From 52f91e4ab91684afc60d6abe113dd91fd7ec0456 Mon Sep 17 00:00:00 2001 From: Dimitri Papadopoulos <3234522+DimitriPapadopoulos@users.noreply.github.com> Date: Fri, 28 Jul 2023 09:29:28 +0200 Subject: [PATCH] Fix residual typos found by codespell --- ChangeLog.md | 2 +- .../e2studio/RA6M4/test/key_data/key_data.h | 2 +- mcapi/mcapi_test.c | 14 +++++++------- wrapper/Ada/README.md | 4 ++-- 4 files changed, 11 insertions(+), 11 deletions(-) diff --git a/ChangeLog.md b/ChangeLog.md index 440c52d0a4..c48787b3ca 100644 --- a/ChangeLog.md +++ b/ChangeLog.md @@ -3255,7 +3255,7 @@ More info can be found on-line at //http://wolfssl.com/yaSSL/Docs.html a) If using wolfSSL for DTLS on the server side of a publicly accessible machine you MUST update. b) If using wolfSSL for TLS on the server side with private RSA keys allowing - ephemeral key exchange without low memory optimziations you MUST update and + ephemeral key exchange without low memory optimizations you MUST update and regenerate the private RSA keys. Please see https://www.wolfssl.com/wolfSSL/Blog/Blog.html for more details diff --git a/IDE/Renesas/e2studio/RA6M4/test/key_data/key_data.h b/IDE/Renesas/e2studio/RA6M4/test/key_data/key_data.h index 5df3793354..3ac56441bc 100644 --- a/IDE/Renesas/e2studio/RA6M4/test/key_data/key_data.h +++ b/IDE/Renesas/e2studio/RA6M4/test/key_data/key_data.h @@ -6,7 +6,7 @@ /** Firmware update data and user key data */ typedef struct user_key_block_data { - /* Provisioning key wapped by Renesas DLM */ + /* Provisioning key wrapped by Renesas DLM */ uint8_t encrypted_provisioning_key[HW_SCE_AES_CBC_IV_BYTE_SIZE * 2]; /* Initial vector to be used when creating encrypted key */ uint8_t iv[HW_SCE_AES_CBC_IV_BYTE_SIZE]; diff --git a/mcapi/mcapi_test.c b/mcapi/mcapi_test.c index 3e79de2ff4..7e5acbc08f 100644 --- a/mcapi/mcapi_test.c +++ b/mcapi/mcapi_test.c @@ -311,7 +311,7 @@ static int check_sha256(void) } if (memcmp(mcDigest, defDigest, CRYPT_SHA256_DIGEST_SIZE) != 0) { - printf("sha256 final memcmp fialed\n"); + printf("sha256 final memcmp failed\n"); return -1; } printf("sha256 mcapi test passed\n"); @@ -351,7 +351,7 @@ static int check_sha384(void) } if (memcmp(mcDigest, defDigest, CRYPT_SHA384_DIGEST_SIZE) != 0) { - printf("sha384 final memcmp fialed\n"); + printf("sha384 final memcmp failed\n"); return -1; } printf("sha384 mcapi test passed\n"); @@ -391,7 +391,7 @@ static int check_sha512(void) } if (memcmp(mcDigest, defDigest, CRYPT_SHA512_DIGEST_SIZE) != 0) { - printf("sha512 final memcmp fialed\n"); + printf("sha512 final memcmp failed\n"); return -1; } printf("sha512 mcapi test passed\n"); @@ -434,7 +434,7 @@ static int check_hmac(void) } if (memcmp(mcDigest, defDigest, CRYPT_SHA_DIGEST_SIZE) != 0) { - printf("hmac sha final memcmp fialed\n"); + printf("hmac sha final memcmp failed\n"); return -1; } printf("hmac sha mcapi test passed\n"); @@ -462,7 +462,7 @@ static int check_hmac(void) } if (memcmp(mcDigest, defDigest, CRYPT_SHA256_DIGEST_SIZE) != 0) { - printf("hmac sha256 final memcmp fialed\n"); + printf("hmac sha256 final memcmp failed\n"); return -1; } printf("hmac sha256 mcapi test passed\n"); @@ -490,7 +490,7 @@ static int check_hmac(void) } if (memcmp(mcDigest, defDigest, CRYPT_SHA384_DIGEST_SIZE) != 0) { - printf("hmac sha384 final memcmp fialed\n"); + printf("hmac sha384 final memcmp failed\n"); return -1; } printf("hmac sha384 mcapi test passed\n"); @@ -518,7 +518,7 @@ static int check_hmac(void) } if (memcmp(mcDigest, defDigest, CRYPT_SHA512_DIGEST_SIZE) != 0) { - printf("hmac sha512 final memcmp fialed\n"); + printf("hmac sha512 final memcmp failed\n"); return -1; } printf("hmac sha512 mcapi test passed\n"); diff --git a/wrapper/Ada/README.md b/wrapper/Ada/README.md index 67c73c4c0d..f1696f2619 100644 --- a/wrapper/Ada/README.md +++ b/wrapper/Ada/README.md @@ -7,7 +7,7 @@ using the WolfSSL Ada binding. The implementation is cross-platform and compiles on Linux, Mac OS X and Windows. Security: The WolfSSL Ada binding avoids usage of the -Seconday Stack. The GNAT compiler has a number of hardening +Secondary Stack. The GNAT compiler has a number of hardening features for example Stack Scrubbing; the compiler can generate code to zero-out stack frames used by subprograms. Unfortunately this works well for the primary stack but not @@ -108,4 +108,4 @@ found in the files: spark_sockets.ads spark_sockets.adb spark_terminal.ads -spark_terminal.adb \ No newline at end of file +spark_terminal.adb