diff --git a/include/mbedtls/asn1.h b/include/mbedtls/asn1.h index 6e6834f63..5117fc7a4 100644 --- a/include/mbedtls/asn1.h +++ b/include/mbedtls/asn1.h @@ -209,7 +209,7 @@ mbedtls_asn1_named_data; * \return 0 if successful. * \return #MBEDTLS_ERR_ASN1_OUT_OF_DATA if the ASN.1 element * would end beyond \p end. - * \return #MBEDTLS_ERR_ASN1_INVALID_LENGTH if the length is unparseable. + * \return #MBEDTLS_ERR_ASN1_INVALID_LENGTH if the length is unparsable. */ int mbedtls_asn1_get_len( unsigned char **p, const unsigned char *end, diff --git a/include/mbedtls/check_config.h b/include/mbedtls/check_config.h index b64aa000f..be5c548e5 100644 --- a/include/mbedtls/check_config.h +++ b/include/mbedtls/check_config.h @@ -177,7 +177,7 @@ #endif #if defined(MBEDTLS_PKCS5_C) && !defined(MBEDTLS_MD_C) -#error "MBEDTLS_PKCS5_C defined, but not all prerequesites" +#error "MBEDTLS_PKCS5_C defined, but not all prerequisites" #endif #if defined(MBEDTLS_ENTROPY_C) && (!defined(MBEDTLS_SHA512_C) && \ diff --git a/include/mbedtls/config.h b/include/mbedtls/config.h index 84c7df870..6acd9b1d0 100644 --- a/include/mbedtls/config.h +++ b/include/mbedtls/config.h @@ -1914,7 +1914,7 @@ * unless you know for sure amplification cannot be a problem in the * environment in which your server operates. * - * \warning Disabling this can ba a security risk! (see above) + * \warning Disabling this can be a security risk! (see above) * * Requires: MBEDTLS_SSL_PROTO_DTLS * diff --git a/include/mbedtls/ssl.h b/include/mbedtls/ssl.h index 2213729a2..6b3ba48a1 100644 --- a/include/mbedtls/ssl.h +++ b/include/mbedtls/ssl.h @@ -2387,7 +2387,7 @@ void mbedtls_ssl_conf_dtls_anti_replay( mbedtls_ssl_config *conf, char mode ); * ones going through the authentication-decryption phase. * * \note This is a security trade-off related to the fact that it's - * often relatively easy for an active attacker ot inject UDP + * often relatively easy for an active attacker to inject UDP * datagrams. On one hand, setting a low limit here makes it * easier for such an attacker to forcibly terminated a * connection. On the other hand, a high limit or no limit diff --git a/tests/scripts/generate_psa_tests.py b/tests/scripts/generate_psa_tests.py index 3c76b0aaa..a705bab65 100755 --- a/tests/scripts/generate_psa_tests.py +++ b/tests/scripts/generate_psa_tests.py @@ -923,7 +923,7 @@ class TestGenerator: filename = self.filename_for(basename) test_case.write_data_file(filename, test_cases) - # Note that targets whose name containns 'test_format' have their content + # Note that targets whose name contains 'test_format' have their content # validated by `abi_check.py`. TARGETS = { 'test_suite_psa_crypto_generate_key.generated': diff --git a/tests/suites/test_suite_ecdh.function b/tests/suites/test_suite_ecdh.function index 69197e666..acc59c541 100644 --- a/tests/suites/test_suite_ecdh.function +++ b/tests/suites/test_suite_ecdh.function @@ -376,7 +376,7 @@ void ecdh_restart( int id, data_t *dA, data_t *dB, data_t *z, rnd_info_B.buf = dB->x; rnd_info_B.length = dB->len; - /* The ECDH context is not guaranteed ot have an mbedtls_ecp_group structure + /* The ECDH context is not guaranteed to have an mbedtls_ecp_group structure * in every configuration, therefore we load it separately. */ TEST_ASSERT( mbedtls_ecp_group_load( &grp, id ) == 0 );