mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2025-08-02 12:14:38 +02:00
Final set of spelling fixes
This commit is contained in:
9
.github/workflows/codespell.yml
vendored
9
.github/workflows/codespell.yml
vendored
@@ -17,4 +17,11 @@ jobs:
|
|||||||
check_filenames: true
|
check_filenames: true
|
||||||
check_hidden: true
|
check_hidden: true
|
||||||
# Add comma separated list of words to ignore (sorted alphabetically, case sensitive)
|
# Add comma separated list of words to ignore (sorted alphabetically, case sensitive)
|
||||||
ignore_words_list: adin,ADn,aNULL,carryIn,cconfiguration,chainG,ciph,cLen,cliKs,creen,dout,ede,endianess,Endianess,Fo,haveA,hashIn,larg,LEAPYEAR,inCreated,inOut,inout,Merget,mot,optionA,optmization,parm,parms,rIn,ser,siz,Te,te,TOOM,userA,vie,vlaue
|
ignore_words_list: adin,ADn,alph,aNULL,carryIn,cconfiguration,chainG,ciph,cLen,cliKs,creen,dout,ede,endianess,Endianess,Fo,haveA,hashIn,larg,LEAPYEAR,inCreated,inOut,inout,Merget,mot,optionA,optmization,parm,parms,rIn,rsource,ser,siz,Te,te,TOOM,userA,vie,vlaue
|
||||||
|
exclude_file:
|
||||||
|
./IDE/ECLIPSE/DEOS/tls_wolfssl.c
|
||||||
|
./IDE/ECLIPSE/MICRIUM/client_wolfssl.c
|
||||||
|
./IDE/IAR-MSP430/main.c
|
||||||
|
./tests/api.c
|
||||||
|
skip:
|
||||||
|
./certs/*/*.pem
|
||||||
|
@@ -41,7 +41,7 @@
|
|||||||
# The maximum length of options is NOT 50 characters as documented.
|
# The maximum length of options is NOT 50 characters as documented.
|
||||||
# kconfcheck will complain that options should be 40 at most.
|
# kconfcheck will complain that options should be 40 at most.
|
||||||
#
|
#
|
||||||
# Fix option lengths first. Superflous errors on other lines may occur.
|
# Fix option lengths first. Superfluous errors on other lines may occur.
|
||||||
#
|
#
|
||||||
# The maximum length of lines is 120 characters.
|
# The maximum length of lines is 120 characters.
|
||||||
#
|
#
|
||||||
|
@@ -786,7 +786,7 @@
|
|||||||
/***** END CONFIG_IDF_TARGET_ESP8684 *****/
|
/***** END CONFIG_IDF_TARGET_ESP8684 *****/
|
||||||
|
|
||||||
#else
|
#else
|
||||||
/* Anything else encountered, disable HW accleration */
|
/* Anything else encountered, disable HW acceleration */
|
||||||
#warning "Unexpected CONFIG_IDF_TARGET_NN value"
|
#warning "Unexpected CONFIG_IDF_TARGET_NN value"
|
||||||
#define NO_ESP32_CRYPT
|
#define NO_ESP32_CRYPT
|
||||||
#define NO_WOLFSSL_ESP32_CRYPT_HASH
|
#define NO_WOLFSSL_ESP32_CRYPT_HASH
|
||||||
|
@@ -57,7 +57,7 @@ choice WOLFSSL_EXAMPLE_CHOOSE
|
|||||||
config WOLFSSL_EXAMPLE_NAME_WOLFSSH_TEMPLATE
|
config WOLFSSL_EXAMPLE_NAME_WOLFSSH_TEMPLATE
|
||||||
bool "SSH Template App"
|
bool "SSH Template App"
|
||||||
help
|
help
|
||||||
Bare-bones Hellow World app that only compiles in wolfSSL and wolfSSH.
|
Bare-bones Hello World app that only compiles in wolfSSL and wolfSSH.
|
||||||
See wolfSSL/wolfssh on GitHub.
|
See wolfSSL/wolfssh on GitHub.
|
||||||
|
|
||||||
config WOLFSSL_EXAMPLE_NAME_WOLFSSH_ECHOSERVER
|
config WOLFSSL_EXAMPLE_NAME_WOLFSSH_ECHOSERVER
|
||||||
|
@@ -786,7 +786,7 @@
|
|||||||
/***** END CONFIG_IDF_TARGET_ESP8684 *****/
|
/***** END CONFIG_IDF_TARGET_ESP8684 *****/
|
||||||
|
|
||||||
#else
|
#else
|
||||||
/* Anything else encountered, disable HW accleration */
|
/* Anything else encountered, disable HW acceleration */
|
||||||
#warning "Unexpected CONFIG_IDF_TARGET_NN value"
|
#warning "Unexpected CONFIG_IDF_TARGET_NN value"
|
||||||
#define NO_ESP32_CRYPT
|
#define NO_ESP32_CRYPT
|
||||||
#define NO_WOLFSSL_ESP32_CRYPT_HASH
|
#define NO_WOLFSSL_ESP32_CRYPT_HASH
|
||||||
|
@@ -167,7 +167,7 @@ I (735) system_api: read default base MAC address from EFUSE
|
|||||||
I (755) wifi:wifi firmware version: 0d470ef
|
I (755) wifi:wifi firmware version: 0d470ef
|
||||||
I (755) wifi:wifi certification version: v7.0
|
I (755) wifi:wifi certification version: v7.0
|
||||||
I (755) wifi:config NVS flash: enabled
|
I (755) wifi:config NVS flash: enabled
|
||||||
I (755) wifi:config nano formating: disabled
|
I (755) wifi:config nano formatting: disabled
|
||||||
I (755) wifi:Init data frame dynamic rx buffer num: 32
|
I (755) wifi:Init data frame dynamic rx buffer num: 32
|
||||||
I (765) wifi:Init management frame dynamic rx buffer num: 32
|
I (765) wifi:Init management frame dynamic rx buffer num: 32
|
||||||
I (765) wifi:Init management short buffer num: 32
|
I (765) wifi:Init management short buffer num: 32
|
||||||
|
@@ -82,7 +82,7 @@ WOLFSSL_ROOT := ../../../../../../..
|
|||||||
# "/mnt/c" is 4 directories up:
|
# "/mnt/c" is 4 directories up:
|
||||||
# 2 for `./test/demo` from where we run `make`, plus
|
# 2 for `./test/demo` from where we run `make`, plus
|
||||||
# 2 more from the location of `component.mk` located
|
# 2 more from the location of `component.mk` located
|
||||||
# in `[currect directory]/components/wolfssl`.
|
# in `[current directory]/components/wolfssl`.
|
||||||
#
|
#
|
||||||
# Thus we need 4 parent reference to find the relative path to wolfSSL:
|
# Thus we need 4 parent reference to find the relative path to wolfSSL:
|
||||||
# WOLFSSL_ROOT := ../../../../workspace/wolfssl-master
|
# WOLFSSL_ROOT := ../../../../workspace/wolfssl-master
|
||||||
|
@@ -786,7 +786,7 @@
|
|||||||
/***** END CONFIG_IDF_TARGET_ESP8684 *****/
|
/***** END CONFIG_IDF_TARGET_ESP8684 *****/
|
||||||
|
|
||||||
#else
|
#else
|
||||||
/* Anything else encountered, disable HW accleration */
|
/* Anything else encountered, disable HW acceleration */
|
||||||
#warning "Unexpected CONFIG_IDF_TARGET_NN value"
|
#warning "Unexpected CONFIG_IDF_TARGET_NN value"
|
||||||
#define NO_ESP32_CRYPT
|
#define NO_ESP32_CRYPT
|
||||||
#define NO_WOLFSSL_ESP32_CRYPT_HASH
|
#define NO_WOLFSSL_ESP32_CRYPT_HASH
|
||||||
|
@@ -87,7 +87,7 @@ WOLFSSL_ESP_TASK tls_smp_client_task(void* args);
|
|||||||
|
|
||||||
/* init will create an RTOS task, otherwise server is simply function call. */
|
/* init will create an RTOS task, otherwise server is simply function call. */
|
||||||
#if defined(SINGLE_THREADED)
|
#if defined(SINGLE_THREADED)
|
||||||
/* no init neded */
|
/* no init needed */
|
||||||
#else
|
#else
|
||||||
WOLFSSL_ESP_TASK tls_smp_client_init(void* args);
|
WOLFSSL_ESP_TASK tls_smp_client_init(void* args);
|
||||||
#endif
|
#endif
|
||||||
|
@@ -103,7 +103,7 @@
|
|||||||
** the config you want - ie #define EXAMPLE_WIFI_SSID "mywifissid"
|
** the config you want - ie #define EXAMPLE_WIFI_SSID "mywifissid"
|
||||||
*/
|
*/
|
||||||
#if defined(CONFIG_ESP_WIFI_SSID)
|
#if defined(CONFIG_ESP_WIFI_SSID)
|
||||||
/* tyically from ESP32 with ESP-IDF v4 ot v5 */
|
/* tyically from ESP32 with ESP-IDF v4 to v5 */
|
||||||
#define EXAMPLE_ESP_WIFI_SSID CONFIG_ESP_WIFI_SSID
|
#define EXAMPLE_ESP_WIFI_SSID CONFIG_ESP_WIFI_SSID
|
||||||
#elif defined(CONFIG_EXAMPLE_WIFI_SSID)
|
#elif defined(CONFIG_EXAMPLE_WIFI_SSID)
|
||||||
/* typically from ESP8266 rtos-sdk/v3.4 */
|
/* typically from ESP8266 rtos-sdk/v3.4 */
|
||||||
|
@@ -218,7 +218,7 @@ int set_time_from_string(const char* time_buffer)
|
|||||||
&day, &hour, &minute, &second, &year, &offset);
|
&day, &hour, &minute, &second, &year, &offset);
|
||||||
|
|
||||||
if (ret == 8) {
|
if (ret == 8) {
|
||||||
/* we found a match for all componets */
|
/* we found a match for all components */
|
||||||
|
|
||||||
const char *months[] = { "Jan", "Feb", "Mar", "Apr", "May", "Jun",
|
const char *months[] = { "Jan", "Feb", "Mar", "Apr", "May", "Jun",
|
||||||
"Jul", "Aug", "Sep", "Oct", "Nov", "Dec"
|
"Jul", "Aug", "Sep", "Oct", "Nov", "Dec"
|
||||||
@@ -282,7 +282,7 @@ int set_time(void)
|
|||||||
esp_show_current_datetime();
|
esp_show_current_datetime();
|
||||||
|
|
||||||
#ifdef LIBWOLFSSL_VERSION_GIT_HASH_DATE
|
#ifdef LIBWOLFSSL_VERSION_GIT_HASH_DATE
|
||||||
/* initialy set a default approximate time from recent git commit */
|
/* initially set a default approximate time from recent git commit */
|
||||||
ESP_LOGI(TAG, "Found git hash date, attempting to set system date: %s",
|
ESP_LOGI(TAG, "Found git hash date, attempting to set system date: %s",
|
||||||
LIBWOLFSSL_VERSION_GIT_HASH_DATE);
|
LIBWOLFSSL_VERSION_GIT_HASH_DATE);
|
||||||
set_time_from_string(LIBWOLFSSL_VERSION_GIT_HASH_DATE"\0");
|
set_time_from_string(LIBWOLFSSL_VERSION_GIT_HASH_DATE"\0");
|
||||||
|
@@ -325,7 +325,7 @@ int wifi_init_sta(void)
|
|||||||
.ssid = EXAMPLE_ESP_WIFI_SSID,
|
.ssid = EXAMPLE_ESP_WIFI_SSID,
|
||||||
.password = EXAMPLE_ESP_WIFI_PASS,
|
.password = EXAMPLE_ESP_WIFI_PASS,
|
||||||
/* Authmode threshold resets to WPA2 as default if password matches
|
/* Authmode threshold resets to WPA2 as default if password matches
|
||||||
* WPA2 standards (pasword len => 8). If you want to connect the
|
* WPA2 standards (password len => 8). If you want to connect the
|
||||||
* device to deprecated WEP/WPA networks, Please set the threshold
|
* device to deprecated WEP/WPA networks, Please set the threshold
|
||||||
* value WIFI_AUTH_WEP/WIFI_AUTH_WPA_PSK and set the password with
|
* value WIFI_AUTH_WEP/WIFI_AUTH_WPA_PSK and set the password with
|
||||||
* length and format matching to WIFI_AUTH_WEP/WIFI_AUTH_WPA_PSK
|
* length and format matching to WIFI_AUTH_WEP/WIFI_AUTH_WPA_PSK
|
||||||
|
@@ -82,7 +82,7 @@ After the server exits, remove the port proxy forward:
|
|||||||
netsh interface portproxy delete v4tov4 listenport=11111 listenaddress=0.0.0.0
|
netsh interface portproxy delete v4tov4 listenport=11111 listenaddress=0.0.0.0
|
||||||
```
|
```
|
||||||
|
|
||||||
Cipers to consider
|
Ciphers to consider
|
||||||
|
|
||||||
```
|
```
|
||||||
TLS13-AES128-GCM-SHA256:
|
TLS13-AES128-GCM-SHA256:
|
||||||
|
@@ -167,7 +167,7 @@ I (735) system_api: read default base MAC address from EFUSE
|
|||||||
I (755) wifi:wifi firmware version: 0d470ef
|
I (755) wifi:wifi firmware version: 0d470ef
|
||||||
I (755) wifi:wifi certification version: v7.0
|
I (755) wifi:wifi certification version: v7.0
|
||||||
I (755) wifi:config NVS flash: enabled
|
I (755) wifi:config NVS flash: enabled
|
||||||
I (755) wifi:config nano formating: disabled
|
I (755) wifi:config nano formatting: disabled
|
||||||
I (755) wifi:Init data frame dynamic rx buffer num: 32
|
I (755) wifi:Init data frame dynamic rx buffer num: 32
|
||||||
I (765) wifi:Init management frame dynamic rx buffer num: 32
|
I (765) wifi:Init management frame dynamic rx buffer num: 32
|
||||||
I (765) wifi:Init management short buffer num: 32
|
I (765) wifi:Init management short buffer num: 32
|
||||||
|
@@ -786,7 +786,7 @@
|
|||||||
/***** END CONFIG_IDF_TARGET_ESP8684 *****/
|
/***** END CONFIG_IDF_TARGET_ESP8684 *****/
|
||||||
|
|
||||||
#else
|
#else
|
||||||
/* Anything else encountered, disable HW accleration */
|
/* Anything else encountered, disable HW acceleration */
|
||||||
#warning "Unexpected CONFIG_IDF_TARGET_NN value"
|
#warning "Unexpected CONFIG_IDF_TARGET_NN value"
|
||||||
#define NO_ESP32_CRYPT
|
#define NO_ESP32_CRYPT
|
||||||
#define NO_WOLFSSL_ESP32_CRYPT_HASH
|
#define NO_WOLFSSL_ESP32_CRYPT_HASH
|
||||||
|
@@ -53,7 +53,7 @@ WOLFSSL_ESP_TASK tls_smp_server_task(void *args);
|
|||||||
|
|
||||||
/* init will create an RTOS task, otherwise server is simply function call. */
|
/* init will create an RTOS task, otherwise server is simply function call. */
|
||||||
#if defined(SINGLE_THREADED)
|
#if defined(SINGLE_THREADED)
|
||||||
/* no init neded */
|
/* no init needed */
|
||||||
#else
|
#else
|
||||||
WOLFSSL_ESP_TASK tls_smp_server_init(void* args);
|
WOLFSSL_ESP_TASK tls_smp_server_init(void* args);
|
||||||
#endif
|
#endif
|
||||||
|
@@ -199,7 +199,7 @@ int set_time_from_string(const char* time_buffer)
|
|||||||
&day, &hour, &minute, &second, &year, &offset);
|
&day, &hour, &minute, &second, &year, &offset);
|
||||||
|
|
||||||
if (ret == 8) {
|
if (ret == 8) {
|
||||||
/* we found a match for all componets */
|
/* we found a match for all components */
|
||||||
|
|
||||||
const char *months[] = { "Jan", "Feb", "Mar", "Apr", "May", "Jun",
|
const char *months[] = { "Jan", "Feb", "Mar", "Apr", "May", "Jun",
|
||||||
"Jul", "Aug", "Sep", "Oct", "Nov", "Dec"
|
"Jul", "Aug", "Sep", "Oct", "Nov", "Dec"
|
||||||
|
@@ -324,7 +324,7 @@ int wifi_init_sta(void)
|
|||||||
.ssid = EXAMPLE_ESP_WIFI_SSID,
|
.ssid = EXAMPLE_ESP_WIFI_SSID,
|
||||||
.password = EXAMPLE_ESP_WIFI_PASS,
|
.password = EXAMPLE_ESP_WIFI_PASS,
|
||||||
/* Authmode threshold resets to WPA2 as default if password matches
|
/* Authmode threshold resets to WPA2 as default if password matches
|
||||||
* WPA2 standards (pasword len => 8). If you want to connect the
|
* WPA2 standards (password len => 8). If you want to connect the
|
||||||
* device to deprecated WEP/WPA networks, Please set the threshold
|
* device to deprecated WEP/WPA networks, Please set the threshold
|
||||||
* value WIFI_AUTH_WEP/WIFI_AUTH_WPA_PSK and set the password with
|
* value WIFI_AUTH_WEP/WIFI_AUTH_WPA_PSK and set the password with
|
||||||
* length and format matching to WIFI_AUTH_WEP/WIFI_AUTH_WPA_PSK
|
* length and format matching to WIFI_AUTH_WEP/WIFI_AUTH_WPA_PSK
|
||||||
|
@@ -786,7 +786,7 @@
|
|||||||
/***** END CONFIG_IDF_TARGET_ESP8684 *****/
|
/***** END CONFIG_IDF_TARGET_ESP8684 *****/
|
||||||
|
|
||||||
#else
|
#else
|
||||||
/* Anything else encountered, disable HW accleration */
|
/* Anything else encountered, disable HW acceleration */
|
||||||
#warning "Unexpected CONFIG_IDF_TARGET_NN value"
|
#warning "Unexpected CONFIG_IDF_TARGET_NN value"
|
||||||
#define NO_ESP32_CRYPT
|
#define NO_ESP32_CRYPT
|
||||||
#define NO_WOLFSSL_ESP32_CRYPT_HASH
|
#define NO_WOLFSSL_ESP32_CRYPT_HASH
|
||||||
|
@@ -331,7 +331,7 @@
|
|||||||
#define NO_WOLFSSL_ESP32_CRYPT_RSA_PRI
|
#define NO_WOLFSSL_ESP32_CRYPT_RSA_PRI
|
||||||
/***** END CONFIG_IDF_TARGET_ESP266 *****/
|
/***** END CONFIG_IDF_TARGET_ESP266 *****/
|
||||||
#else
|
#else
|
||||||
/* Anything else encountered, disable HW accleration */
|
/* Anything else encountered, disable HW acceleration */
|
||||||
#define NO_ESP32_CRYPT
|
#define NO_ESP32_CRYPT
|
||||||
#define NO_WOLFSSL_ESP32_CRYPT_HASH
|
#define NO_WOLFSSL_ESP32_CRYPT_HASH
|
||||||
#define NO_WOLFSSL_ESP32_CRYPT_AES
|
#define NO_WOLFSSL_ESP32_CRYPT_AES
|
||||||
@@ -359,7 +359,7 @@
|
|||||||
|
|
||||||
/* #define HASH_SIZE_LIMIT */ /* for test.c */
|
/* #define HASH_SIZE_LIMIT */ /* for test.c */
|
||||||
|
|
||||||
/* #define NO_HW_MATH_TEST */ /* Optionall turn off HW math checks */
|
/* #define NO_HW_MATH_TEST */ /* Optionally turn off HW math checks */
|
||||||
|
|
||||||
/* Optionally include alternate HW test library: alt_hw_test.h */
|
/* Optionally include alternate HW test library: alt_hw_test.h */
|
||||||
/* When enabling, the ./components/wolfssl/CMakeLists.txt file
|
/* When enabling, the ./components/wolfssl/CMakeLists.txt file
|
||||||
|
@@ -937,7 +937,7 @@
|
|||||||
</option>
|
</option>
|
||||||
<option>
|
<option>
|
||||||
<name>IarchiveOutput</name>
|
<name>IarchiveOutput</name>
|
||||||
<state>###Unitialized###</state>
|
<state>###Uninitialized###</state>
|
||||||
</option>
|
</option>
|
||||||
</data>
|
</data>
|
||||||
</settings>
|
</settings>
|
||||||
|
@@ -1593,7 +1593,7 @@
|
|||||||
</option>
|
</option>
|
||||||
<option>
|
<option>
|
||||||
<name>IlinkOutputFile</name>
|
<name>IlinkOutputFile</name>
|
||||||
<state>###Unitialized###</state>
|
<state>###Uninitialized###</state>
|
||||||
</option>
|
</option>
|
||||||
<option>
|
<option>
|
||||||
<name>IlinkDebugInfoEnable</name>
|
<name>IlinkDebugInfoEnable</name>
|
||||||
@@ -1879,7 +1879,7 @@
|
|||||||
</option>
|
</option>
|
||||||
<option>
|
<option>
|
||||||
<name>IarchiveOutput</name>
|
<name>IarchiveOutput</name>
|
||||||
<state>###Unitialized###</state>
|
<state>###Uninitialized###</state>
|
||||||
</option>
|
</option>
|
||||||
</data>
|
</data>
|
||||||
</settings>
|
</settings>
|
||||||
|
@@ -937,7 +937,7 @@
|
|||||||
</option>
|
</option>
|
||||||
<option>
|
<option>
|
||||||
<name>IarchiveOutput</name>
|
<name>IarchiveOutput</name>
|
||||||
<state>###Unitialized###</state>
|
<state>###Uninitialized###</state>
|
||||||
</option>
|
</option>
|
||||||
</data>
|
</data>
|
||||||
</settings>
|
</settings>
|
||||||
|
@@ -958,7 +958,7 @@
|
|||||||
</option>
|
</option>
|
||||||
<option>
|
<option>
|
||||||
<name>IarchiveOutput</name>
|
<name>IarchiveOutput</name>
|
||||||
<state>###Unitialized###</state>
|
<state>###Uninitialized###</state>
|
||||||
</option>
|
</option>
|
||||||
</data>
|
</data>
|
||||||
</settings>
|
</settings>
|
||||||
@@ -1627,7 +1627,7 @@
|
|||||||
</option>
|
</option>
|
||||||
<option>
|
<option>
|
||||||
<name>IlinkOutputFile</name>
|
<name>IlinkOutputFile</name>
|
||||||
<state>###Unitialized###</state>
|
<state>###Uninitialized###</state>
|
||||||
</option>
|
</option>
|
||||||
<option>
|
<option>
|
||||||
<name>IlinkDebugInfoEnable</name>
|
<name>IlinkDebugInfoEnable</name>
|
||||||
@@ -1917,7 +1917,7 @@
|
|||||||
</option>
|
</option>
|
||||||
<option>
|
<option>
|
||||||
<name>IarchiveOutput</name>
|
<name>IarchiveOutput</name>
|
||||||
<state>###Unitialized###</state>
|
<state>###Uninitialized###</state>
|
||||||
</option>
|
</option>
|
||||||
</data>
|
</data>
|
||||||
</settings>
|
</settings>
|
||||||
|
@@ -1624,7 +1624,7 @@
|
|||||||
</option>
|
</option>
|
||||||
<option>
|
<option>
|
||||||
<name>IlinkOutputFile</name>
|
<name>IlinkOutputFile</name>
|
||||||
<state>###Unitialized###</state>
|
<state>###Uninitialized###</state>
|
||||||
</option>
|
</option>
|
||||||
<option>
|
<option>
|
||||||
<name>IlinkDebugInfoEnable</name>
|
<name>IlinkDebugInfoEnable</name>
|
||||||
@@ -1914,7 +1914,7 @@
|
|||||||
</option>
|
</option>
|
||||||
<option>
|
<option>
|
||||||
<name>IarchiveOutput</name>
|
<name>IarchiveOutput</name>
|
||||||
<state>###Unitialized###</state>
|
<state>###Uninitialized###</state>
|
||||||
</option>
|
</option>
|
||||||
</data>
|
</data>
|
||||||
</settings>
|
</settings>
|
||||||
|
@@ -958,7 +958,7 @@
|
|||||||
</option>
|
</option>
|
||||||
<option>
|
<option>
|
||||||
<name>IarchiveOutput</name>
|
<name>IarchiveOutput</name>
|
||||||
<state>###Unitialized###</state>
|
<state>###Uninitialized###</state>
|
||||||
</option>
|
</option>
|
||||||
</data>
|
</data>
|
||||||
</settings>
|
</settings>
|
||||||
@@ -1627,7 +1627,7 @@
|
|||||||
</option>
|
</option>
|
||||||
<option>
|
<option>
|
||||||
<name>IlinkOutputFile</name>
|
<name>IlinkOutputFile</name>
|
||||||
<state>###Unitialized###</state>
|
<state>###Uninitialized###</state>
|
||||||
</option>
|
</option>
|
||||||
<option>
|
<option>
|
||||||
<name>IlinkDebugInfoEnable</name>
|
<name>IlinkDebugInfoEnable</name>
|
||||||
@@ -1917,7 +1917,7 @@
|
|||||||
</option>
|
</option>
|
||||||
<option>
|
<option>
|
||||||
<name>IarchiveOutput</name>
|
<name>IarchiveOutput</name>
|
||||||
<state>###Unitialized###</state>
|
<state>###Uninitialized###</state>
|
||||||
</option>
|
</option>
|
||||||
</data>
|
</data>
|
||||||
</settings>
|
</settings>
|
||||||
|
@@ -38,7 +38,7 @@ steps below to generate that code.
|
|||||||
2. Set the Project path to the wolfSSL/IDE/MPLABX16 and enter your PIC device
|
2. Set the Project path to the wolfSSL/IDE/MPLABX16 and enter your PIC device
|
||||||
into the interface.
|
into the interface.
|
||||||
|
|
||||||
3. Select MCC Clasic as the content type and click `Finish`.
|
3. Select MCC Classic as the content type and click `Finish`.
|
||||||
|
|
||||||
4. Under the Device Resources section, find the UART entry and add the UART1
|
4. Under the Device Resources section, find the UART entry and add the UART1
|
||||||
peripheral.
|
peripheral.
|
||||||
|
@@ -22,7 +22,7 @@
|
|||||||
# clean remove built files from a configuration
|
# clean remove built files from a configuration
|
||||||
# clobber remove all built files
|
# clobber remove all built files
|
||||||
# all build all configurations
|
# all build all configurations
|
||||||
# help print help mesage
|
# help print help message
|
||||||
#
|
#
|
||||||
# Targets .build-impl, .clean-impl, .clobber-impl, .all-impl, and
|
# Targets .build-impl, .clean-impl, .clobber-impl, .all-impl, and
|
||||||
# .help-impl are implemented in nbproject/makefile-impl.mk.
|
# .help-impl are implemented in nbproject/makefile-impl.mk.
|
||||||
|
@@ -67,7 +67,7 @@ The following steps explain how to generate the missing files and where to place
|
|||||||
|Thread Symbol|wolfssl_tst_thread|
|
|Thread Symbol|wolfssl_tst_thread|
|
||||||
|Thread Name|wolf_tst_thread|
|
|Thread Name|wolf_tst_thread|
|
||||||
|Thread Stack size|increase depending on your environment<br> e.g. 0xA000|
|
|Thread Stack size|increase depending on your environment<br> e.g. 0xA000|
|
||||||
|Thread MemoryAllocation|Dyamic|
|
|Thread MemoryAllocation|Dynamic|
|
||||||
|Common General Use Mutexes|Enabled|
|
|Common General Use Mutexes|Enabled|
|
||||||
|Common General Enable Backward Compatibility|Enabled|
|
|Common General Enable Backward Compatibility|Enabled|
|
||||||
|Common Memory Allocation Support Dynamic Allocation|Enabled|
|
|Common Memory Allocation Support Dynamic Allocation|Enabled|
|
||||||
|
@@ -74,7 +74,7 @@ The wolfssl Project Summary is listed below and is relevant for every project.
|
|||||||
|Thread Symbol|sce_tst_thread|
|
|Thread Symbol|sce_tst_thread|
|
||||||
|Thread Name|sce_tst_thread|
|
|Thread Name|sce_tst_thread|
|
||||||
|Thread Stack size|increase depending on your environment<br> e.g. 0xA000|
|
|Thread Stack size|increase depending on your environment<br> e.g. 0xA000|
|
||||||
|Thread MemoryAllocation|Dyamic|
|
|Thread MemoryAllocation|Dynamic|
|
||||||
|Common General Use Mutexes|Enabled|
|
|Common General Use Mutexes|Enabled|
|
||||||
|Common General Enable Backward Compatibility|Enabled|
|
|Common General Enable Backward Compatibility|Enabled|
|
||||||
|Common Memory Allocation Support Dynamic Allocation|Enabled|
|
|Common Memory Allocation Support Dynamic Allocation|Enabled|
|
||||||
|
@@ -1,7 +1,7 @@
|
|||||||
# Create/Update Signed CA
|
# Create/Update Signed CA
|
||||||
This document describes how to create/update Signed CA data that is used at an example program.
|
This document describes how to create/update Signed CA data that is used at an example program.
|
||||||
|
|
||||||
## Signed CA Creatation
|
## Signed CA Creation
|
||||||
### Generate RSA Key pair
|
### Generate RSA Key pair
|
||||||
```
|
```
|
||||||
2048 bit RSA key pair
|
2048 bit RSA key pair
|
||||||
@@ -35,5 +35,5 @@ There are multiple example keys for testing in the `example_keys` folder.
|
|||||||
|
|
|
|
||||||
+----+ rsa_private.pem an example 2048-bit rsa private key for signing CA cert
|
+----+ rsa_private.pem an example 2048-bit rsa private key for signing CA cert
|
||||||
+ rsa_public.pem an example 2048-bit rsa public key for verifying CA cert
|
+ rsa_public.pem an example 2048-bit rsa public key for verifying CA cert
|
||||||
+ generate_signCA.sh an example script to genearte signed-certificate data for the example program
|
+ generate_signCA.sh an example script to generate signed-certificate data for the example program
|
||||||
```
|
```
|
||||||
|
@@ -37,7 +37,7 @@ openssl dgst -sha256 -sign $1 -sigopt $SIGOPT -sigopt $SIGOPT2 -out ${CURRENT}/$
|
|||||||
|
|
||||||
echo Verify by private key
|
echo Verify by private key
|
||||||
openssl dgst -sha256 -prverify $1 -sigopt $SIGOPT -sigopt $SIGOPT2 -signature ${CURRENT}/${signed_file}.sign $3
|
openssl dgst -sha256 -prverify $1 -sigopt $SIGOPT -sigopt $SIGOPT2 -signature ${CURRENT}/${signed_file}.sign $3
|
||||||
echo Verifiy by public key
|
echo Verify by public key
|
||||||
openssl dgst -sha256 -verify $2 -sigopt $SIGOPT -sigopt $SIGOPT2 -signature ${CURRENT}/${signed_file}.sign $3
|
openssl dgst -sha256 -verify $2 -sigopt $SIGOPT -sigopt $SIGOPT2 -signature ${CURRENT}/${signed_file}.sign $3
|
||||||
|
|
||||||
# Convert Signed CA to c source
|
# Convert Signed CA to c source
|
||||||
|
@@ -1,7 +1,7 @@
|
|||||||
# Create/Update Signed CA
|
# Create/Update Signed CA
|
||||||
This document describes how to create/update Signed CA data that is used at an example program.
|
This document describes how to create/update Signed CA data that is used at an example program.
|
||||||
|
|
||||||
## Signed CA Creatation
|
## Signed CA Creation
|
||||||
### Generate RSA Key pair
|
### Generate RSA Key pair
|
||||||
```
|
```
|
||||||
2048 bit RSA key pair
|
2048 bit RSA key pair
|
||||||
@@ -35,5 +35,5 @@ There are multiple example keys for testing in the `example_keys` folder.
|
|||||||
|
|
|
|
||||||
+----+ rsa_private.pem an example 2048-bit rsa private key for signing CA cert
|
+----+ rsa_private.pem an example 2048-bit rsa private key for signing CA cert
|
||||||
+ rsa_public.pem an example 2048-bit rsa public key for verifying CA cert
|
+ rsa_public.pem an example 2048-bit rsa public key for verifying CA cert
|
||||||
+ generate_signCA.sh an example script to genearte signed-certificate data for the example program
|
+ generate_signCA.sh an example script to generate signed-certificate data for the example program
|
||||||
```
|
```
|
||||||
|
@@ -37,7 +37,7 @@ openssl dgst -sha256 -sign $1 -sigopt $SIGOPT -sigopt $SIGOPT2 -out ${CURRENT}/$
|
|||||||
|
|
||||||
echo Verify by private key
|
echo Verify by private key
|
||||||
openssl dgst -sha256 -prverify $1 -sigopt $SIGOPT -sigopt $SIGOPT2 -signature ${CURRENT}/${signed_file}.sign $3
|
openssl dgst -sha256 -prverify $1 -sigopt $SIGOPT -sigopt $SIGOPT2 -signature ${CURRENT}/${signed_file}.sign $3
|
||||||
echo Verifiy by public key
|
echo Verify by public key
|
||||||
openssl dgst -sha256 -verify $2 -sigopt $SIGOPT -sigopt $SIGOPT2 -signature ${CURRENT}/${signed_file}.sign $3
|
openssl dgst -sha256 -verify $2 -sigopt $SIGOPT -sigopt $SIGOPT2 -signature ${CURRENT}/${signed_file}.sign $3
|
||||||
|
|
||||||
# Convert Signed CA to c source
|
# Convert Signed CA to c source
|
||||||
|
@@ -1,7 +1,7 @@
|
|||||||
# Create/Update Signed CA
|
# Create/Update Signed CA
|
||||||
This document describes how to create/update Signed CA data that is used at an example program.
|
This document describes how to create/update Signed CA data that is used at an example program.
|
||||||
|
|
||||||
## Signed CA Creatation
|
## Signed CA Creation
|
||||||
### Generate RSA Key pair
|
### Generate RSA Key pair
|
||||||
```
|
```
|
||||||
2048 bit RSA key pair
|
2048 bit RSA key pair
|
||||||
@@ -35,5 +35,5 @@ There are multiple example keys for testing in the `example_keys` folder.
|
|||||||
|
|
|
|
||||||
+----+ rsa_private.pem an example 2048-bit rsa private key for signing CA cert
|
+----+ rsa_private.pem an example 2048-bit rsa private key for signing CA cert
|
||||||
+ rsa_public.pem an example 2048-bit rsa public key for verifying CA cert
|
+ rsa_public.pem an example 2048-bit rsa public key for verifying CA cert
|
||||||
+ generate_signCA.sh an example script to genearte signed-certificate data for the example program
|
+ generate_signCA.sh an example script to generate signed-certificate data for the example program
|
||||||
```
|
```
|
||||||
|
@@ -37,7 +37,7 @@ openssl dgst -sha256 -sign $1 -sigopt $SIGOPT -sigopt $SIGOPT2 -out ${CURRENT}/$
|
|||||||
|
|
||||||
echo Verify by private key
|
echo Verify by private key
|
||||||
openssl dgst -sha256 -prverify $1 -sigopt $SIGOPT -sigopt $SIGOPT2 -signature ${CURRENT}/${signed_file}.sign $3
|
openssl dgst -sha256 -prverify $1 -sigopt $SIGOPT -sigopt $SIGOPT2 -signature ${CURRENT}/${signed_file}.sign $3
|
||||||
echo Verifiy by public key
|
echo Verify by public key
|
||||||
openssl dgst -sha256 -verify $2 -sigopt $SIGOPT -sigopt $SIGOPT2 -signature ${CURRENT}/${signed_file}.sign $3
|
openssl dgst -sha256 -verify $2 -sigopt $SIGOPT -sigopt $SIGOPT2 -signature ${CURRENT}/${signed_file}.sign $3
|
||||||
|
|
||||||
# Convert Signed CA to c source
|
# Convert Signed CA to c source
|
||||||
|
@@ -2088,7 +2088,7 @@ int wolfSSL_get_using_nonblock(WOLFSSL*);
|
|||||||
session if the handshake has not already been performed yet by
|
session if the handshake has not already been performed yet by
|
||||||
wolfSSL_connect() or wolfSSL_accept(). When using (D)TLSv1.3 and early data
|
wolfSSL_connect() or wolfSSL_accept(). When using (D)TLSv1.3 and early data
|
||||||
feature is compiled in, this function progresses the handshake only up to
|
feature is compiled in, this function progresses the handshake only up to
|
||||||
the point when it is possible to send data. Next invokations of
|
the point when it is possible to send data. Next invocations of
|
||||||
wolfSSL_Connect()/wolfSSL_Accept()/wolfSSL_read() will complete the
|
wolfSSL_Connect()/wolfSSL_Accept()/wolfSSL_read() will complete the
|
||||||
handshake. wolfSSL_write() works with both blocking and non-blocking I/O.
|
handshake. wolfSSL_write() works with both blocking and non-blocking I/O.
|
||||||
When the underlying I/O is non-blocking, wolfSSL_write() will return when
|
When the underlying I/O is non-blocking, wolfSSL_write() will return when
|
||||||
@@ -14015,7 +14015,7 @@ int wolfSSL_write_early_data(WOLFSSL* ssl, const void* data,
|
|||||||
Call this function instead of wolfSSL_accept() or wolfSSL_accept_TLSv13()
|
Call this function instead of wolfSSL_accept() or wolfSSL_accept_TLSv13()
|
||||||
to accept a client and read any early data in the handshake. The function
|
to accept a client and read any early data in the handshake. The function
|
||||||
should be invoked until wolfSSL_is_init_finished() returns true. Early data
|
should be invoked until wolfSSL_is_init_finished() returns true. Early data
|
||||||
may be sent by the client in multiple messsages. If there is no early data
|
may be sent by the client in multiple messages. If there is no early data
|
||||||
then the handshake will be processed as normal. This function is only used
|
then the handshake will be processed as normal. This function is only used
|
||||||
with servers.
|
with servers.
|
||||||
|
|
||||||
@@ -15014,7 +15014,7 @@ WOLFSSL_CIPHERSUITE_INFO wolfSSL_get_ciphersuite_info(byte first,
|
|||||||
\param [out] sigAlgo The enum Key_Sum of the authentication algorithm
|
\param [out] sigAlgo The enum Key_Sum of the authentication algorithm
|
||||||
|
|
||||||
\return 0 when info was correctly set
|
\return 0 when info was correctly set
|
||||||
\return BAD_FUNC_ARG when either input paramters are NULL or the bytes
|
\return BAD_FUNC_ARG when either input parameters are NULL or the bytes
|
||||||
are not a recognized sigalg suite
|
are not a recognized sigalg suite
|
||||||
|
|
||||||
_Example_
|
_Example_
|
||||||
|
@@ -20150,7 +20150,7 @@ static int test_wc_AesGcmEncryptDecrypt(void)
|
|||||||
} /* END test_wc_AesGcmEncryptDecrypt */
|
} /* END test_wc_AesGcmEncryptDecrypt */
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* test function for mixed (one-shot encrpytion + stream decryption) AES GCM
|
* test function for mixed (one-shot encryption + stream decryption) AES GCM
|
||||||
* using a long IV (older FIPS does NOT support long IVs). Relates to zd15423
|
* using a long IV (older FIPS does NOT support long IVs). Relates to zd15423
|
||||||
*/
|
*/
|
||||||
static int test_wc_AesGcmMixedEncDecLongIV(void)
|
static int test_wc_AesGcmMixedEncDecLongIV(void)
|
||||||
@@ -33008,7 +33008,7 @@ static int test_wc_dilithium_verify(void)
|
|||||||
ExpectIntEQ(res, 0);
|
ExpectIntEQ(res, 0);
|
||||||
sig[100] ^= 0x80;
|
sig[100] ^= 0x80;
|
||||||
|
|
||||||
/* Set all indeces to 0. */
|
/* Set all indices to 0. */
|
||||||
XMEMSET(sig + sigLen - 4, 0, 4);
|
XMEMSET(sig + sigLen - 4, 0, 4);
|
||||||
ExpectIntEQ(wc_dilithium_verify_msg(sig, sigLen, msg, 32, &res, key),
|
ExpectIntEQ(wc_dilithium_verify_msg(sig, sigLen, msg, 32, &res, key),
|
||||||
WC_NO_ERR_TRACE(SIG_VERIFY_E));
|
WC_NO_ERR_TRACE(SIG_VERIFY_E));
|
||||||
|
Reference in New Issue
Block a user