Fix spelling and typographical errors found by cspell
Signed-off-by: Tom Cosgrove <tom.cosgrove@arm.com>
This commit is contained in:
parent
a636d1f192
commit
1e21144194
12 changed files with 17 additions and 17 deletions
|
@ -553,7 +553,7 @@ int mbedtls_aes_crypt_ofb( mbedtls_aes_context *ctx,
|
||||||
* for example, with 96-bit random nonces, you should not encrypt
|
* for example, with 96-bit random nonces, you should not encrypt
|
||||||
* more than 2**32 messages with the same key.
|
* more than 2**32 messages with the same key.
|
||||||
*
|
*
|
||||||
* Note that for both stategies, sizes are measured in blocks and
|
* Note that for both strategies, sizes are measured in blocks and
|
||||||
* that an AES block is 16 bytes.
|
* that an AES block is 16 bytes.
|
||||||
*
|
*
|
||||||
* \warning Upon return, \p stream_block contains sensitive data. Its
|
* \warning Upon return, \p stream_block contains sensitive data. Its
|
||||||
|
|
|
@ -306,7 +306,7 @@ int mbedtls_aria_crypt_cfb128( mbedtls_aria_context *ctx,
|
||||||
* for example, with 96-bit random nonces, you should not encrypt
|
* for example, with 96-bit random nonces, you should not encrypt
|
||||||
* more than 2**32 messages with the same key.
|
* more than 2**32 messages with the same key.
|
||||||
*
|
*
|
||||||
* Note that for both stategies, sizes are measured in blocks and
|
* Note that for both strategies, sizes are measured in blocks and
|
||||||
* that an ARIA block is 16 bytes.
|
* that an ARIA block is 16 bytes.
|
||||||
*
|
*
|
||||||
* \warning Upon return, \p stream_block contains sensitive data. Its
|
* \warning Upon return, \p stream_block contains sensitive data. Its
|
||||||
|
|
|
@ -955,7 +955,7 @@ int mbedtls_mpi_inv_mod( mbedtls_mpi *X, const mbedtls_mpi *A,
|
||||||
* generate yourself and that are supposed to be prime, then
|
* generate yourself and that are supposed to be prime, then
|
||||||
* \p rounds should be at least the half of the security
|
* \p rounds should be at least the half of the security
|
||||||
* strength of the cryptographic algorithm. On the other hand,
|
* strength of the cryptographic algorithm. On the other hand,
|
||||||
* if \p X is chosen uniformly or non-adversially (as is the
|
* if \p X is chosen uniformly or non-adversarially (as is the
|
||||||
* case when mbedtls_mpi_gen_prime calls this function), then
|
* case when mbedtls_mpi_gen_prime calls this function), then
|
||||||
* \p rounds can be much lower.
|
* \p rounds can be much lower.
|
||||||
*
|
*
|
||||||
|
|
|
@ -262,7 +262,7 @@ int mbedtls_camellia_crypt_cfb128( mbedtls_camellia_context *ctx,
|
||||||
* encrypted: for example, with 96-bit random nonces, you should
|
* encrypted: for example, with 96-bit random nonces, you should
|
||||||
* not encrypt more than 2**32 messages with the same key.
|
* not encrypt more than 2**32 messages with the same key.
|
||||||
*
|
*
|
||||||
* Note that for both stategies, sizes are measured in blocks and
|
* Note that for both strategies, sizes are measured in blocks and
|
||||||
* that a CAMELLIA block is \c 16 Bytes.
|
* that a CAMELLIA block is \c 16 Bytes.
|
||||||
*
|
*
|
||||||
* \warning Upon return, \p stream_block contains sensitive data. Its
|
* \warning Upon return, \p stream_block contains sensitive data. Its
|
||||||
|
|
|
@ -158,7 +158,7 @@ int mbedtls_chachapoly_setkey( mbedtls_chachapoly_context *ctx,
|
||||||
* \param ctx The ChaCha20-Poly1305 context. This must be initialized
|
* \param ctx The ChaCha20-Poly1305 context. This must be initialized
|
||||||
* and bound to a key.
|
* and bound to a key.
|
||||||
* \param nonce The nonce/IV to use for the message.
|
* \param nonce The nonce/IV to use for the message.
|
||||||
* This must be a redable buffer of length \c 12 Bytes.
|
* This must be a readable buffer of length \c 12 Bytes.
|
||||||
* \param mode The operation to perform: #MBEDTLS_CHACHAPOLY_ENCRYPT or
|
* \param mode The operation to perform: #MBEDTLS_CHACHAPOLY_ENCRYPT or
|
||||||
* #MBEDTLS_CHACHAPOLY_DECRYPT (discouraged, see warning).
|
* #MBEDTLS_CHACHAPOLY_DECRYPT (discouraged, see warning).
|
||||||
*
|
*
|
||||||
|
|
|
@ -262,7 +262,7 @@ mbedtls_ecp_group;
|
||||||
#if !defined(MBEDTLS_ECP_WINDOW_SIZE)
|
#if !defined(MBEDTLS_ECP_WINDOW_SIZE)
|
||||||
/*
|
/*
|
||||||
* Maximum "window" size used for point multiplication.
|
* Maximum "window" size used for point multiplication.
|
||||||
* Default: a point where higher memory usage yields disminishing performance
|
* Default: a point where higher memory usage yields diminishing performance
|
||||||
* returns.
|
* returns.
|
||||||
* Minimum value: 2. Maximum value: 7.
|
* Minimum value: 2. Maximum value: 7.
|
||||||
*
|
*
|
||||||
|
|
|
@ -25,7 +25,7 @@
|
||||||
*/
|
*/
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* This is an optional version symbol that enables comatibility handling of
|
* This is an optional version symbol that enables compatibility handling of
|
||||||
* config files.
|
* config files.
|
||||||
*
|
*
|
||||||
* It is equal to the #MBEDTLS_VERSION_NUMBER of the Mbed TLS version that
|
* It is equal to the #MBEDTLS_VERSION_NUMBER of the Mbed TLS version that
|
||||||
|
@ -2390,7 +2390,7 @@
|
||||||
*
|
*
|
||||||
* Requires: MBEDTLS_MD_C
|
* Requires: MBEDTLS_MD_C
|
||||||
*
|
*
|
||||||
* Uncomment to enable the HMAC_DRBG random number geerator.
|
* Uncomment to enable the HMAC_DRBG random number generator.
|
||||||
*/
|
*/
|
||||||
#define MBEDTLS_HMAC_DRBG_C
|
#define MBEDTLS_HMAC_DRBG_C
|
||||||
|
|
||||||
|
|
|
@ -140,7 +140,7 @@
|
||||||
#define MBEDTLS_OID_AT_GIVEN_NAME MBEDTLS_OID_AT "\x2A" /**< id-at-givenName AttributeType:= {id-at 42} */
|
#define MBEDTLS_OID_AT_GIVEN_NAME MBEDTLS_OID_AT "\x2A" /**< id-at-givenName AttributeType:= {id-at 42} */
|
||||||
#define MBEDTLS_OID_AT_INITIALS MBEDTLS_OID_AT "\x2B" /**< id-at-initials AttributeType:= {id-at 43} */
|
#define MBEDTLS_OID_AT_INITIALS MBEDTLS_OID_AT "\x2B" /**< id-at-initials AttributeType:= {id-at 43} */
|
||||||
#define MBEDTLS_OID_AT_GENERATION_QUALIFIER MBEDTLS_OID_AT "\x2C" /**< id-at-generationQualifier AttributeType:= {id-at 44} */
|
#define MBEDTLS_OID_AT_GENERATION_QUALIFIER MBEDTLS_OID_AT "\x2C" /**< id-at-generationQualifier AttributeType:= {id-at 44} */
|
||||||
#define MBEDTLS_OID_AT_UNIQUE_IDENTIFIER MBEDTLS_OID_AT "\x2D" /**< id-at-uniqueIdentifier AttributType:= {id-at 45} */
|
#define MBEDTLS_OID_AT_UNIQUE_IDENTIFIER MBEDTLS_OID_AT "\x2D" /**< id-at-uniqueIdentifier AttributeType:= {id-at 45} */
|
||||||
#define MBEDTLS_OID_AT_DN_QUALIFIER MBEDTLS_OID_AT "\x2E" /**< id-at-dnQualifier AttributeType:= {id-at 46} */
|
#define MBEDTLS_OID_AT_DN_QUALIFIER MBEDTLS_OID_AT "\x2E" /**< id-at-dnQualifier AttributeType:= {id-at 46} */
|
||||||
#define MBEDTLS_OID_AT_PSEUDONYM MBEDTLS_OID_AT "\x41" /**< id-at-pseudonym AttributeType:= {id-at 65} */
|
#define MBEDTLS_OID_AT_PSEUDONYM MBEDTLS_OID_AT "\x41" /**< id-at-pseudonym AttributeType:= {id-at 65} */
|
||||||
|
|
||||||
|
|
|
@ -122,7 +122,7 @@ MBEDTLS_DEPRECATED typedef int mbedtls_deprecated_numeric_constant_t;
|
||||||
*
|
*
|
||||||
* This macro has an empty expansion. It exists for documentation purposes:
|
* This macro has an empty expansion. It exists for documentation purposes:
|
||||||
* a #MBEDTLS_CHECK_RETURN_OPTIONAL annotation indicates that the function
|
* a #MBEDTLS_CHECK_RETURN_OPTIONAL annotation indicates that the function
|
||||||
* has been analyzed for return-check usefuless, whereas the lack of
|
* has been analyzed for return-check usefulness, whereas the lack of
|
||||||
* an annotation indicates that the function has not been analyzed and its
|
* an annotation indicates that the function has not been analyzed and its
|
||||||
* return-check usefulness is unknown.
|
* return-check usefulness is unknown.
|
||||||
*/
|
*/
|
||||||
|
|
|
@ -634,7 +634,7 @@ int mbedtls_rsa_rsaes_pkcs1_v15_encrypt( mbedtls_rsa_context *ctx,
|
||||||
* \note The output buffer must be as large as the size
|
* \note The output buffer must be as large as the size
|
||||||
* of ctx->N. For example, 128 Bytes if RSA-1024 is used.
|
* of ctx->N. For example, 128 Bytes if RSA-1024 is used.
|
||||||
*
|
*
|
||||||
* \param ctx The initnialized RSA context to use.
|
* \param ctx The initialized RSA context to use.
|
||||||
* \param f_rng The RNG function to use. This is needed for padding
|
* \param f_rng The RNG function to use. This is needed for padding
|
||||||
* generation and is mandatory.
|
* generation and is mandatory.
|
||||||
* \param p_rng The RNG context to be passed to \p f_rng. This may
|
* \param p_rng The RNG context to be passed to \p f_rng. This may
|
||||||
|
|
|
@ -1357,7 +1357,7 @@ struct mbedtls_ssl_config
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C)
|
#if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C)
|
||||||
/** Callback to create & write a cookie for ClientHello veirifcation */
|
/** Callback to create & write a cookie for ClientHello verification */
|
||||||
int (*MBEDTLS_PRIVATE(f_cookie_write))( void *, unsigned char **, unsigned char *,
|
int (*MBEDTLS_PRIVATE(f_cookie_write))( void *, unsigned char **, unsigned char *,
|
||||||
const unsigned char *, size_t );
|
const unsigned char *, size_t );
|
||||||
/** Callback to verify validity of a ClientHello cookie */
|
/** Callback to verify validity of a ClientHello cookie */
|
||||||
|
@ -2845,7 +2845,7 @@ void mbedtls_ssl_conf_handshake_timeout( mbedtls_ssl_config *conf, uint32_t min,
|
||||||
* successfully cached, return 1 otherwise.
|
* successfully cached, return 1 otherwise.
|
||||||
*
|
*
|
||||||
* \param conf SSL configuration
|
* \param conf SSL configuration
|
||||||
* \param p_cache parmater (context) for both callbacks
|
* \param p_cache parameter (context) for both callbacks
|
||||||
* \param f_get_cache session get callback
|
* \param f_get_cache session get callback
|
||||||
* \param f_set_cache session set callback
|
* \param f_set_cache session set callback
|
||||||
*/
|
*/
|
||||||
|
@ -2907,7 +2907,7 @@ int mbedtls_ssl_set_session( mbedtls_ssl_context *ssl, const mbedtls_ssl_session
|
||||||
/**
|
/**
|
||||||
* \brief Load serialized session data into a session structure.
|
* \brief Load serialized session data into a session structure.
|
||||||
* On client, this can be used for loading saved sessions
|
* On client, this can be used for loading saved sessions
|
||||||
* before resuming them with mbedstls_ssl_set_session().
|
* before resuming them with mbedtls_ssl_set_session().
|
||||||
* On server, this can be used for alternative implementations
|
* On server, this can be used for alternative implementations
|
||||||
* of session cache or session tickets.
|
* of session cache or session tickets.
|
||||||
*
|
*
|
||||||
|
@ -4007,7 +4007,7 @@ void mbedtls_ssl_conf_cert_req_ca_list( mbedtls_ssl_config *conf,
|
||||||
* \c mbedtls_ssl_get_record_expansion().
|
* \c mbedtls_ssl_get_record_expansion().
|
||||||
*
|
*
|
||||||
* \note For DTLS, it is also possible to set a limit for the total
|
* \note For DTLS, it is also possible to set a limit for the total
|
||||||
* size of daragrams passed to the transport layer, including
|
* size of datagrams passed to the transport layer, including
|
||||||
* record overhead, see \c mbedtls_ssl_set_mtu().
|
* record overhead, see \c mbedtls_ssl_set_mtu().
|
||||||
*
|
*
|
||||||
* \param conf SSL configuration
|
* \param conf SSL configuration
|
||||||
|
|
|
@ -114,7 +114,7 @@ mbedtls_x509_crt;
|
||||||
typedef struct mbedtls_x509_san_other_name
|
typedef struct mbedtls_x509_san_other_name
|
||||||
{
|
{
|
||||||
/**
|
/**
|
||||||
* The type_id is an OID as deifned in RFC 5280.
|
* The type_id is an OID as defined in RFC 5280.
|
||||||
* To check the value of the type id, you should use
|
* To check the value of the type id, you should use
|
||||||
* \p MBEDTLS_OID_CMP with a known OID mbedtls_x509_buf.
|
* \p MBEDTLS_OID_CMP with a known OID mbedtls_x509_buf.
|
||||||
*/
|
*/
|
||||||
|
@ -1084,7 +1084,7 @@ int mbedtls_x509write_crt_set_extension( mbedtls_x509write_cert *ctx,
|
||||||
* \param is_ca is this a CA certificate
|
* \param is_ca is this a CA certificate
|
||||||
* \param max_pathlen maximum length of certificate chains below this
|
* \param max_pathlen maximum length of certificate chains below this
|
||||||
* certificate (only for CA certificates, -1 is
|
* certificate (only for CA certificates, -1 is
|
||||||
* inlimited)
|
* unlimited)
|
||||||
*
|
*
|
||||||
* \return 0 if successful, or a MBEDTLS_ERR_X509_ALLOC_FAILED
|
* \return 0 if successful, or a MBEDTLS_ERR_X509_ALLOC_FAILED
|
||||||
*/
|
*/
|
||||||
|
|
Loading…
Reference in a new issue