Fix additional misspellings found by codespell

Remaining hits seem to be hex data, certificates,
and other miscellaneous exceptions.
List generated by running codespell -w -L 
keypair,Keypair,KeyPair,keyPair,ciph,nd

Signed-off-by: Andrzej Kurek <andrzej.kurek@arm.com>
This commit is contained in:
Andrzej Kurek 2022-04-13 14:28:52 -04:00 committed by Dave Rodgman
parent e27e96dd5d
commit 5c65c5781f
17 changed files with 21 additions and 21 deletions

View File

@ -84,7 +84,7 @@ the hash algorithm potentially used to hash the message being signed:
- most commonly MGF1, which in turn is parametrized by a hash algorithm - most commonly MGF1, which in turn is parametrized by a hash algorithm
- a salt length - a salt length
- a trailer field - the value is fixed to 0xBC by PKCS#1 v2.1, but was left - a trailer field - the value is fixed to 0xBC by PKCS#1 v2.1, but was left
configurable in the original scheme; 0xBC is used everywhere in pratice. configurable in the original scheme; 0xBC is used everywhere in practice.
Both the existing `mbedtls_` API and the PSA API support only MGF1 as the Both the existing `mbedtls_` API and the PSA API support only MGF1 as the
generation function (and only 0xBC as the trailer field), but there are generation function (and only 0xBC as the trailer field), but there are
@ -317,7 +317,7 @@ strong security arguments, so it's unclear whether it would be accepted.
HKDF: Expand not exposed on its own (TLS 1.3) HKDF: Expand not exposed on its own (TLS 1.3)
--------------------------------------------- ---------------------------------------------
The HKDF function uses and Extract-then-Expand approch, that is: The HKDF function uses and Extract-then-Expand approach, that is:
HKDF(x, ...) = HKDF-Expand(HKDF-Extract(x, ...), ...) HKDF(x, ...) = HKDF-Expand(HKDF-Extract(x, ...), ...)

View File

@ -228,7 +228,7 @@ mbedtls_asn1_named_data;
* \return 0 if successful. * \return 0 if successful.
* \return #MBEDTLS_ERR_ASN1_OUT_OF_DATA if the ASN.1 element * \return #MBEDTLS_ERR_ASN1_OUT_OF_DATA if the ASN.1 element
* would end beyond \p end. * would end beyond \p end.
* \return #MBEDTLS_ERR_ASN1_INVALID_LENGTH if the length is unparseable. * \return #MBEDTLS_ERR_ASN1_INVALID_LENGTH if the length is unparsable.
*/ */
int mbedtls_asn1_get_len( unsigned char **p, int mbedtls_asn1_get_len( unsigned char **p,
const unsigned char *end, const unsigned char *end,

View File

@ -150,7 +150,7 @@
#endif #endif
#if defined(MBEDTLS_PKCS5_C) && !defined(MBEDTLS_MD_C) #if defined(MBEDTLS_PKCS5_C) && !defined(MBEDTLS_MD_C)
#error "MBEDTLS_PKCS5_C defined, but not all prerequesites" #error "MBEDTLS_PKCS5_C defined, but not all prerequisites"
#endif #endif
#if defined(MBEDTLS_PKCS12_C) && !defined(MBEDTLS_MD_C) #if defined(MBEDTLS_PKCS12_C) && !defined(MBEDTLS_MD_C)

View File

@ -1576,7 +1576,7 @@
* unless you know for sure amplification cannot be a problem in the * unless you know for sure amplification cannot be a problem in the
* environment in which your server operates. * environment in which your server operates.
* *
* \warning Disabling this can ba a security risk! (see above) * \warning Disabling this can be a security risk! (see above)
* *
* Requires: MBEDTLS_SSL_PROTO_DTLS * Requires: MBEDTLS_SSL_PROTO_DTLS
* *

View File

@ -2735,7 +2735,7 @@ void mbedtls_ssl_conf_dtls_anti_replay( mbedtls_ssl_config *conf, char mode );
* ones going through the authentication-decryption phase. * ones going through the authentication-decryption phase.
* *
* \note This is a security trade-off related to the fact that it's * \note This is a security trade-off related to the fact that it's
* often relatively easy for an active attacker ot inject UDP * often relatively easy for an active attacker to inject UDP
* datagrams. On one hand, setting a low limit here makes it * datagrams. On one hand, setting a low limit here makes it
* easier for such an attacker to forcibly terminated a * easier for such an attacker to forcibly terminated a
* connection. On the other hand, a high limit or no limit * connection. On the other hand, a high limit or no limit

View File

@ -3783,7 +3783,7 @@ psa_status_t psa_key_derivation_output_key(
* *
* \param[in,out] operation The key derivation operation object to read from. * \param[in,out] operation The key derivation operation object to read from.
* \param[in] expected_output Buffer containing the expected derivation output. * \param[in] expected_output Buffer containing the expected derivation output.
* \param output_length Length ot the expected output; this is also the * \param output_length Length of the expected output; this is also the
* number of bytes that will be read. * number of bytes that will be read.
* *
* \retval #PSA_SUCCESS * \retval #PSA_SUCCESS

View File

@ -4810,7 +4810,7 @@ static psa_status_t psa_generate_derived_ecc_key_weierstrass_helper(
/* 4. If k > N - 2, discard the result and return to step 1. /* 4. If k > N - 2, discard the result and return to step 1.
* Result of comparison is returned. When it indicates error * Result of comparison is returned. When it indicates error
* then this fuction is called again. * then this function is called again.
*/ */
MBEDTLS_MPI_CHK( mbedtls_mpi_lt_mpi_ct( &diff_N_2, &k, &key_out_of_range ) ); MBEDTLS_MPI_CHK( mbedtls_mpi_lt_mpi_ct( &diff_N_2, &k, &key_out_of_range ) );
} }

View File

@ -1854,7 +1854,7 @@ static inline int mbedtls_ssl_tls12_named_group_is_ecdhe( uint16_t named_group )
named_group == MBEDTLS_SSL_IANA_TLS_GROUP_BP384R1 || named_group == MBEDTLS_SSL_IANA_TLS_GROUP_BP384R1 ||
named_group == MBEDTLS_SSL_IANA_TLS_GROUP_BP512R1 || named_group == MBEDTLS_SSL_IANA_TLS_GROUP_BP512R1 ||
named_group == MBEDTLS_SSL_IANA_TLS_GROUP_X448 || named_group == MBEDTLS_SSL_IANA_TLS_GROUP_X448 ||
/* Below deprected curves should be removed with notice to users */ /* Below deprecated curves should be removed with notice to users */
named_group == MBEDTLS_SSL_IANA_TLS_GROUP_SECP192K1 || named_group == MBEDTLS_SSL_IANA_TLS_GROUP_SECP192K1 ||
named_group == MBEDTLS_SSL_IANA_TLS_GROUP_SECP192R1 || named_group == MBEDTLS_SSL_IANA_TLS_GROUP_SECP192R1 ||
named_group == MBEDTLS_SSL_IANA_TLS_GROUP_SECP224K1 || named_group == MBEDTLS_SSL_IANA_TLS_GROUP_SECP224K1 ||
@ -2167,7 +2167,7 @@ static inline int mbedtls_ssl_sig_alg_is_supported(
#endif /* MBEDTLS_SSL_PROTO_TLS1_2 && MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED */ #endif /* MBEDTLS_SSL_PROTO_TLS1_2 && MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED */
#if defined(MBEDTLS_USE_PSA_CRYPTO) #if defined(MBEDTLS_USE_PSA_CRYPTO)
/* Corresponding PSA algorithm for MBEDTLS_CIPHER_NULL. /* Corresponding PSA algorithm for MBEDTLS_CIPHER_NULL.
* Same value is used fo PSA_ALG_CATEGORY_CIPHER, hence it is * Same value is used for PSA_ALG_CATEGORY_CIPHER, hence it is
* guaranteed to not be a valid PSA algorithm identifier. * guaranteed to not be a valid PSA algorithm identifier.
*/ */
#define MBEDTLS_SSL_NULL_CIPHER 0x04000000 #define MBEDTLS_SSL_NULL_CIPHER 0x04000000

View File

@ -2918,7 +2918,7 @@ static int ssl_prepare_handshake_step( mbedtls_ssl_context *ssl )
* In the case of TLS 1.3, handshake step handlers do not send data to the * In the case of TLS 1.3, handshake step handlers do not send data to the
* peer. Data are only sent here and through * peer. Data are only sent here and through
* `mbedtls_ssl_handle_pending_alert` in case an error that triggered an * `mbedtls_ssl_handle_pending_alert` in case an error that triggered an
* alert occured. * alert occurred.
*/ */
if( ( ret = mbedtls_ssl_flush_output( ssl ) ) != 0 ) if( ( ret = mbedtls_ssl_flush_output( ssl ) ) != 0 )
return( ret ); return( ret );

View File

@ -982,7 +982,7 @@ static int ssl_tls13_get_sig_alg_from_pk( mbedtls_ssl_context *ssl,
#endif /* MBEDTLS_RSA_C */ #endif /* MBEDTLS_RSA_C */
default: default:
MBEDTLS_SSL_DEBUG_MSG( 1, MBEDTLS_SSL_DEBUG_MSG( 1,
( "unkown signature type : %u", sig ) ); ( "unknown signature type : %u", sig ) );
break; break;
} }
return( -1 ); return( -1 );

View File

@ -156,7 +156,7 @@ static psa_status_t aead_prepare( const char *info,
return( PSA_ERROR_INVALID_ARGUMENT ); return( PSA_ERROR_INVALID_ARGUMENT );
} }
/* Prepare key attibutes */ /* Prepare key attributes */
psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT; psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
psa_set_key_usage_flags( &attributes, PSA_KEY_USAGE_ENCRYPT ); psa_set_key_usage_flags( &attributes, PSA_KEY_USAGE_ENCRYPT );
psa_set_key_algorithm( &attributes, *alg ); psa_set_key_algorithm( &attributes, *alg );

View File

@ -1,7 +1,7 @@
#!/usr/bin/env python3 #!/usr/bin/env python3
"""Generate library/psa_crypto_driver_wrappers.c """Generate library/psa_crypto_driver_wrappers.c
This module is invoked by the build sripts to auto generate the This module is invoked by the build scripts to auto generate the
psa_crypto_driver_wrappers.c based on template files in psa_crypto_driver_wrappers.c based on template files in
script/data_files/driver_templates/. script/data_files/driver_templates/.
""" """

View File

@ -289,7 +289,7 @@ class SignatureAlgorithmDefinition:
{translation_table} {translation_table}
}}; }};
return "UNKOWN"; return "UNKNOWN";
}}''') }}''')
body = body.format(translation_table='\n'.join(translation_table)) body = body.format(translation_table='\n'.join(translation_table))
return body return body

View File

@ -923,7 +923,7 @@ class TestGenerator:
filename = self.filename_for(basename) filename = self.filename_for(basename)
test_case.write_data_file(filename, test_cases) test_case.write_data_file(filename, test_cases)
# Note that targets whose name containns 'test_format' have their content # Note that targets whose name contains 'test_format' have their content
# validated by `abi_check.py`. # validated by `abi_check.py`.
TARGETS = { TARGETS = {
'test_suite_psa_crypto_generate_key.generated': 'test_suite_psa_crypto_generate_key.generated':

View File

@ -10839,7 +10839,7 @@ run_test "TLS 1.3: Client authentication, client alg not in server list - ope
-c "client state: MBEDTLS_SSL_CLIENT_CERTIFICATE" \ -c "client state: MBEDTLS_SSL_CLIENT_CERTIFICATE" \
-c "client state: MBEDTLS_SSL_CLIENT_CERTIFICATE_VERIFY" \ -c "client state: MBEDTLS_SSL_CLIENT_CERTIFICATE_VERIFY" \
-c "signature algorithm not in received or offered list." \ -c "signature algorithm not in received or offered list." \
-C "unkown pk type" -C "unknown pk type"
requires_gnutls_tls1_3 requires_gnutls_tls1_3
requires_gnutls_next_no_ticket requires_gnutls_next_no_ticket
@ -10857,7 +10857,7 @@ run_test "TLS 1.3: Client authentication, client alg not in server list - gnu
-c "client state: MBEDTLS_SSL_CLIENT_CERTIFICATE" \ -c "client state: MBEDTLS_SSL_CLIENT_CERTIFICATE" \
-c "client state: MBEDTLS_SSL_CLIENT_CERTIFICATE_VERIFY" \ -c "client state: MBEDTLS_SSL_CLIENT_CERTIFICATE_VERIFY" \
-c "signature algorithm not in received or offered list." \ -c "signature algorithm not in received or offered list." \
-C "unkown pk type" -C "unknown pk type"
# Test using an opaque private key for client authentication # Test using an opaque private key for client authentication
requires_openssl_tls1_3 requires_openssl_tls1_3

View File

@ -262,7 +262,7 @@ void ecdh_restart( int id, data_t *dA, data_t *dB, data_t *z,
rnd_info_B.buf = dB->x; rnd_info_B.buf = dB->x;
rnd_info_B.length = dB->len; rnd_info_B.length = dB->len;
/* The ECDH context is not guaranteed ot have an mbedtls_ecp_group structure /* The ECDH context is not guaranteed to have an mbedtls_ecp_group structure
* in every configuration, therefore we load it separately. */ * in every configuration, therefore we load it separately. */
TEST_ASSERT( mbedtls_ecp_group_load( &grp, id ) == 0 ); TEST_ASSERT( mbedtls_ecp_group_load( &grp, id ) == 0 );

View File

@ -168,12 +168,12 @@ void pk_psa_utils( int key_is_rsa )
if( key_is_rsa ) if( key_is_rsa )
{ {
bitlen = 1024; /* harcoded in genkey() */ bitlen = 1024; /* hardcoded in genkey() */
key = pk_psa_genkey_rsa(); key = pk_psa_genkey_rsa();
} }
else else
{ {
bitlen = 256; /* harcoded in genkey() */ bitlen = 256; /* hardcoded in genkey() */
key = pk_psa_genkey_ecc(); key = pk_psa_genkey_ecc();
} }
if( mbedtls_svc_key_id_is_null( key ) ) if( mbedtls_svc_key_id_is_null( key ) )