From 565da768a4e8c4769825a411a22501ef6c5a9829 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Manuel=20P=C3=A9gouri=C3=A9-Gonnard?= Date: Tue, 20 Aug 2024 10:58:20 +0200 Subject: [PATCH] Fix typos in comments MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Co-authored-by: David Horstmann Signed-off-by: Manuel Pégourié-Gonnard --- library/ssl_misc.h | 2 +- library/ssl_tls.c | 6 +++--- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/library/ssl_misc.h b/library/ssl_misc.h index e04f4ee446..762c478328 100644 --- a/library/ssl_misc.h +++ b/library/ssl_misc.h @@ -1686,7 +1686,7 @@ static inline mbedtls_x509_crt *mbedtls_ssl_own_cert(mbedtls_ssl_context *ssl) * leave NULL for no restartable behaviour. * * Return: - * - 0 if the certificate is the handshake should continue. Depending on the + * - 0 if the handshake should continue. Depending on the * authmode it means: * - REQUIRED: the certificate was found to be valid, trusted & acceptable. * ssl->session_negotiate->verify_result is 0. diff --git a/library/ssl_tls.c b/library/ssl_tls.c index b2fdcaaee3..2cff7a9fd3 100644 --- a/library/ssl_tls.c +++ b/library/ssl_tls.c @@ -6386,7 +6386,7 @@ int mbedtls_ssl_check_cert_usage(const mbedtls_x509_crt *cert, } else #endif { - /* This is either TLS 1.3 autentication, which always uses signatures, + /* This is either TLS 1.3 authentication, which always uses signatures, * or 1.2 client auth: rsa_sign and mbedtls_ecdsa_sign are the only * options we implement, both using signatures. */ (void) tls_version; @@ -8055,8 +8055,8 @@ int mbedtls_ssl_verify_certificate(mbedtls_ssl_context *ssl, } } - /* With authmode optional, we want to keep going it the certificate was - * unacceptable, but still fail on other error (out of memory etc), + /* With authmode optional, we want to keep going if the certificate was + * unacceptable, but still fail on other errors (out of memory etc), * including fatal errors from the f_vrfy callback. * * The only acceptable errors are: