mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2025-07-29 11:41:15 +03:00
Fix additional misspellings found by codespell
Remaining hits seem to be hex data, certificates, and other miscellaneous exceptions. List generated by running codespell -w -L keypair,Keypair,KeyPair,keyPair,ciph,nd Signed-off-by: Andrzej Kurek <andrzej.kurek@arm.com>
This commit is contained in:
committed by
Dave Rodgman
parent
e27e96dd5d
commit
5c65c5781f
@ -4810,7 +4810,7 @@ static psa_status_t psa_generate_derived_ecc_key_weierstrass_helper(
|
||||
|
||||
/* 4. If k > N - 2, discard the result and return to step 1.
|
||||
* Result of comparison is returned. When it indicates error
|
||||
* then this fuction is called again.
|
||||
* then this function is called again.
|
||||
*/
|
||||
MBEDTLS_MPI_CHK( mbedtls_mpi_lt_mpi_ct( &diff_N_2, &k, &key_out_of_range ) );
|
||||
}
|
||||
|
@ -1854,7 +1854,7 @@ static inline int mbedtls_ssl_tls12_named_group_is_ecdhe( uint16_t named_group )
|
||||
named_group == MBEDTLS_SSL_IANA_TLS_GROUP_BP384R1 ||
|
||||
named_group == MBEDTLS_SSL_IANA_TLS_GROUP_BP512R1 ||
|
||||
named_group == MBEDTLS_SSL_IANA_TLS_GROUP_X448 ||
|
||||
/* Below deprected curves should be removed with notice to users */
|
||||
/* Below deprecated curves should be removed with notice to users */
|
||||
named_group == MBEDTLS_SSL_IANA_TLS_GROUP_SECP192K1 ||
|
||||
named_group == MBEDTLS_SSL_IANA_TLS_GROUP_SECP192R1 ||
|
||||
named_group == MBEDTLS_SSL_IANA_TLS_GROUP_SECP224K1 ||
|
||||
@ -2167,7 +2167,7 @@ static inline int mbedtls_ssl_sig_alg_is_supported(
|
||||
#endif /* MBEDTLS_SSL_PROTO_TLS1_2 && MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED */
|
||||
#if defined(MBEDTLS_USE_PSA_CRYPTO)
|
||||
/* Corresponding PSA algorithm for MBEDTLS_CIPHER_NULL.
|
||||
* Same value is used fo PSA_ALG_CATEGORY_CIPHER, hence it is
|
||||
* Same value is used for PSA_ALG_CATEGORY_CIPHER, hence it is
|
||||
* guaranteed to not be a valid PSA algorithm identifier.
|
||||
*/
|
||||
#define MBEDTLS_SSL_NULL_CIPHER 0x04000000
|
||||
|
@ -2918,7 +2918,7 @@ static int ssl_prepare_handshake_step( mbedtls_ssl_context *ssl )
|
||||
* In the case of TLS 1.3, handshake step handlers do not send data to the
|
||||
* peer. Data are only sent here and through
|
||||
* `mbedtls_ssl_handle_pending_alert` in case an error that triggered an
|
||||
* alert occured.
|
||||
* alert occurred.
|
||||
*/
|
||||
if( ( ret = mbedtls_ssl_flush_output( ssl ) ) != 0 )
|
||||
return( ret );
|
||||
|
@ -982,7 +982,7 @@ static int ssl_tls13_get_sig_alg_from_pk( mbedtls_ssl_context *ssl,
|
||||
#endif /* MBEDTLS_RSA_C */
|
||||
default:
|
||||
MBEDTLS_SSL_DEBUG_MSG( 1,
|
||||
( "unkown signature type : %u", sig ) );
|
||||
( "unknown signature type : %u", sig ) );
|
||||
break;
|
||||
}
|
||||
return( -1 );
|
||||
|
Reference in New Issue
Block a user