diff --git a/ChangeLog.md b/ChangeLog.md index 89959661d5..5e4591149e 100644 --- a/ChangeLog.md +++ b/ChangeLog.md @@ -23,7 +23,7 @@ NOTE: * --enable-heapmath is being deprecated and will be removed by 2024 * Added LMS/HSS and XMSS/XMSS^MT wolfcrypt hooks, both normal and verify-only options. * Added support for the AES EAX mode of operation * Port for use with Hitch (https://github.com/varnish/hitch) added -* Add XTS API's to handle multiple sectors in new port ot VeraCrypt +* Add XTS API's to handle multiple sectors in new port to VeraCrypt ## Enhancements and Optimizations diff --git a/IDE/CRYPTOCELL/main.c b/IDE/CRYPTOCELL/main.c index cc596fe8fb..7938d0dfae 100644 --- a/IDE/CRYPTOCELL/main.c +++ b/IDE/CRYPTOCELL/main.c @@ -27,7 +27,7 @@ /* wolfCrypt_Init/wolfCrypt_Cleanup to turn CryptoCell hardware on/off */ #include -/* SEGGER_RTT_Init, you can potential replace it with other serial terminal */ +/* SEGGER_RTT_Init, you can potentially replace it with other serial terminal */ #include "SEGGER_RTT.h" int main(void) diff --git a/IDE/Espressif/ESP-IDF/examples/wolfssl_client/components/wolfssl/CMakeLists.txt b/IDE/Espressif/ESP-IDF/examples/wolfssl_client/components/wolfssl/CMakeLists.txt index b5ee75c613..2f1e9e4111 100644 --- a/IDE/Espressif/ESP-IDF/examples/wolfssl_client/components/wolfssl/CMakeLists.txt +++ b/IDE/Espressif/ESP-IDF/examples/wolfssl_client/components/wolfssl/CMakeLists.txt @@ -206,7 +206,7 @@ else() "\"${WOLFSSL_ROOT}/wolfcrypt/src\"" "\"${WOLFSSL_ROOT}/wolfcrypt/src/port/Espressif\"" "\"${WOLFSSL_ROOT}/wolfcrypt/src/port/atmel\"" - # TODO: Make this a univeral makefile that detects if bechmark / test needed + # TODO: Make this a universal makefile that detects if benchmark / test needed # Sometimes problematic with SM; consider gating detection. #"\"${WOLFSSL_ROOT}/wolfcrypt/benchmark\"" # the benchmark application #"\"${WOLFSSL_ROOT}/wolfcrypt/test\"" # the test application diff --git a/IDE/Espressif/ESP-IDF/examples/wolfssl_server/components/wolfssl/CMakeLists.txt b/IDE/Espressif/ESP-IDF/examples/wolfssl_server/components/wolfssl/CMakeLists.txt index b5ee75c613..2f1e9e4111 100644 --- a/IDE/Espressif/ESP-IDF/examples/wolfssl_server/components/wolfssl/CMakeLists.txt +++ b/IDE/Espressif/ESP-IDF/examples/wolfssl_server/components/wolfssl/CMakeLists.txt @@ -206,7 +206,7 @@ else() "\"${WOLFSSL_ROOT}/wolfcrypt/src\"" "\"${WOLFSSL_ROOT}/wolfcrypt/src/port/Espressif\"" "\"${WOLFSSL_ROOT}/wolfcrypt/src/port/atmel\"" - # TODO: Make this a univeral makefile that detects if bechmark / test needed + # TODO: Make this a universal makefile that detects if benchmark / test needed # Sometimes problematic with SM; consider gating detection. #"\"${WOLFSSL_ROOT}/wolfcrypt/benchmark\"" # the benchmark application #"\"${WOLFSSL_ROOT}/wolfcrypt/test\"" # the test application diff --git a/IDE/Espressif/ESP-IDF/examples/wolfssl_test/main/main.c b/IDE/Espressif/ESP-IDF/examples/wolfssl_test/main/main.c index 63aaaf27e4..bcf220d8e2 100644 --- a/IDE/Espressif/ESP-IDF/examples/wolfssl_test/main/main.c +++ b/IDE/Espressif/ESP-IDF/examples/wolfssl_test/main/main.c @@ -241,6 +241,6 @@ void app_main(void) #else vTaskDelay(60000); #endif - } /* done whle */ + } /* done while */ #endif } diff --git a/IDE/Renesas/cs+/Projects/t4_demo/README_en.txt b/IDE/Renesas/cs+/Projects/t4_demo/README_en.txt index 492d2c7f37..6e2a3bcc44 100644 --- a/IDE/Renesas/cs+/Projects/t4_demo/README_en.txt +++ b/IDE/Renesas/cs+/Projects/t4_demo/README_en.txt @@ -12,7 +12,7 @@ Setup process: - Unzip wolfssl under the same directory 2. Set up wolfSSL - - open wolfssl\IDE\Renesas\cs+\Projec/wolfssl\lib.mtpj with CS+ and build + - open wolfssl\IDE\Renesas\cs+\Projects\wolfssl\lib.mtpj with CS+ and build - open t4_demo.mtpj and build. This create demo program library. 3. Set up AlphaProject diff --git a/IDE/Renesas/e2studio/RZN2L/README.md b/IDE/Renesas/e2studio/RZN2L/README.md index 8433702da4..55df4f2c15 100644 --- a/IDE/Renesas/e2studio/RZN2L/README.md +++ b/IDE/Renesas/e2studio/RZN2L/README.md @@ -152,7 +152,7 @@ $./examples/server/server -b -d -i -v 4 + For ECDSA sign and verify use, Enable the `USE_CERT_BUFFER_256` macro in `wolfssl_demo.h` -Disble the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h` +Disable the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h` + launch server with the following option. ``` @@ -214,7 +214,7 @@ $./examples/server/server -b -d -i -v 3 + For ECDSA sign and verify use, Enable the `USE_CERT_BUFFER_256` macro in `wolfssl_demo.h` -Disble the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h` +Disable the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h` + launch server with the following option. ``` @@ -281,7 +281,7 @@ static const byte ucIPAddress[4] = { 192, 168, 11, 241 }; + For ECDSA sign and verify use, Enable the `USE_CERT_BUFFER_256` macro in `wolfssl_demo.h` -Disble the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h` +Disable the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h` + launch server from e2studio @@ -311,7 +311,7 @@ Cleaning up socket and wolfSSL objects. Waiting connection.... ``` -You will see the follwoing message on Linux terminal. +You will see the following message on Linux terminal. ``` $ ./examples/client/client -h 192.168.11.241 -p 11111 -v 4 SSL version is TLSv1.3 @@ -333,7 +333,7 @@ Received: hello wolfssl! Cleaning up socket and wolfSSL objects. Waiting connection.... ``` -You will see the follwoing message on Linux terminal. +You will see the following message on Linux terminal. ``` $ ./examples/client/client -h 192.168.11.241 -p 11111 -v 4 -A ./certs/ca-ecc-cert.pem -c ./certs/client-ecc-cert.pem -k ./cert s/ecc-client-key.pem @@ -359,7 +359,7 @@ static const byte ucIPAddress[4] = { 192, 168, 11, 241 }; + For ECDSA sign and verify use, Enable the `USE_CERT_BUFFER_256` macro in `wolfssl_demo.h` -Disble the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h` +Disable the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h` + launch server from e2studio @@ -389,7 +389,7 @@ Cleaning up socket and wolfSSL objects. Waiting connection.... ``` -You will see the follwoing message on Linux terminal. +You will see the following message on Linux terminal. ``` $ ./examples/client/client -h 192.168.11.241 -p 11111 -v 3 SSL version is TLSv1.2 @@ -411,7 +411,7 @@ Received: hello wolfssl! Cleaning up socket and wolfSSL objects. Waiting connection.... ``` -You will see the follwoing message on Linux terminal. +You will see the following message on Linux terminal. ``` $ ./examples/client/client -h 192.168.11.241 -p 11111 -v 3 -A ./certs/ca-ecc-cert.pem -c ./certs/client-ecc-cert.pem -k ./certs/ecc-client-key.pem SSL version is TLSv1.2 diff --git a/IDE/Renesas/e2studio/RZN2L/test/src/rzn2l_tst_thread_entry.c b/IDE/Renesas/e2studio/RZN2L/test/src/rzn2l_tst_thread_entry.c index 14152aa825..0e4c459ed0 100644 --- a/IDE/Renesas/e2studio/RZN2L/test/src/rzn2l_tst_thread_entry.c +++ b/IDE/Renesas/e2studio/RZN2L/test/src/rzn2l_tst_thread_entry.c @@ -131,7 +131,7 @@ void RSIP_KeyGeneration(FSPSM_ST *g) } /* only pointer sets to NULL */ -/* onwer of keys should be freed */ +/* owner of keys should be freed */ void Clr_CallbackCtx(FSPSM_ST *g) { (void) g; diff --git a/README b/README index f645c3e8d4..ff86035e43 100644 --- a/README +++ b/README @@ -95,7 +95,7 @@ NOTE: * --enable-heapmath is being deprecated and will be removed by 2024 * Added LMS/HSS and XMSS/XMSS^MT wolfcrypt hooks, both normal and verify-only options. * Added support for the AES EAX mode of operation * Port for use with Hitch (https://github.com/varnish/hitch) added -* Add XTS API's to handle multiple sectors in new port ot VeraCrypt +* Add XTS API's to handle multiple sectors in new port to VeraCrypt ## Enhancements and Optimizations diff --git a/README.md b/README.md index 0472d6bd9a..c16642b9cc 100644 --- a/README.md +++ b/README.md @@ -100,7 +100,7 @@ NOTE: * --enable-heapmath is being deprecated and will be removed by 2024 * Added LMS/HSS and XMSS/XMSS^MT wolfcrypt hooks, both normal and verify-only options. * Added support for the AES EAX mode of operation * Port for use with Hitch (https://github.com/varnish/hitch) added -* Add XTS API's to handle multiple sectors in new port ot VeraCrypt +* Add XTS API's to handle multiple sectors in new port to VeraCrypt ## Enhancements and Optimizations diff --git a/doc/dox_comments/header_files/aes.h b/doc/dox_comments/header_files/aes.h index bbdee91e56..5f1610f76e 100644 --- a/doc/dox_comments/header_files/aes.h +++ b/doc/dox_comments/header_files/aes.h @@ -1533,7 +1533,7 @@ WOLFSSL_API int wc_AesEaxEncryptFinal(AesEax* eax, \ref wc_AesEaxInit. When done using the \c AesEax context structure, make sure to free it using \ref wc_AesEaxFree. - \return 0 if data is authenticated succesfully + \return 0 if data is authenticated successfully \return AES_EAX_AUTH_E if the authentication tag does not match the supplied authentication code vector \c authIn \return other error code on failure diff --git a/examples/server/server.h b/examples/server/server.h index dbf492b13d..e0c8ad7bab 100644 --- a/examples/server/server.h +++ b/examples/server/server.h @@ -27,7 +27,7 @@ THREAD_RETURN WOLFSSL_THREAD server_test(void* args); /* Echo bytes using buffer of blockSize until [echoData] bytes are complete. */ -/* If [bechmarkThroughput] set the statistcs will be output at the end */ +/* If [benchmarkThroughput] set the statistics will be output at the end */ int ServerEchoData(WOLFSSL* ssl, int clientfd, int echoData, int blockSize, size_t benchmarkThroughput); diff --git a/src/internal.c b/src/internal.c index 4dae1b960c..cd478b9a03 100644 --- a/src/internal.c +++ b/src/internal.c @@ -20394,7 +20394,7 @@ int ProcessReplyEx(WOLFSSL* ssl, int allowSocketErr) case getRecordLayerHeader: /* DTLSv1.3 record numbers in the header are encrypted, and AAD - * uses the unecrypted form. Because of this we need to modify the + * uses the unencrypted form. Because of this we need to modify the * header, decrypting the numbers inside * DtlsParseUnifiedRecordLayer(). This violates the const attribute * of the buffer parameter of GetRecordHeader() used here. */ diff --git a/src/ssl.c b/src/ssl.c index 2d56dcf85d..49547acf5e 100644 --- a/src/ssl.c +++ b/src/ssl.c @@ -8432,7 +8432,7 @@ static int LoadSystemCaCertsWindows(WOLFSSL_CTX* ctx, byte* loaded) * directly into wolfSSL "the old way". * * As of MacOS 14.0 we are still able to use this method to access system - * certificates. Accessiblity of this API is indicated by the presence of the + * certificates. Accessibility of this API is indicated by the presence of the * Security/SecTrustSettings.h header. In the likely event that Apple removes * access to this API on Macs, this function should be removed and the * DoAppleNativeCertValidation() routine should be used for all devices. @@ -8579,7 +8579,7 @@ int wolfSSL_CTX_load_system_CA_certs(WOLFSSL_CTX* ctx) #if defined(HAVE_SECURITY_SECTRUSTSETTINGS_H) \ && !defined(WOLFSSL_APPLE_NATIVE_CERT_VALIDATION) /* As of MacOS 14.0 we are still able to access system certificates and - * load them manually into wolfSSL "the old way". Accessiblity of this API + * load them manually into wolfSSL "the old way". Accessibility of this API * is indicated by the presence of the Security/SecTrustSettings.h header */ ret = LoadSystemCaCertsMac(ctx, &loaded); #elif defined(WOLFSSL_APPLE_NATIVE_CERT_VALIDATION) diff --git a/src/ssl_crypto.c b/src/ssl_crypto.c index b7ff5a19e5..063d1eafc2 100644 --- a/src/ssl_crypto.c +++ b/src/ssl_crypto.c @@ -1616,8 +1616,8 @@ WOLFSSL_HMAC_CTX* wolfSSL_HMAC_CTX_new(void) * * Not an OpenSSL compatibility API. * - * @param [in, out] ctx HMAC contect object. - * @return 1 inficating success. + * @param [in, out] ctx HMAC context object. + * @return 1 indicating success. */ int wolfSSL_HMAC_CTX_Init(WOLFSSL_HMAC_CTX* ctx) { diff --git a/tests/api.c b/tests/api.c index 2b35b13bf9..5c384882fb 100644 --- a/tests/api.c +++ b/tests/api.c @@ -35690,7 +35690,7 @@ static int test_X509_STORE_untrusted(void) NULL }; - /* Only immediate issuer in untrusted chaing. Fails since can't build chain + /* Only immediate issuer in untrusted chain. Fails since can't build chain * to loaded CA. */ ExpectIntEQ(test_X509_STORE_untrusted_certs(untrusted1, 0, X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY, 1), TEST_SUCCESS); diff --git a/wolfcrypt/src/ext_lms.c b/wolfcrypt/src/ext_lms.c index ebd07e26c5..a5155076b2 100644 --- a/wolfcrypt/src/ext_lms.c +++ b/wolfcrypt/src/ext_lms.c @@ -231,7 +231,7 @@ const char * wc_LmsKey_RcToStr(enum wc_LmsRc lmsEc) /* Init an LMS key. * - * Call this before setting the parms of an LMS key. + * Call this before setting the params of an LMS key. * * Returns 0 on success. * */ @@ -404,7 +404,7 @@ int wc_LmsKey_SetParameters(LmsKey * key, int levels, int height, key->lm_ots_type[i] = ots; } - /* Move the state to parms set. + /* Move the state to params set. * Key is ready for MakeKey or Reload. */ key->state = WC_LMS_STATE_PARMSET; @@ -656,7 +656,7 @@ int wc_LmsKey_MakeKey(LmsKey* key, WC_RNG * rng) return 0; } -/* Reload a key that has been prepared with the appropriate parms and +/* Reload a key that has been prepared with the appropriate params and * data. Use this if you wish to resume signing with an existing key. * * Write/read callbacks, and context data, must be set prior. diff --git a/wolfcrypt/src/ext_xmss.c b/wolfcrypt/src/ext_xmss.c index c19e95e916..b1e5e46dd4 100644 --- a/wolfcrypt/src/ext_xmss.c +++ b/wolfcrypt/src/ext_xmss.c @@ -97,7 +97,7 @@ static int sha256_cb(const unsigned char *in, unsigned long long inlen, /* Init an XMSS key. * - * Call this before setting the parms of an XMSS key. + * Call this before setting the params of an XMSS key. * * key [in] The XMSS key to init. * heap [in] Unused. @@ -201,7 +201,7 @@ static int wc_XmssKey_SetOid(XmssKey * key, uint32_t oid, int is_xmssmt) /* Set the XMSS key parameter string. * - * The input string must be one of the supported parm set names in + * The input string must be one of the supported param set names in * the "Name" section from the table in wolfssl/wolfcrypt/xmss.h, * e.g. "XMSS-SHA2_10_256" or "XMSSMT-SHA2_20/4_256". * diff --git a/wolfcrypt/src/port/Espressif/esp32_mp.c b/wolfcrypt/src/port/Espressif/esp32_mp.c index 67caac77b7..18467dcdf2 100644 --- a/wolfcrypt/src/port/Espressif/esp32_mp.c +++ b/wolfcrypt/src/port/Espressif/esp32_mp.c @@ -818,7 +818,7 @@ int esp_mp_montgomery_init(MATH_INT_T* X, MATH_INT_T* Y, MATH_INT_T* M, return MP_HW_FALLBACK; } if ((X == NULL) || (Y == NULL) || (M == NULL) ) { - /* if a bad oprand passed, we cannot use HW */ + /* if a bad operand passed, we cannot use HW */ ESP_LOGE(TAG, "ERROR: Bad montgomery operand, falling back to SW"); return MP_HW_FALLBACK; } @@ -1437,10 +1437,10 @@ int esp_mp_mulmod(MATH_INT_T* X, MATH_INT_T* Y, MATH_INT_T* M, MATH_INT_T* Z) SET_HW_VALIDATION; reti = mp_mulmod(X2, Y2, M2, Z2); if (reti == 0) { - ESP_LOGV(TAG, "wolfSSL mp_mulmod during vaidation success"); + ESP_LOGV(TAG, "wolfSSL mp_mulmod during validation success"); } else { - ESP_LOGE(TAG, "wolfSSL mp_mulmod during vaidation failed"); + ESP_LOGE(TAG, "wolfSSL mp_mulmod during validation failed"); } CLR_HW_VALIDATION; } diff --git a/wolfcrypt/src/port/arm/armv8-aes.c b/wolfcrypt/src/port/arm/armv8-aes.c index 989e65bd25..2efc3d35d8 100644 --- a/wolfcrypt/src/port/arm/armv8-aes.c +++ b/wolfcrypt/src/port/arm/armv8-aes.c @@ -1882,7 +1882,7 @@ static int Aes128GcmEncrypt(Aes* aes, byte* out, const byte* in, word32 sz, byte counter[AES_BLOCK_SIZE]; byte scratch[AES_BLOCK_SIZE]; /* Noticed different optimization levels treated head of array different. - * Some cases was stack pointer plus offset others was a regester containing + * Some cases was stack pointer plus offset others was a register containing * address. To make uniform for passing in to inline assembly code am using * pointers to the head of each local array. */ @@ -3528,7 +3528,7 @@ static int Aes192GcmEncrypt(Aes* aes, byte* out, const byte* in, word32 sz, byte counter[AES_BLOCK_SIZE]; byte scratch[AES_BLOCK_SIZE]; /* Noticed different optimization levels treated head of array different. - * Some cases was stack pointer plus offset others was a regester containing + * Some cases was stack pointer plus offset others was a register containing * address. To make uniform for passing in to inline assembly code am using * pointers to the head of each local array. */ @@ -5291,7 +5291,7 @@ static int Aes256GcmEncrypt(Aes* aes, byte* out, const byte* in, word32 sz, byte counter[AES_BLOCK_SIZE]; byte scratch[AES_BLOCK_SIZE]; /* Noticed different optimization levels treated head of array different. - * Some cases was stack pointer plus offset others was a regester containing + * Some cases was stack pointer plus offset others was a register containing * address. To make uniform for passing in to inline assembly code am using * pointers to the head of each local array. */ diff --git a/wolfcrypt/src/port/caam/wolfcaam_seco.c b/wolfcrypt/src/port/caam/wolfcaam_seco.c index dbe6db987e..8326f308f2 100644 --- a/wolfcrypt/src/port/caam/wolfcaam_seco.c +++ b/wolfcrypt/src/port/caam/wolfcaam_seco.c @@ -1228,7 +1228,7 @@ word32 wc_SECO_WrapKey(word32 keyId, byte* in, word32 inSz, byte* iv, } -/* trasnlates the HSM error to wolfSSL error and does debug print out */ +/* Translates the HSM error to wolfSSL error and does debug print out */ int wc_TranslateHSMError(int current, hsm_err_t err) { int ret = -1; diff --git a/wolfcrypt/src/sp_arm32.c b/wolfcrypt/src/sp_arm32.c index 1467181fa8..c1c0fb8a06 100644 --- a/wolfcrypt/src/sp_arm32.c +++ b/wolfcrypt/src/sp_arm32.c @@ -79129,7 +79129,7 @@ int sp_ecc_verify_256_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash, #endif /* HAVE_ECC_VERIFY */ #ifdef HAVE_ECC_CHECK_KEY -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * point EC point. * heap Heap to use if dynamically allocating. @@ -79185,7 +79185,7 @@ static int sp_256_ecc_is_point_8(const sp_point_256* point, return err; } -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * pX X ordinate of EC point. * pY Y ordinate of EC point. @@ -97205,7 +97205,7 @@ int sp_ecc_verify_384_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash, #endif /* HAVE_ECC_VERIFY */ #ifdef HAVE_ECC_CHECK_KEY -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * point EC point. * heap Heap to use if dynamically allocating. @@ -97261,7 +97261,7 @@ static int sp_384_ecc_is_point_12(const sp_point_384* point, return err; } -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * pX X ordinate of EC point. * pY Y ordinate of EC point. @@ -126155,7 +126155,7 @@ int sp_ecc_verify_521_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash, #endif /* HAVE_ECC_VERIFY */ #ifdef HAVE_ECC_CHECK_KEY -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * point EC point. * heap Heap to use if dynamically allocating. @@ -126211,7 +126211,7 @@ static int sp_521_ecc_is_point_17(const sp_point_521* point, return err; } -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * pX X ordinate of EC point. * pY Y ordinate of EC point. @@ -156590,7 +156590,7 @@ static void sp_1024_from_bin(sp_digit* r, int size, const byte* a, int n) } } -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * point EC point. * heap Heap to use if dynamically allocating. @@ -156650,7 +156650,7 @@ static int sp_1024_ecc_is_point_32(const sp_point_1024* point, return err; } -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * pX X ordinate of EC point. * pY Y ordinate of EC point. diff --git a/wolfcrypt/src/sp_arm64.c b/wolfcrypt/src/sp_arm64.c index dcbbaa1373..ed66e6d198 100644 --- a/wolfcrypt/src/sp_arm64.c +++ b/wolfcrypt/src/sp_arm64.c @@ -99,7 +99,7 @@ static void sp_2048_from_bin(sp_digit* r, int size, const byte* a, int n) "subs x6, %[n], 8\n\t" "mov x7, xzr\n\t" "blt 2f\n\t" - /* Put in mulitples of 8 bytes. */ + /* Put in multiples of 8 bytes. */ "1:\n\t" "ldr x8, [x4], -8\n\t" "subs x6, x6, 8\n\t" @@ -6992,7 +6992,7 @@ static void sp_3072_from_bin(sp_digit* r, int size, const byte* a, int n) "subs x6, %[n], 8\n\t" "mov x7, xzr\n\t" "blt 2f\n\t" - /* Put in mulitples of 8 bytes. */ + /* Put in multiples of 8 bytes. */ "1:\n\t" "ldr x8, [x4], -8\n\t" "subs x6, x6, 8\n\t" @@ -16595,7 +16595,7 @@ static void sp_4096_from_bin(sp_digit* r, int size, const byte* a, int n) "subs x6, %[n], 8\n\t" "mov x7, xzr\n\t" "blt 2f\n\t" - /* Put in mulitples of 8 bytes. */ + /* Put in multiples of 8 bytes. */ "1:\n\t" "ldr x8, [x4], -8\n\t" "subs x6, x6, 8\n\t" @@ -39685,7 +39685,7 @@ static void sp_256_from_bin(sp_digit* r, int size, const byte* a, int n) "subs x6, %[n], 8\n\t" "mov x7, xzr\n\t" "blt 2f\n\t" - /* Put in mulitples of 8 bytes. */ + /* Put in multiples of 8 bytes. */ "1:\n\t" "ldr x8, [x4], -8\n\t" "subs x6, x6, 8\n\t" @@ -42127,7 +42127,7 @@ SP_NOINLINE static void sp_256_mont_add_4(sp_digit* r, const sp_digit* a, (void)m; } -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * point EC point. * heap Heap to use if dynamically allocating. @@ -42183,7 +42183,7 @@ static int sp_256_ecc_is_point_4(const sp_point_256* point, return err; } -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * pX X ordinate of EC point. * pY Y ordinate of EC point. @@ -66452,7 +66452,7 @@ static void sp_384_from_bin(sp_digit* r, int size, const byte* a, int n) "subs x6, %[n], 8\n\t" "mov x7, xzr\n\t" "blt 2f\n\t" - /* Put in mulitples of 8 bytes. */ + /* Put in multiples of 8 bytes. */ "1:\n\t" "ldr x8, [x4], -8\n\t" "subs x6, x6, 8\n\t" @@ -68207,7 +68207,7 @@ int sp_ecc_verify_384_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash, #endif /* HAVE_ECC_VERIFY */ #ifdef HAVE_ECC_CHECK_KEY -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * point EC point. * heap Heap to use if dynamically allocating. @@ -68263,7 +68263,7 @@ static int sp_384_ecc_is_point_6(const sp_point_384* point, return err; } -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * pX X ordinate of EC point. * pY Y ordinate of EC point. @@ -111616,7 +111616,7 @@ static void sp_521_from_bin(sp_digit* r, int size, const byte* a, int n) "subs x6, %[n], 8\n\t" "mov x7, xzr\n\t" "blt 2f\n\t" - /* Put in mulitples of 8 bytes. */ + /* Put in multiples of 8 bytes. */ "1:\n\t" "ldr x8, [x4], -8\n\t" "subs x6, x6, 8\n\t" @@ -113151,7 +113151,7 @@ int sp_ecc_verify_521_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash, #endif /* HAVE_ECC_VERIFY */ #ifdef HAVE_ECC_CHECK_KEY -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * point EC point. * heap Heap to use if dynamically allocating. @@ -113207,7 +113207,7 @@ static int sp_521_ecc_is_point_9(const sp_point_521* point, return err; } -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * pX X ordinate of EC point. * pY Y ordinate of EC point. @@ -125240,7 +125240,7 @@ static void sp_1024_from_bin(sp_digit* r, int size, const byte* a, int n) "subs x6, %[n], 8\n\t" "mov x7, xzr\n\t" "blt 2f\n\t" - /* Put in mulitples of 8 bytes. */ + /* Put in multiples of 8 bytes. */ "1:\n\t" "ldr x8, [x4], -8\n\t" "subs x6, x6, 8\n\t" @@ -125334,7 +125334,7 @@ static void sp_1024_from_bin(sp_digit* r, int size, const byte* a, int n) ); } -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * point EC point. * heap Heap to use if dynamically allocating. @@ -125394,7 +125394,7 @@ static int sp_1024_ecc_is_point_16(const sp_point_1024* point, return err; } -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * pX X ordinate of EC point. * pY Y ordinate of EC point. diff --git a/wolfcrypt/src/sp_armthumb.c b/wolfcrypt/src/sp_armthumb.c index 9b5345e5fc..98a338b686 100644 --- a/wolfcrypt/src/sp_armthumb.c +++ b/wolfcrypt/src/sp_armthumb.c @@ -107674,7 +107674,7 @@ int sp_ecc_verify_256_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash, #endif /* HAVE_ECC_VERIFY */ #ifdef HAVE_ECC_CHECK_KEY -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * point EC point. * heap Heap to use if dynamically allocating. @@ -107730,7 +107730,7 @@ static int sp_256_ecc_is_point_8(const sp_point_256* point, return err; } -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * pX X ordinate of EC point. * pY Y ordinate of EC point. @@ -118870,7 +118870,7 @@ int sp_ecc_verify_384_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash, #endif /* HAVE_ECC_VERIFY */ #ifdef HAVE_ECC_CHECK_KEY -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * point EC point. * heap Heap to use if dynamically allocating. @@ -118926,7 +118926,7 @@ static int sp_384_ecc_is_point_12(const sp_point_384* point, return err; } -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * pX X ordinate of EC point. * pY Y ordinate of EC point. @@ -135812,7 +135812,7 @@ int sp_ecc_verify_521_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash, #endif /* HAVE_ECC_VERIFY */ #ifdef HAVE_ECC_CHECK_KEY -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * point EC point. * heap Heap to use if dynamically allocating. @@ -135868,7 +135868,7 @@ static int sp_521_ecc_is_point_17(const sp_point_521* point, return err; } -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * pX X ordinate of EC point. * pY Y ordinate of EC point. @@ -218581,7 +218581,7 @@ static void sp_1024_from_bin(sp_digit* r, int size, const byte* a, int n) } } -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * point EC point. * heap Heap to use if dynamically allocating. @@ -218641,7 +218641,7 @@ static int sp_1024_ecc_is_point_32(const sp_point_1024* point, return err; } -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * pX X ordinate of EC point. * pY Y ordinate of EC point. diff --git a/wolfcrypt/src/sp_c32.c b/wolfcrypt/src/sp_c32.c index 66d057a21d..468e0fcfef 100644 --- a/wolfcrypt/src/sp_c32.c +++ b/wolfcrypt/src/sp_c32.c @@ -26541,7 +26541,7 @@ int sp_ecc_verify_256_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash, #endif /* HAVE_ECC_VERIFY */ #ifdef HAVE_ECC_CHECK_KEY -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * point EC point. * heap Heap to use if dynamically allocating. @@ -26597,7 +26597,7 @@ static int sp_256_ecc_is_point_9(const sp_point_256* point, return err; } -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * pX X ordinate of EC point. * pY Y ordinate of EC point. @@ -34622,7 +34622,7 @@ int sp_ecc_verify_384_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash, #endif /* HAVE_ECC_VERIFY */ #ifdef HAVE_ECC_CHECK_KEY -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * point EC point. * heap Heap to use if dynamically allocating. @@ -34678,7 +34678,7 @@ static int sp_384_ecc_is_point_15(const sp_point_384* point, return err; } -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * pX X ordinate of EC point. * pY Y ordinate of EC point. @@ -42796,7 +42796,7 @@ int sp_ecc_verify_521_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash, #endif /* HAVE_ECC_VERIFY */ #ifdef HAVE_ECC_CHECK_KEY -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * point EC point. * heap Heap to use if dynamically allocating. @@ -42852,7 +42852,7 @@ static int sp_521_ecc_is_point_21(const sp_point_521* point, return err; } -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * pX X ordinate of EC point. * pY Y ordinate of EC point. @@ -54685,7 +54685,7 @@ static void sp_1024_from_bin(sp_digit* r, int size, const byte* a, int n) } } -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * point EC point. * heap Heap to use if dynamically allocating. @@ -54745,7 +54745,7 @@ static int sp_1024_ecc_is_point_42(const sp_point_1024* point, return err; } -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * pX X ordinate of EC point. * pY Y ordinate of EC point. diff --git a/wolfcrypt/src/sp_c64.c b/wolfcrypt/src/sp_c64.c index 607b7274d0..a2b97d8169 100644 --- a/wolfcrypt/src/sp_c64.c +++ b/wolfcrypt/src/sp_c64.c @@ -27435,7 +27435,7 @@ int sp_ecc_verify_256_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash, #endif /* HAVE_ECC_VERIFY */ #ifdef HAVE_ECC_CHECK_KEY -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * point EC point. * heap Heap to use if dynamically allocating. @@ -27491,7 +27491,7 @@ static int sp_256_ecc_is_point_5(const sp_point_256* point, return err; } -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * pX X ordinate of EC point. * pY Y ordinate of EC point. @@ -34903,7 +34903,7 @@ int sp_ecc_verify_384_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash, #endif /* HAVE_ECC_VERIFY */ #ifdef HAVE_ECC_CHECK_KEY -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * point EC point. * heap Heap to use if dynamically allocating. @@ -34959,7 +34959,7 @@ static int sp_384_ecc_is_point_7(const sp_point_384* point, return err; } -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * pX X ordinate of EC point. * pY Y ordinate of EC point. @@ -42387,7 +42387,7 @@ int sp_ecc_verify_521_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash, #endif /* HAVE_ECC_VERIFY */ #ifdef HAVE_ECC_CHECK_KEY -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * point EC point. * heap Heap to use if dynamically allocating. @@ -42443,7 +42443,7 @@ static int sp_521_ecc_is_point_9(const sp_point_521* point, return err; } -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * pX X ordinate of EC point. * pY Y ordinate of EC point. @@ -53269,7 +53269,7 @@ static void sp_1024_from_bin(sp_digit* r, int size, const byte* a, int n) } } -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * point EC point. * heap Heap to use if dynamically allocating. @@ -53329,7 +53329,7 @@ static int sp_1024_ecc_is_point_18(const sp_point_1024* point, return err; } -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * pX X ordinate of EC point. * pY Y ordinate of EC point. diff --git a/wolfcrypt/src/sp_cortexm.c b/wolfcrypt/src/sp_cortexm.c index 3b7b03c91d..285f4eb3d5 100644 --- a/wolfcrypt/src/sp_cortexm.c +++ b/wolfcrypt/src/sp_cortexm.c @@ -40873,7 +40873,7 @@ int sp_ecc_verify_256_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash, #endif /* HAVE_ECC_VERIFY */ #ifdef HAVE_ECC_CHECK_KEY -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * point EC point. * heap Heap to use if dynamically allocating. @@ -40929,7 +40929,7 @@ static int sp_256_ecc_is_point_8(const sp_point_256* point, return err; } -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * pX X ordinate of EC point. * pY Y ordinate of EC point. @@ -50738,7 +50738,7 @@ int sp_ecc_verify_384_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash, #endif /* HAVE_ECC_VERIFY */ #ifdef HAVE_ECC_CHECK_KEY -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * point EC point. * heap Heap to use if dynamically allocating. @@ -50794,7 +50794,7 @@ static int sp_384_ecc_is_point_12(const sp_point_384* point, return err; } -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * pX X ordinate of EC point. * pY Y ordinate of EC point. @@ -64067,7 +64067,7 @@ int sp_ecc_verify_521_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash, #endif /* HAVE_ECC_VERIFY */ #ifdef HAVE_ECC_CHECK_KEY -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * point EC point. * heap Heap to use if dynamically allocating. @@ -64123,7 +64123,7 @@ static int sp_521_ecc_is_point_17(const sp_point_521* point, return err; } -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * pX X ordinate of EC point. * pY Y ordinate of EC point. @@ -80497,7 +80497,7 @@ static void sp_1024_from_bin(sp_digit* r, int size, const byte* a, int n) } } -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * point EC point. * heap Heap to use if dynamically allocating. @@ -80557,7 +80557,7 @@ static int sp_1024_ecc_is_point_32(const sp_point_1024* point, return err; } -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * pX X ordinate of EC point. * pY Y ordinate of EC point. diff --git a/wolfcrypt/src/sp_int.c b/wolfcrypt/src/sp_int.c index 6dd4e6a8bc..06c01ab005 100644 --- a/wolfcrypt/src/sp_int.c +++ b/wolfcrypt/src/sp_int.c @@ -6346,7 +6346,7 @@ static WC_INLINE sp_int_digit sp_div_word(sp_int_digit hi, sp_int_digit lo, if (r > SP_HALF_MAX) { r = SP_HALF_MAX; } - /* Shift up result for trial division calucation. */ + /* Shift up result for trial division calculation. */ r <<= SP_HALF_SIZE; /* Calculate trial value. */ trial = r * (sp_int_word)d; @@ -12416,7 +12416,7 @@ static int _sp_invmod_mont_ct(const sp_int* a, const sp_int* m, sp_int* r, int bit = sp_is_bit_set(e, (unsigned int)i); /* 6.2. j += bit - * Update count of consequitive 1 bits. + * Update count of consecutive 1 bits. */ j += bit; /* 6.3. s += 1 @@ -13107,7 +13107,7 @@ static int _sp_exptmod_mont_ex(const sp_int* b, const sp_int* e, int bits, DECL_SP_INT_ARRAY(t, m->used * 2 + 1, (1 << 6) + 1); /* Window bits based on number of pre-calculations versus number of loop - * calculcations. + * calculations. * Exponents for RSA and DH will result in 6-bit windows. */ if (bits > 450) { diff --git a/wolfcrypt/src/sp_x86_64.c b/wolfcrypt/src/sp_x86_64.c index 102884672d..990a999cbb 100644 --- a/wolfcrypt/src/sp_x86_64.c +++ b/wolfcrypt/src/sp_x86_64.c @@ -26392,7 +26392,7 @@ int sp_ecc_verify_256_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash, #endif /* HAVE_ECC_VERIFY */ #ifdef HAVE_ECC_CHECK_KEY -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * point EC point. * heap Heap to use if dynamically allocating. @@ -26448,7 +26448,7 @@ static int sp_256_ecc_is_point_4(const sp_point_256* point, return err; } -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * pX X ordinate of EC point. * pY Y ordinate of EC point. @@ -51339,7 +51339,7 @@ int sp_ecc_verify_384_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash, #endif /* HAVE_ECC_VERIFY */ #ifdef HAVE_ECC_CHECK_KEY -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * point EC point. * heap Heap to use if dynamically allocating. @@ -51395,7 +51395,7 @@ static int sp_384_ecc_is_point_6(const sp_point_384* point, return err; } -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * pX X ordinate of EC point. * pY Y ordinate of EC point. @@ -92477,7 +92477,7 @@ int sp_ecc_verify_521_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash, #endif /* HAVE_ECC_VERIFY */ #ifdef HAVE_ECC_CHECK_KEY -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * point EC point. * heap Heap to use if dynamically allocating. @@ -92533,7 +92533,7 @@ static int sp_521_ecc_is_point_9(const sp_point_521* point, return err; } -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * pX X ordinate of EC point. * pY Y ordinate of EC point. @@ -105408,7 +105408,7 @@ static void sp_1024_from_bin(sp_digit* r, int size, const byte* a, int n) } } -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * point EC point. * heap Heap to use if dynamically allocating. @@ -105468,7 +105468,7 @@ static int sp_1024_ecc_is_point_16(const sp_point_1024* point, return err; } -/* Check that the x and y oridinates are a valid point on the curve. +/* Check that the x and y ordinates are a valid point on the curve. * * pX X ordinate of EC point. * pY Y ordinate of EC point. diff --git a/wolfcrypt/user-crypto/src/rsa.c b/wolfcrypt/user-crypto/src/rsa.c index 0c65ad098a..66357372fb 100644 --- a/wolfcrypt/user-crypto/src/rsa.c +++ b/wolfcrypt/user-crypto/src/rsa.c @@ -2042,7 +2042,7 @@ int wc_MakeRsaKey(RsaKey* key, int size, long e, WC_RNG* rng) { IppStatus ret; int scratchSz; - int i; /* for trys on calling make key */ + int i; /* for tries on calling make key */ int ctxSz; IppsBigNumState* pSrcPublicExp = NULL; @@ -2178,7 +2178,7 @@ int wc_MakeRsaKey(RsaKey* key, int size, long e, WC_RNG* rng) goto makeKeyEnd; } - /* call IPP to generate keys, if inseficent entropy error call again */ + /* call IPP to generate keys, if insufficient entropy error call again */ ret = ippStsInsufficientEntropy; while (ret == ippStsInsufficientEntropy) { ret = ippsRSA_GenerateKeys(pSrcPublicExp, key->n, key->e, diff --git a/wolfssl/internal.h b/wolfssl/internal.h index c4805ee7aa..aa7e89a70a 100644 --- a/wolfssl/internal.h +++ b/wolfssl/internal.h @@ -1764,7 +1764,7 @@ enum Misc { #ifndef ECDHE_SIZE /* allow this to be overridden at compile-time */ ECDHE_SIZE = 32, /* ECDHE server size defaults to 256 bit */ #endif - MAX_EXPORT_ECC_SZ = 256, /* Export ANS X9.62 max future size */ + MAX_EXPORT_ECC_SZ = 256, /* Export ANSI X9.62 max future size */ MAX_CURVE_NAME_SZ = 16, /* Maximum size of curve name string */ NEW_SA_MAJOR = 8, /* Most significant byte used with new sig algos */ @@ -3576,7 +3576,7 @@ struct WOLFSSL_CTX { byte sendVerify:2; /* for client side (can not be single bit) */ byte haveRSA:1; /* RSA available */ byte haveECC:1; /* ECC available */ - byte haveDH:1; /* server DH parms set by user */ + byte haveDH:1; /* server DH params set by user */ byte haveECDSAsig:1; /* server cert signed w/ ECDSA */ byte haveFalconSig:1; /* server cert signed w/ Falcon */ byte haveDilithiumSig:1;/* server cert signed w/ Dilithium */ @@ -4630,7 +4630,7 @@ struct Options { word16 usingCompression:1; /* are we using compression */ word16 haveRSA:1; /* RSA available */ word16 haveECC:1; /* ECC available */ - word16 haveDH:1; /* server DH parms set by user */ + word16 haveDH:1; /* server DH params set by user */ word16 haveECDSAsig:1; /* server ECDSA signed cert */ word16 haveStaticECC:1; /* static server ECC private key */ word16 haveFalconSig:1; /* server Falcon signed cert */ diff --git a/wolfssl/wolfcrypt/ext_lms.h b/wolfssl/wolfcrypt/ext_lms.h index 8b8a8f7288..ccdfdcb30e 100644 --- a/wolfssl/wolfcrypt/ext_lms.h +++ b/wolfssl/wolfcrypt/ext_lms.h @@ -48,8 +48,8 @@ typedef struct hss_extra_info hss_extra_info; struct LmsKey { unsigned levels; /* Number of tree levels. */ - param_set_t lm_type[MAX_HSS_LEVELS]; /* Height parm per level. */ - param_set_t lm_ots_type[MAX_HSS_LEVELS]; /* Winternitz parm per level. */ + param_set_t lm_type[MAX_HSS_LEVELS]; /* Height param per level. */ + param_set_t lm_ots_type[MAX_HSS_LEVELS]; /* Winternitz param per level. */ unsigned char pub[HSS_MAX_PUBLIC_KEY_LEN]; #ifndef WOLFSSL_LMS_VERIFY_ONLY hss_working_key * working_key; diff --git a/wolfssl/wolfcrypt/lms.h b/wolfssl/wolfcrypt/lms.h index d3ab07571d..483f349c1e 100644 --- a/wolfssl/wolfcrypt/lms.h +++ b/wolfssl/wolfcrypt/lms.h @@ -94,8 +94,8 @@ enum wc_LmsParm { /* enum wc_LmsState is to help track the state of an LMS/HSS Key. */ enum wc_LmsState { WC_LMS_STATE_FREED, /* Key has been freed from memory. */ - WC_LMS_STATE_INITED, /* Key has been inited, ready to set parms.*/ - WC_LMS_STATE_PARMSET, /* Parms are set, ready to MakeKey or Reload. */ + WC_LMS_STATE_INITED, /* Key has been inited, ready to set params.*/ + WC_LMS_STATE_PARMSET, /* Params are set, ready to MakeKey or Reload. */ WC_LMS_STATE_OK, /* Able to sign signatures and verify. */ WC_LMS_STATE_VERIFYONLY, /* A public only LmsKey. */ WC_LMS_STATE_BAD, /* Can't guarantee key's state. */ diff --git a/wolfssl/wolfcrypt/xmss.h b/wolfssl/wolfcrypt/xmss.h index 7cd8f27ffa..70f26c484c 100644 --- a/wolfssl/wolfcrypt/xmss.h +++ b/wolfssl/wolfcrypt/xmss.h @@ -104,8 +104,8 @@ enum wc_XmssRc { /* enum wc_XmssState is to help track the state of an XMSS Key. */ enum wc_XmssState { WC_XMSS_STATE_FREED, /* Key has been freed from memory. */ - WC_XMSS_STATE_INITED, /* Key has been inited, ready to set parms.*/ - WC_XMSS_STATE_PARMSET, /* Parms are set, ready to MakeKey or Reload. */ + WC_XMSS_STATE_INITED, /* Key has been inited, ready to set params.*/ + WC_XMSS_STATE_PARMSET, /* Params are set, ready to MakeKey or Reload. */ WC_XMSS_STATE_OK, /* Able to sign signatures and verify. */ WC_XMSS_STATE_VERIFYONLY, /* A public only XmssKey. */ WC_XMSS_STATE_BAD, /* Can't guarantee key's state. */