mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2026-01-28 09:42:21 +01:00
Used codespell and fixed obvious typos.
This commit is contained in:
@@ -13475,7 +13475,7 @@ PRAGMA_GCC_DIAG_POP
|
||||
if ((cType == WOLFSSL_CERT_TYPE_RPK && !args->dCert->isRPK) ||
|
||||
(cType == WOLFSSL_CERT_TYPE_X509 && args->dCert->isRPK)) {
|
||||
/* cert type mismatch */
|
||||
WOLFSSL_MSG("unsuported certificate type received");
|
||||
WOLFSSL_MSG("unsupported certificate type received");
|
||||
ret = UNSUPPORTED_CERTIFICATE;
|
||||
}
|
||||
}
|
||||
@@ -13486,7 +13486,7 @@ PRAGMA_GCC_DIAG_POP
|
||||
if ((cType == WOLFSSL_CERT_TYPE_RPK && !args->dCert->isRPK) ||
|
||||
(cType == WOLFSSL_CERT_TYPE_X509 && args->dCert->isRPK)) {
|
||||
/* cert type mismatch */
|
||||
WOLFSSL_MSG("unsuported certificate type received");
|
||||
WOLFSSL_MSG("unsupported certificate type received");
|
||||
ret = UNSUPPORTED_CERTIFICATE;
|
||||
}
|
||||
}
|
||||
|
||||
@@ -726,7 +726,7 @@ int CM_VerifyBuffer_ex(WOLFSSL_CERT_MANAGER* cm, const unsigned char* buff,
|
||||
* WOLFSSL_FILETYPE_ASN1, WOLFSSL_FILETYPE_PEM.
|
||||
* @param [in] prev_err Previous error. Passed to callback.
|
||||
* @return WOLFSSL_SUCCESS on success.
|
||||
* @return BAD_FUNC_ARG when cm or buff is NULL ot sz is negative or zero.
|
||||
* @return BAD_FUNC_ARG when cm or buff is NULL or sz is negative or zero.
|
||||
* @return WOLFSSL_BAD_FILETYPE when format is invalid.
|
||||
* @return MEMORY_E when dynamic memory allocation fails.
|
||||
* @return NOT_COMPILED_IN when converting from PEM to DER is not a feature of
|
||||
@@ -768,7 +768,7 @@ int wolfSSL_CertManagerVerifyBuffer(WOLFSSL_CERT_MANAGER* cm,
|
||||
* WOLFSSL_FILETYPE_ASN1, WOLFSSL_FILETYPE_PEM.
|
||||
* @param [in] prev_err Previous error. Passed to callback.
|
||||
* @return WOLFSSL_SUCCESS on success.
|
||||
* @return BAD_FUNC_ARG when cm or buff is NULL ot sz is negative.
|
||||
* @return BAD_FUNC_ARG when cm or buff is NULL or sz is negative.
|
||||
* @return WOLFSSL_BAD_FILETYPE when format is invalid.
|
||||
* @return WOLFSSL_BAD_FILE when reading the certificate file fails.
|
||||
* @return MEMORY_E when dynamic memory allocation fails.
|
||||
@@ -2332,7 +2332,7 @@ int wolfSSL_CertManagerSetOCSPOverrideURL(WOLFSSL_CERT_MANAGER* cm,
|
||||
* @param [in] cm Certificate manager.
|
||||
* @param [in] ioCb OCSP callback.
|
||||
* @param [in] respFreeCb Callback to free OCSP response buffer.
|
||||
* @param [in] ioCbCtx Context daa to pass to OCSP callbacks.
|
||||
* @param [in] ioCbCtx Context data to pass to OCSP callbacks.
|
||||
* @return WOLFSSL_SUCCESS on success.
|
||||
* @return BAD_FUNC_ARG when cm is NULL.
|
||||
*/
|
||||
|
||||
@@ -10774,7 +10774,7 @@ static int GetCommonItem(const byte* a, byte aLen, const byte* b, byte bLen,
|
||||
}
|
||||
|
||||
/* Creates a "client certificate type" extension if necessary.
|
||||
* Returns 0 if no error occured, negative value otherwise.
|
||||
* Returns 0 if no error occurred, negative value otherwise.
|
||||
* A return of 0, it does not indicae that the extension was created.
|
||||
*/
|
||||
static int TLSX_ClientCertificateType_Use(WOLFSSL* ssl, byte isServer)
|
||||
@@ -11029,7 +11029,7 @@ static int TLSX_ClientCertificateType_GetSize(WOLFSSL* ssl, byte msgType)
|
||||
/* Server_Certificate_Type extension */
|
||||
/******************************************************************************/
|
||||
/* Creates a "server certificate type" extension if necessary.
|
||||
* Returns 0 if no error occured, negative value otherwise.
|
||||
* Returns 0 if no error occurred, negative value otherwise.
|
||||
* A return of 0, it does not indicae that the extension was created.
|
||||
*/
|
||||
static int TLSX_ServerCertificateType_Use(WOLFSSL* ssl, byte isServer)
|
||||
|
||||
Reference in New Issue
Block a user