mirror of
https://github.com/yuzu-emu/mbedtls.git
synced 2025-05-04 02:36:24 +00:00
Fixed typos in code
This commit is contained in:
parent
0f79babd4b
commit
75342a65e4
|
@ -122,7 +122,7 @@ ecp_point;
|
||||||
* prime. (Use odd in ecp_mul() and prime in ecdsa_sign() for blinding.)
|
* prime. (Use odd in ecp_mul() and prime in ecdsa_sign() for blinding.)
|
||||||
*
|
*
|
||||||
* In the case of Montgomery curves, we don't store A but (A + 2) / 4 which is
|
* In the case of Montgomery curves, we don't store A but (A + 2) / 4 which is
|
||||||
* the quantity actualy used in the formulas. Also, nbits is not the size of N
|
* the quantity actually used in the formulas. Also, nbits is not the size of N
|
||||||
* but the required size for private keys.
|
* but the required size for private keys.
|
||||||
*
|
*
|
||||||
* If modp is NULL, reduction modulo P is done using a generic algorithm.
|
* If modp is NULL, reduction modulo P is done using a generic algorithm.
|
||||||
|
@ -542,7 +542,7 @@ int ecp_sub( const ecp_group *grp, ecp_point *R,
|
||||||
*
|
*
|
||||||
* \note If f_rng is not NULL, it is used to randomize intermediate
|
* \note If f_rng is not NULL, it is used to randomize intermediate
|
||||||
* results in order to prevent potential timing attacks
|
* results in order to prevent potential timing attacks
|
||||||
* targetting these results. It is recommended to always
|
* targeting these results. It is recommended to always
|
||||||
* provide a non-NULL f_rng (the overhead is negligible).
|
* provide a non-NULL f_rng (the overhead is negligible).
|
||||||
*/
|
*/
|
||||||
int ecp_mul( ecp_group *grp, ecp_point *R,
|
int ecp_mul( ecp_group *grp, ecp_point *R,
|
||||||
|
|
|
@ -326,7 +326,7 @@
|
||||||
#define OID_ANSI_X9_62_PRIME_FIELD OID_ANSI_X9_62_FIELD_TYPE "\x01"
|
#define OID_ANSI_X9_62_PRIME_FIELD OID_ANSI_X9_62_FIELD_TYPE "\x01"
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* ECDSA signature identifers, from RFC 5480
|
* ECDSA signature identifiers, from RFC 5480
|
||||||
*/
|
*/
|
||||||
#define OID_ANSI_X9_62_SIG OID_ANSI_X9_62 "\x04" /* signatures(4) */
|
#define OID_ANSI_X9_62_SIG OID_ANSI_X9_62 "\x04" /* signatures(4) */
|
||||||
#define OID_ANSI_X9_62_SIG_SHA2 OID_ANSI_X9_62_SIG "\x03" /* ecdsa-with-SHA2(3) */
|
#define OID_ANSI_X9_62_SIG_SHA2 OID_ANSI_X9_62_SIG "\x03" /* ecdsa-with-SHA2(3) */
|
||||||
|
|
|
@ -137,7 +137,7 @@
|
||||||
#define POLARSSL_ERR_SSL_BAD_HS_NEW_SESSION_TICKET -0x6E00 /**< Processing of the NewSessionTicket handshake message failed. */
|
#define POLARSSL_ERR_SSL_BAD_HS_NEW_SESSION_TICKET -0x6E00 /**< Processing of the NewSessionTicket handshake message failed. */
|
||||||
#define POLARSSL_ERR_SSL_SESSION_TICKET_EXPIRED -0x6D80 /**< Session ticket has expired. */
|
#define POLARSSL_ERR_SSL_SESSION_TICKET_EXPIRED -0x6D80 /**< Session ticket has expired. */
|
||||||
#define POLARSSL_ERR_SSL_PK_TYPE_MISMATCH -0x6D00 /**< Public key type mismatch (eg, asked for RSA key exchange and presented EC key) */
|
#define POLARSSL_ERR_SSL_PK_TYPE_MISMATCH -0x6D00 /**< Public key type mismatch (eg, asked for RSA key exchange and presented EC key) */
|
||||||
#define POLARSSL_ERR_SSL_UNKNOWN_IDENTITY -0x6C80 /**< Unkown identity received (eg, PSK identity) */
|
#define POLARSSL_ERR_SSL_UNKNOWN_IDENTITY -0x6C80 /**< Unknown identity received (eg, PSK identity) */
|
||||||
#define POLARSSL_ERR_SSL_INTERNAL_ERROR -0x6C00 /**< Internal error (eg, unexpected failure in lower-level module) */
|
#define POLARSSL_ERR_SSL_INTERNAL_ERROR -0x6C00 /**< Internal error (eg, unexpected failure in lower-level module) */
|
||||||
#define POLARSSL_ERR_SSL_COUNTER_WRAPPING -0x6B80 /**< A counter would wrap (eg, too many messages exchanged). */
|
#define POLARSSL_ERR_SSL_COUNTER_WRAPPING -0x6B80 /**< A counter would wrap (eg, too many messages exchanged). */
|
||||||
|
|
||||||
|
|
|
@ -230,7 +230,7 @@ const char *x509_oid_get_description( x509_buf *oid );
|
||||||
* \param size Maximum size of buffer
|
* \param size Maximum size of buffer
|
||||||
* \param oid Buffer containing the OID
|
* \param oid Buffer containing the OID
|
||||||
*
|
*
|
||||||
* \return Length of the string written (exluding final NULL) or
|
* \return Length of the string written (excluding final NULL) or
|
||||||
* POLARSSL_ERR_OID_BUF_TO_SMALL in case of error
|
* POLARSSL_ERR_OID_BUF_TO_SMALL in case of error
|
||||||
*/
|
*/
|
||||||
int x509_oid_get_numeric_string( char *buf, size_t size, x509_buf *oid );
|
int x509_oid_get_numeric_string( char *buf, size_t size, x509_buf *oid );
|
||||||
|
|
|
@ -430,7 +430,7 @@ void polarssl_strerror( int ret, char *buf, size_t buflen )
|
||||||
if( use_ret == -(POLARSSL_ERR_SSL_PK_TYPE_MISMATCH) )
|
if( use_ret == -(POLARSSL_ERR_SSL_PK_TYPE_MISMATCH) )
|
||||||
snprintf( buf, buflen, "SSL - Public key type mismatch (eg, asked for RSA key exchange and presented EC key)" );
|
snprintf( buf, buflen, "SSL - Public key type mismatch (eg, asked for RSA key exchange and presented EC key)" );
|
||||||
if( use_ret == -(POLARSSL_ERR_SSL_UNKNOWN_IDENTITY) )
|
if( use_ret == -(POLARSSL_ERR_SSL_UNKNOWN_IDENTITY) )
|
||||||
snprintf( buf, buflen, "SSL - Unkown identity received (eg, PSK identity)" );
|
snprintf( buf, buflen, "SSL - Unknown identity received (eg, PSK identity)" );
|
||||||
if( use_ret == -(POLARSSL_ERR_SSL_INTERNAL_ERROR) )
|
if( use_ret == -(POLARSSL_ERR_SSL_INTERNAL_ERROR) )
|
||||||
snprintf( buf, buflen, "SSL - Internal error (eg, unexpected failure in lower-level module)" );
|
snprintf( buf, buflen, "SSL - Internal error (eg, unexpected failure in lower-level module)" );
|
||||||
if( use_ret == -(POLARSSL_ERR_SSL_COUNTER_WRAPPING) )
|
if( use_ret == -(POLARSSL_ERR_SSL_COUNTER_WRAPPING) )
|
||||||
|
|
|
@ -86,7 +86,7 @@ const pk_info_t * pk_info_from_type( pk_type_t pk_type )
|
||||||
case POLARSSL_PK_ECDSA:
|
case POLARSSL_PK_ECDSA:
|
||||||
return &ecdsa_info;
|
return &ecdsa_info;
|
||||||
#endif
|
#endif
|
||||||
/* POLARSSL_PK_RSA_ALT ommited on purpose */
|
/* POLARSSL_PK_RSA_ALT omitted on purpose */
|
||||||
default:
|
default:
|
||||||
return NULL;
|
return NULL;
|
||||||
}
|
}
|
||||||
|
|
|
@ -259,7 +259,7 @@ const pk_info_t eckey_info = {
|
||||||
};
|
};
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* EC key resticted to ECDH
|
* EC key restricted to ECDH
|
||||||
*/
|
*/
|
||||||
static int eckeydh_can_do( pk_type_t type )
|
static int eckeydh_can_do( pk_type_t type )
|
||||||
{
|
{
|
||||||
|
|
Loading…
Reference in a new issue