From 9898b5d82b7d0b2692d68025f52e8a7f19c52d69 Mon Sep 17 00:00:00 2001 From: David Garske Date: Mon, 16 Aug 2021 13:58:37 -0700 Subject: [PATCH] Various spelling fixes. --- src/internal.c | 2 +- src/sniffer.c | 2 +- src/tls13.c | 2 +- wolfcrypt/src/asn.c | 4 +--- wolfcrypt/src/random.c | 2 +- 5 files changed, 5 insertions(+), 7 deletions(-) diff --git a/src/internal.c b/src/internal.c index 8a769726d..90de93968 100644 --- a/src/internal.c +++ b/src/internal.c @@ -30735,7 +30735,7 @@ static int TicketEncCbCtx_Init(WOLFSSL_CTX* ctx, TicketEncCbCtx* keyCtx) /* Setup the session ticket encryption context for this. * - * Initialize RNG, generate name, generate primeary key and set primary key + * Initialize RNG, generate name, generate primary key and set primary key * expirary. * * @param [in] keyCtx Context for session ticket encryption. diff --git a/src/sniffer.c b/src/sniffer.c index be1d919d7..57c8db84e 100644 --- a/src/sniffer.c +++ b/src/sniffer.c @@ -2195,7 +2195,7 @@ static int SetupKeys(const byte* input, int* sslBytes, SnifferSession* session, SetError(RSA_DECODE_STR, error, session, FATAL_ERROR_STATE); #else /* If we can do ECC, this isn't fatal. Not loading an ECC - * key will be fatal, though. */ + * key will be fatal, though. */ SetError(RSA_DECODE_STR, error, session, 0); if (keys->ecKey == NULL) keys->ecKey = session->sslServer->buffers.key; /* try ECC */ diff --git a/src/tls13.c b/src/tls13.c index e8b54595d..39fdb351e 100644 --- a/src/tls13.c +++ b/src/tls13.c @@ -9577,7 +9577,7 @@ int wolfSSL_set_max_early_data(WOLFSSL* ssl, unsigned int sz) * * ssl The SSL/TLS object. * data Early data to write - * sz The size of the eary data in bytes. + * sz The size of the early data in bytes. * outSz The number of early data bytes written. * returns BAD_FUNC_ARG when: ssl, data or outSz is NULL; sz is negative; * or not using TLS v1.3. SIDE ERROR when not a server. Otherwise the number of diff --git a/wolfcrypt/src/asn.c b/wolfcrypt/src/asn.c index 353cf6c22..711b6ce96 100644 --- a/wolfcrypt/src/asn.c +++ b/wolfcrypt/src/asn.c @@ -17262,9 +17262,7 @@ int wc_Ed25519KeyToDer(ed25519_key* key, byte* output, word32 inLen) return wc_BuildEd25519KeyDer(key, output, inLen, 1); } - - -/* Write only private ecc key to DER format, +/* Write only private Ed25519 key to DER format, * length on success else < 0 */ int wc_Ed25519PrivateKeyToDer(ed25519_key* key, byte* output, word32 inLen) { diff --git a/wolfcrypt/src/random.c b/wolfcrypt/src/random.c index 5f32df457..bd3c3aa3e 100644 --- a/wolfcrypt/src/random.c +++ b/wolfcrypt/src/random.c @@ -132,7 +132,7 @@ int wc_RNG_GenerateByte(WC_RNG* rng, byte* b) #include #include wolfSSL_Mutex wnr_mutex; /* global netRandom mutex */ - int wnr_timeout = 0; /* entropy timeout, mililseconds */ + int wnr_timeout = 0; /* entropy timeout, milliseconds */ int wnr_mutex_init = 0; /* flag for mutex init */ wnr_context* wnr_ctx; /* global netRandom context */ #elif defined(FREESCALE_KSDK_2_0_TRNG)