVP_PKEY* key)
|
|||||||
* @param [in] passwd Password to use when encrypting.
|
* @param [in] passwd Password to use when encrypting.
|
||||||
* @param [in] len Length of password.
|
* @param [in] len Length of password.
|
||||||
* @param [in] cb Password callback.
|
* @param [in] cb Password callback.
|
||||||
* @param [in] arg Password callback arguement.
|
* @param [in] arg Password callback argument.
|
||||||
* @return 1 on success.
|
* @return 1 on success.
|
||||||
* @return 0 on failure.
|
* @return 0 on failure.
|
||||||
*/
|
*/
|
||||||
@@ -15254,7 +15254,7 @@ int wolfSSL_PEM_write_bio_PrivateKey(WOLFSSL_BIO* bio, WOLFSSL_EVP_PKEY* key,
|
|||||||
* @param [in] bio BIO to read from.
|
* @param [in] bio BIO to read from.
|
||||||
* @param [in, out] key Public key object. Object used if passed in.
|
* @param [in, out] key Public key object. Object used if passed in.
|
||||||
* @param [in] cb Password callback.
|
* @param [in] cb Password callback.
|
||||||
* @param [in] arg Password callback arguement.
|
* @param [in] arg Password callback argument.
|
||||||
* @return A WOLFSSL_EVP_PKEY object on success.
|
* @return A WOLFSSL_EVP_PKEY object on success.
|
||||||
* @return NULL on failure.
|
* @return NULL on failure.
|
||||||
*/
|
*/
|
||||||
@@ -15310,7 +15310,7 @@ WOLFSSL_EVP_PKEY* wolfSSL_PEM_read_bio_PUBKEY(WOLFSSL_BIO* bio,
|
|||||||
* @param [in] bio BIO to read from.
|
* @param [in] bio BIO to read from.
|
||||||
* @param [in, out] key Private key object. Object used if passed in.
|
* @param [in, out] key Private key object. Object used if passed in.
|
||||||
* @param [in] cb Password callback.
|
* @param [in] cb Password callback.
|
||||||
* @param [in] arg Password callback arguement.
|
* @param [in] arg Password callback argument.
|
||||||
* @return A WOLFSSL_EVP_PKEY object on success.
|
* @return A WOLFSSL_EVP_PKEY object on success.
|
||||||
* @return NULL on failure.
|
* @return NULL on failure.
|
||||||
*/
|
*/
|
||||||
@@ -15391,7 +15391,7 @@ WOLFSSL_EVP_PKEY* wolfSSL_PEM_read_bio_PrivateKey(WOLFSSL_BIO* bio,
|
|||||||
* @param [in] fp File pointer.
|
* @param [in] fp File pointer.
|
||||||
* @param [in, out] key Public key object. Object used if passed in.
|
* @param [in, out] key Public key object. Object used if passed in.
|
||||||
* @param [in] cb Password callback.
|
* @param [in] cb Password callback.
|
||||||
* @param [in] arg Password callback arguement.
|
* @param [in] arg Password callback argument.
|
||||||
* @return A WOLFSSL_EVP_PKEY object on success.
|
* @return A WOLFSSL_EVP_PKEY object on success.
|
||||||
* @return NULL on failure.
|
* @return NULL on failure.
|
||||||
*/
|
*/
|
||||||
@@ -15448,7 +15448,7 @@ WOLFSSL_EVP_PKEY *wolfSSL_PEM_read_PUBKEY(XFILE fp, WOLFSSL_EVP_PKEY **key,
|
|||||||
* @param [in] fp File pointer.
|
* @param [in] fp File pointer.
|
||||||
* @param [in, out] key Private key object. Object used if passed in.
|
* @param [in, out] key Private key object. Object used if passed in.
|
||||||
* @param [in] cb Password callback.
|
* @param [in] cb Password callback.
|
||||||
* @param [in] arg Password callback arguement.
|
* @param [in] arg Password callback argument.
|
||||||
* @return A WOLFSSL_EVP_PKEY object on success.
|
* @return A WOLFSSL_EVP_PKEY object on success.
|
||||||
* @return NULL on failure.
|
* @return NULL on failure.
|
||||||
*/
|
*/
|
||||||
@@ -15668,7 +15668,7 @@ static int pem_read_data(char* pem, int pemLen, char **name, char **header,
|
|||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Encode the DER data in PEM foramt into a newly allocated buffer.
|
/* Encode the DER data in PEM format into a newly allocated buffer.
|
||||||
*
|
*
|
||||||
* @param [in] name Header/footer name.
|
* @param [in] name Header/footer name.
|
||||||
* @param [in] header Encryption header.
|
* @param [in] header Encryption header.
|
||||||
@@ -15812,7 +15812,7 @@ int wolfSSL_PEM_read_bio(WOLFSSL_BIO* bio, char **name, char **header,
|
|||||||
return res;
|
return res;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Encode the DER data in PEM foramt into a BIO.
|
/* Encode the DER data in PEM format into a BIO.
|
||||||
*
|
*
|
||||||
* @param [in] bio BIO to write to.
|
* @param [in] bio BIO to write to.
|
||||||
* @param [in] name Header/footer name.
|
* @param [in] name Header/footer name.
|
||||||
@@ -15894,7 +15894,7 @@ int wolfSSL_PEM_read(XFILE fp, char **name, char **header, unsigned char **data,
|
|||||||
return res;
|
return res;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Encode the DER data in PEM foramt into a file.
|
/* Encode the DER data in PEM format into a file.
|
||||||
*
|
*
|
||||||
* @param [in] fp File pointer to write to.
|
* @param [in] fp File pointer to write to.
|
||||||
* @param [in] name Header/footer name.
|
* @param [in] name Header/footer name.
|
||||||
@@ -16135,7 +16135,7 @@ static int pem_pkcs8_encode(WOLFSSL_EVP_PKEY* pkey, byte* key, word32* keySz)
|
|||||||
* @param [out] pemSz Size of data in buffer in bytes.
|
* @param [out] pemSz Size of data in buffer in bytes.
|
||||||
* @param [in] pkey Private key to write.
|
* @param [in] pkey Private key to write.
|
||||||
* @param [in] enc Encryption information to use. May be NULL.
|
* @param [in] enc Encryption information to use. May be NULL.
|
||||||
* @param [in] passwd Pasword to use when encrypting. May be NULL.
|
* @param [in] passwd Password to use when encrypting. May be NULL.
|
||||||
* @param [in] passwdSz Size of password in bytes.
|
* @param [in] passwdSz Size of password in bytes.
|
||||||
* @param [in] cb Password callback. Used when passwd is NULL. May be
|
* @param [in] cb Password callback. Used when passwd is NULL. May be
|
||||||
* NULL.
|
* NULL.
|
||||||
@@ -16256,7 +16256,7 @@ static int pem_write_mem_pkcs8privatekey(byte** pem, int* pemSz,
|
|||||||
* @param [in] bio BIO to write to.
|
* @param [in] bio BIO to write to.
|
||||||
* @param [in] pkey Private key to write.
|
* @param [in] pkey Private key to write.
|
||||||
* @param [in] enc Encryption information to use. May be NULL.
|
* @param [in] enc Encryption information to use. May be NULL.
|
||||||
* @param [in] passwd Pasword to use when encrypting. May be NULL.
|
* @param [in] passwd Password to use when encrypting. May be NULL.
|
||||||
* @param [in] passwdSz Size of password in bytes.
|
* @param [in] passwdSz Size of password in bytes.
|
||||||
* @param [in] cb Password callback. Used when passwd is NULL. May be
|
* @param [in] cb Password callback. Used when passwd is NULL. May be
|
||||||
* NULL.
|
* NULL.
|
||||||
@@ -16301,7 +16301,7 @@ int wolfSSL_PEM_write_bio_PKCS8PrivateKey(WOLFSSL_BIO* bio,
|
|||||||
* @param [in] f File pointer.
|
* @param [in] f File pointer.
|
||||||
* @param [in] pkey Private key to write.
|
* @param [in] pkey Private key to write.
|
||||||
* @param [in] enc Encryption information to use. May be NULL.
|
* @param [in] enc Encryption information to use. May be NULL.
|
||||||
* @param [in] passwd Pasword to use when encrypting. May be NULL.
|
* @param [in] passwd Password to use when encrypting. May be NULL.
|
||||||
* @param [in] passwdSz Size of password in bytes.
|
* @param [in] passwdSz Size of password in bytes.
|
||||||
* @param [in] cb Password callback. Used when passwd is NULL. May be
|
* @param [in] cb Password callback. Used when passwd is NULL. May be
|
||||||
* NULL.
|
* NULL.
|
||||||
|
@@ -1585,7 +1585,7 @@ static void ProcessBufferCertSetHave(WOLFSSL_CTX* ctx, WOLFSSL* ssl,
|
|||||||
#ifndef WC_STRICT_SIG
|
#ifndef WC_STRICT_SIG
|
||||||
wolfssl_set_have_from_key_oid(ctx, ssl, cert->keyOID);
|
wolfssl_set_have_from_key_oid(ctx, ssl, cert->keyOID);
|
||||||
#else
|
#else
|
||||||
/* Set whether ECC is available baed on signature available. */
|
/* Set whether ECC is available based on signature available. */
|
||||||
if (ssl != NULL) {
|
if (ssl != NULL) {
|
||||||
ssl->options.haveECC = ssl->options.haveECDSAsig;
|
ssl->options.haveECC = ssl->options.haveECDSAsig;
|
||||||
}
|
}
|
||||||
@@ -5611,7 +5611,7 @@ long wolfSSL_CTX_set_tmp_dh(WOLFSSL_CTX* ctx, WOLFSSL_DH* dh)
|
|||||||
*
|
*
|
||||||
* @param [in, out] ctx SSL context object.
|
* @param [in, out] ctx SSL context object.
|
||||||
* @param [in, out] ssl SSL object.
|
* @param [in, out] ssl SSL object.
|
||||||
* @oaram [in] buf Buffer holding encoded DH parameters.
|
* @param [in] buf Buffer holding encoded DH parameters.
|
||||||
* @param [in] sz Size of encoded DH parameters.
|
* @param [in] sz Size of encoded DH parameters.
|
||||||
* @param [in] format Format of data:
|
* @param [in] format Format of data:
|
||||||
* WOLFSSL_FILETYPE_PEM or WOLFSSL_FILETYPE_ASN1.
|
* WOLFSSL_FILETYPE_PEM or WOLFSSL_FILETYPE_ASN1.
|
||||||
@@ -5724,7 +5724,7 @@ static int ws_ctx_ssl_set_tmp_dh(WOLFSSL_CTX* ctx, WOLFSSL* ssl,
|
|||||||
/* Set the temporary DH parameters against the SSL.
|
/* Set the temporary DH parameters against the SSL.
|
||||||
*
|
*
|
||||||
* @param [in, out] ssl SSL object.
|
* @param [in, out] ssl SSL object.
|
||||||
* @oaram [in] buf Buffer holding encoded DH parameters.
|
* @param [in] buf Buffer holding encoded DH parameters.
|
||||||
* @param [in] sz Size of encoded DH parameters.
|
* @param [in] sz Size of encoded DH parameters.
|
||||||
* @param [in] format Format of data:
|
* @param [in] format Format of data:
|
||||||
* WOLFSSL_FILETYPE_PEM or WOLFSSL_FILETYPE_ASN1.
|
* WOLFSSL_FILETYPE_PEM or WOLFSSL_FILETYPE_ASN1.
|
||||||
@@ -5743,7 +5743,7 @@ int wolfSSL_SetTmpDH_buffer(WOLFSSL* ssl, const unsigned char* buf, long sz,
|
|||||||
/* Set the temporary DH parameters against the SSL context.
|
/* Set the temporary DH parameters against the SSL context.
|
||||||
*
|
*
|
||||||
* @param [in, out] ctx SSL context object.
|
* @param [in, out] ctx SSL context object.
|
||||||
* @oaram [in] buf Buffer holding encoded DH parameters.
|
* @param [in] buf Buffer holding encoded DH parameters.
|
||||||
* @param [in] sz Size of encoded DH parameters.
|
* @param [in] sz Size of encoded DH parameters.
|
||||||
* @param [in] format Format of data:
|
* @param [in] format Format of data:
|
||||||
* WOLFSSL_FILETYPE_PEM or WOLFSSL_FILETYPE_ASN1.
|
* WOLFSSL_FILETYPE_PEM or WOLFSSL_FILETYPE_ASN1.
|
||||||
@@ -5806,11 +5806,11 @@ static int ws_ctx_ssl_set_tmp_dh_file(WOLFSSL_CTX* ctx, WOLFSSL* ssl,
|
|||||||
}
|
}
|
||||||
if (res == 1) {
|
if (res == 1) {
|
||||||
if (ssl != NULL) {
|
if (ssl != NULL) {
|
||||||
/* Set encoded DH paramters into SSL. */
|
/* Set encoded DH parameters into SSL. */
|
||||||
res = wolfSSL_SetTmpDH_buffer(ssl, dhFile.buffer, sz, format);
|
res = wolfSSL_SetTmpDH_buffer(ssl, dhFile.buffer, sz, format);
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
/* Set encoded DH paramters into SSL context. */
|
/* Set encoded DH parameters into SSL context. */
|
||||||
res = wolfSSL_CTX_SetTmpDH_buffer(ctx, dhFile.buffer, sz, format);
|
res = wolfSSL_CTX_SetTmpDH_buffer(ctx, dhFile.buffer, sz, format);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@@ -9073,7 +9073,7 @@ static int SendTls13CertificateVerify(WOLFSSL* ssl)
|
|||||||
if ((ssl->hsType == DYNAMIC_TYPE_RSA) &&
|
if ((ssl->hsType == DYNAMIC_TYPE_RSA) &&
|
||||||
(args->sigLen > MAX_SIG_DATA_SZ)) {
|
(args->sigLen > MAX_SIG_DATA_SZ)) {
|
||||||
/* We store the RSA signature in the sigData buffer
|
/* We store the RSA signature in the sigData buffer
|
||||||
* temporarly, hence its size must be fitting. */
|
* temporarily, hence its size must be fitting. */
|
||||||
sigLen = args->sigLen;
|
sigLen = args->sigLen;
|
||||||
}
|
}
|
||||||
args->sigData = (byte*)XMALLOC(sigLen, ssl->heap,
|
args->sigData = (byte*)XMALLOC(sigLen, ssl->heap,
|
||||||
@@ -9091,7 +9091,7 @@ static int SendTls13CertificateVerify(WOLFSSL* ssl)
|
|||||||
if (ssl->hsAltType == DYNAMIC_TYPE_RSA &&
|
if (ssl->hsAltType == DYNAMIC_TYPE_RSA &&
|
||||||
args->altSigLen > MAX_SIG_DATA_SZ) {
|
args->altSigLen > MAX_SIG_DATA_SZ) {
|
||||||
/* We store the RSA signature in the sigData buffer
|
/* We store the RSA signature in the sigData buffer
|
||||||
* temporarly, hence its size must be fitting. */
|
* temporarily, hence its size must be fitting. */
|
||||||
sigLen = args->altSigLen;
|
sigLen = args->altSigLen;
|
||||||
}
|
}
|
||||||
args->altSigData = (byte*)XMALLOC(sigLen, ssl->heap,
|
args->altSigData = (byte*)XMALLOC(sigLen, ssl->heap,
|
||||||
|
@@ -318,7 +318,7 @@
|
|||||||
* enabled, all if the values in report are blank. */
|
* enabled, all if the values in report are blank. */
|
||||||
#ifdef CONFIG_NEWLIB_NANO_FORMAT
|
#ifdef CONFIG_NEWLIB_NANO_FORMAT
|
||||||
#if CONFIG_NEWLIB_NANO_FORMAT == 1
|
#if CONFIG_NEWLIB_NANO_FORMAT == 1
|
||||||
#error "Nano newlib fomatting must not be enabled for benchmark"
|
#error "Nano newlib formatting must not be enabled for benchmark"
|
||||||
#endif
|
#endif
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
@@ -372,7 +372,7 @@
|
|||||||
defined(CONFIG_IDF_TARGET_ESP32S3)
|
defined(CONFIG_IDF_TARGET_ESP32S3)
|
||||||
#include <xtensa/hal.h>
|
#include <xtensa/hal.h>
|
||||||
#elif defined(CONFIG_IDF_TARGET_ESP8266)
|
#elif defined(CONFIG_IDF_TARGET_ESP8266)
|
||||||
/* no CPU HAL for ESP8266, we'll use RTOS tick calc extimates */
|
/* no CPU HAL for ESP8266, we'll use RTOS tick calc estimates */
|
||||||
#include <FreeRTOS.h>
|
#include <FreeRTOS.h>
|
||||||
#elif defined(CONFIG_IDF_TARGET_ESP32H2)
|
#elif defined(CONFIG_IDF_TARGET_ESP32H2)
|
||||||
/* TODO add ESP32-H2 benchmark support */
|
/* TODO add ESP32-H2 benchmark support */
|
||||||
@@ -1410,7 +1410,7 @@ static const char* bench_result_words3[][5] = {
|
|||||||
uint64_t thisIncrement = 0; /* The adjusted increment amount. */
|
uint64_t thisIncrement = 0; /* The adjusted increment amount. */
|
||||||
uint64_t expected_diff = 0; /* FreeRTOS estimated expected CPU diff.*/
|
uint64_t expected_diff = 0; /* FreeRTOS estimated expected CPU diff.*/
|
||||||
#ifdef DEBUG_WOLFSSL_BENCHMARK_TIMING
|
#ifdef DEBUG_WOLFSSL_BENCHMARK_TIMING
|
||||||
uint64_t tickCount = 0; /* Currrent rtos tick counter. */
|
uint64_t tickCount = 0; /* Current rtos tick counter. */
|
||||||
uint64_t tickDiff = 0; /* Tick difference from last check. */
|
uint64_t tickDiff = 0; /* Tick difference from last check. */
|
||||||
uint64_t tickBeginDiff = 0; /* Tick difference from beginning. */
|
uint64_t tickBeginDiff = 0; /* Tick difference from beginning. */
|
||||||
#endif
|
#endif
|
||||||
|
@@ -502,7 +502,7 @@ int esp_sha_ctx_copy(struct wc_Sha* src, struct wc_Sha* dst)
|
|||||||
int esp_sha224_ctx_copy(struct wc_Sha256* src, struct wc_Sha256* dst)
|
int esp_sha224_ctx_copy(struct wc_Sha256* src, struct wc_Sha256* dst)
|
||||||
{
|
{
|
||||||
/* There's no 224 hardware on ESP32.
|
/* There's no 224 hardware on ESP32.
|
||||||
* Initializer fo dst is this ctx address for use as a breadcrumb. */
|
* Initializer for dst is this ctx address for use as a breadcrumb. */
|
||||||
dst->ctx.initializer = (uintptr_t)&dst->ctx;
|
dst->ctx.initializer = (uintptr_t)&dst->ctx;
|
||||||
#if defined(ESP_MONITOR_HW_TASK_LOCK) && !defined(SINGLE_THREADED)
|
#if defined(ESP_MONITOR_HW_TASK_LOCK) && !defined(SINGLE_THREADED)
|
||||||
{
|
{
|
||||||
@@ -1414,7 +1414,7 @@ int esp_sha_try_hw_lock(WC_ESP32SHA* ctx)
|
|||||||
if (mutex_ctx_owner) {
|
if (mutex_ctx_owner) {
|
||||||
#ifdef WOLFSSL_DEBUG_MUTEX
|
#ifdef WOLFSSL_DEBUG_MUTEX
|
||||||
ESP_LOGW(TAG, "revert to SW since mutex_ctx_owner = %x"
|
ESP_LOGW(TAG, "revert to SW since mutex_ctx_owner = %x"
|
||||||
" but we are currenty ctx = %x",
|
" but we are currently ctx = %x",
|
||||||
mutex_ctx_owner, (intptr_t)ctx);
|
mutex_ctx_owner, (intptr_t)ctx);
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
|
@@ -241,7 +241,7 @@ int set_time_from_string(const char* time_buffer)
|
|||||||
int quote_offset = 0;
|
int quote_offset = 0;
|
||||||
int ret = 0;
|
int ret = 0;
|
||||||
|
|
||||||
/* perform some basic sanity checkes */
|
/* perform some basic sanity checks */
|
||||||
ret = probably_valid_time_string(time_buffer);
|
ret = probably_valid_time_string(time_buffer);
|
||||||
if (ret == ESP_OK) {
|
if (ret == ESP_OK) {
|
||||||
/* we are expecting the string to be encapsulated in single quotes */
|
/* we are expecting the string to be encapsulated in single quotes */
|
||||||
@@ -255,7 +255,7 @@ int set_time_from_string(const char* time_buffer)
|
|||||||
&day, &hour, &minute, &second, &year, &offset);
|
&day, &hour, &minute, &second, &year, &offset);
|
||||||
|
|
||||||
if (ret == 8) {
|
if (ret == 8) {
|
||||||
/* we found a match for all componets */
|
/* we found a match for all components */
|
||||||
|
|
||||||
const char *months[] = { "Jan", "Feb", "Mar", "Apr", "May", "Jun",
|
const char *months[] = { "Jan", "Feb", "Mar", "Apr", "May", "Jun",
|
||||||
"Jul", "Aug", "Sep", "Oct", "Nov", "Dec"
|
"Jul", "Aug", "Sep", "Oct", "Nov", "Dec"
|
||||||
@@ -320,7 +320,7 @@ int set_time(void)
|
|||||||
esp_show_current_datetime();
|
esp_show_current_datetime();
|
||||||
|
|
||||||
#ifdef LIBWOLFSSL_VERSION_GIT_HASH_DATE
|
#ifdef LIBWOLFSSL_VERSION_GIT_HASH_DATE
|
||||||
/* initialy set a default approximate time from recent git commit */
|
/* initially set a default approximate time from recent git commit */
|
||||||
ESP_LOGI(TAG, "Found git hash date, attempting to set system date: %s",
|
ESP_LOGI(TAG, "Found git hash date, attempting to set system date: %s",
|
||||||
LIBWOLFSSL_VERSION_GIT_HASH_DATE);
|
LIBWOLFSSL_VERSION_GIT_HASH_DATE);
|
||||||
set_time_from_string(LIBWOLFSSL_VERSION_GIT_HASH_DATE"\0");
|
set_time_from_string(LIBWOLFSSL_VERSION_GIT_HASH_DATE"\0");
|
||||||
@@ -427,7 +427,7 @@ int set_time_wait_for_ntp(void)
|
|||||||
#endif
|
#endif
|
||||||
|
|
||||||
if (ret == ESP_OK) {
|
if (ret == ESP_OK) {
|
||||||
ESP_LOGI(TAG, "Successfuly set time via NTP servers.");
|
ESP_LOGI(TAG, "Successfully set time via NTP servers.");
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
ESP_LOGW(TAG, "Warning: Failed to set time with NTP: "
|
ESP_LOGW(TAG, "Warning: Failed to set time with NTP: "
|
||||||
|
@@ -384,7 +384,7 @@ esp_err_t wc_wifi_init_sta(void)
|
|||||||
.ssid = EXAMPLE_ESP_WIFI_SSID,
|
.ssid = EXAMPLE_ESP_WIFI_SSID,
|
||||||
.password = EXAMPLE_ESP_WIFI_PASS,
|
.password = EXAMPLE_ESP_WIFI_PASS,
|
||||||
/* Authmode threshold resets to WPA2 as default if password matches
|
/* Authmode threshold resets to WPA2 as default if password matches
|
||||||
* WPA2 standards (pasword len => 8). If you want to connect the
|
* WPA2 standards (password len => 8). If you want to connect the
|
||||||
* device to deprecated WEP/WPA networks, Please set the threshold
|
* device to deprecated WEP/WPA networks, Please set the threshold
|
||||||
* value WIFI_AUTH_WEP/WIFI_AUTH_WPA_PSK and set the password with
|
* value WIFI_AUTH_WEP/WIFI_AUTH_WPA_PSK and set the password with
|
||||||
* length and format matching to WIFI_AUTH_WEP/WIFI_AUTH_WPA_PSK
|
* length and format matching to WIFI_AUTH_WEP/WIFI_AUTH_WPA_PSK
|
||||||
|
Reference in New Issue
Block a user