Fix typos in comments

Co-authored-by: David Horstmann <david.horstmann@arm.com>
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
This commit is contained in:
Manuel Pégourié-Gonnard 2024-08-20 10:58:20 +02:00 committed by Manuel Pégourié-Gonnard
parent 67072bf39a
commit 9e3e991d04
2 changed files with 4 additions and 4 deletions

View File

@ -1686,7 +1686,7 @@ static inline mbedtls_x509_crt *mbedtls_ssl_own_cert(mbedtls_ssl_context *ssl)
* leave NULL for no restartable behaviour.
*
* Return:
* - 0 if the certificate is the handshake should continue. Depending on the
* - 0 if the handshake should continue. Depending on the
* authmode it means:
* - REQUIRED: the certificate was found to be valid, trusted & acceptable.
* ssl->session_negotiate->verify_result is 0.

View File

@ -6386,7 +6386,7 @@ int mbedtls_ssl_check_cert_usage(const mbedtls_x509_crt *cert,
} else
#endif
{
/* This is either TLS 1.3 autentication, which always uses signatures,
/* This is either TLS 1.3 authentication, which always uses signatures,
* or 1.2 client auth: rsa_sign and mbedtls_ecdsa_sign are the only
* options we implement, both using signatures. */
(void) tls_version;
@ -8055,8 +8055,8 @@ int mbedtls_ssl_verify_certificate(mbedtls_ssl_context *ssl,
}
}
/* With authmode optional, we want to keep going it the certificate was
* unacceptable, but still fail on other error (out of memory etc),
/* With authmode optional, we want to keep going if the certificate was
* unacceptable, but still fail on other errors (out of memory etc),
* including fatal errors from the f_vrfy callback.
*
* The only acceptable errors are: