mirror of
https://github.com/yuzu-emu/mbedtls.git
synced 2024-11-22 22:45:48 +01:00
Clarify Comments and Fix Typos (#651)
Fixes many typos, and errors in comments. * Clarifies many comments * Grammar correction in config.pl help text * Removed comment about MBEDTLS_X509_EXT_NS_CERT_TYPE. * Comment typo fix (Dont => Don't) * Comment typo fix (assure => ensure) * Comment typo fix (byes => bytes) * Added citation for quoted standard * Comment typo fix (one complement => 1's complement) The is some debate about whether to prefer "one's complement", "ones' complement", or "1's complement". The more recent RFCs related to TLS (RFC 6347, RFC 4347, etc) use " 1's complement", so I followed that convention. * Added missing ")" in comment * Comment alignment * Incorrect comment after #endif
This commit is contained in:
parent
9e655d33f9
commit
2adecba01f
@ -206,7 +206,7 @@ int mbedtls_rsa_check_pub_priv( const mbedtls_rsa_context *pub, const mbedtls_rs
|
|||||||
* \return 0 if successful, or an MBEDTLS_ERR_RSA_XXX error code
|
* \return 0 if successful, or an MBEDTLS_ERR_RSA_XXX error code
|
||||||
*
|
*
|
||||||
* \note This function does NOT take care of message
|
* \note This function does NOT take care of message
|
||||||
* padding. Also, be sure to set input[0] = 0 or assure that
|
* padding. Also, be sure to set input[0] = 0 or ensure that
|
||||||
* input is smaller than N.
|
* input is smaller than N.
|
||||||
*
|
*
|
||||||
* \note The input and output buffers must be large
|
* \note The input and output buffers must be large
|
||||||
|
@ -157,7 +157,7 @@
|
|||||||
#define MBEDTLS_X509_EXT_INIHIBIT_ANYPOLICY (1 << 13)
|
#define MBEDTLS_X509_EXT_INIHIBIT_ANYPOLICY (1 << 13)
|
||||||
#define MBEDTLS_X509_EXT_FRESHEST_CRL (1 << 14)
|
#define MBEDTLS_X509_EXT_FRESHEST_CRL (1 << 14)
|
||||||
|
|
||||||
#define MBEDTLS_X509_EXT_NS_CERT_TYPE (1 << 16) /* Parsed (and then ?) */
|
#define MBEDTLS_X509_EXT_NS_CERT_TYPE (1 << 16)
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Storage format identifiers
|
* Storage format identifiers
|
||||||
|
@ -62,7 +62,7 @@
|
|||||||
#if defined(MBEDTLS_SELF_TEST)
|
#if defined(MBEDTLS_SELF_TEST)
|
||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
#define mbedtls_printf printf
|
#define mbedtls_printf printf
|
||||||
#endif /* MBEDTLS_SELF_TEST && MBEDTLS_AES_C || MBEDTLS_DES_C */
|
#endif /* MBEDTLS_SELF_TEST */
|
||||||
#endif /* MBEDTLS_PLATFORM_C */
|
#endif /* MBEDTLS_PLATFORM_C */
|
||||||
|
|
||||||
/* Implementation that should never be optimized out by the compiler */
|
/* Implementation that should never be optimized out by the compiler */
|
||||||
@ -80,7 +80,7 @@ static void mbedtls_zeroize( void *v, size_t n ) {
|
|||||||
* with R_64 = 0x1B and R_128 = 0x87
|
* with R_64 = 0x1B and R_128 = 0x87
|
||||||
*
|
*
|
||||||
* Input and output MUST NOT point to the same buffer
|
* Input and output MUST NOT point to the same buffer
|
||||||
* Block size must be 8 byes or 16 bytes - the block sizes for DES and AES.
|
* Block size must be 8 bytes or 16 bytes - the block sizes for DES and AES.
|
||||||
*/
|
*/
|
||||||
static int cmac_multiply_by_u( unsigned char *output,
|
static int cmac_multiply_by_u( unsigned char *output,
|
||||||
const unsigned char *input,
|
const unsigned char *input,
|
||||||
|
@ -238,7 +238,7 @@ int mbedtls_net_bind( mbedtls_net_context *ctx, const char *bind_ip, const char
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/* I we ever get there, it's a success */
|
/* Bind was successful */
|
||||||
ret = 0;
|
ret = 0;
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
|
@ -1187,12 +1187,12 @@ int mbedtls_pk_parse_key( mbedtls_pk_context *pk,
|
|||||||
#endif /* MBEDTLS_PEM_PARSE_C */
|
#endif /* MBEDTLS_PEM_PARSE_C */
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* At this point we only know it's not a PEM formatted key. Could be any
|
* At this point we only know it's not a PEM formatted key. Could be any
|
||||||
* of the known DER encoded private key formats
|
* of the known DER encoded private key formats
|
||||||
*
|
*
|
||||||
* We try the different DER format parsers to see if one passes without
|
* We try the different DER format parsers to see if one passes without
|
||||||
* error
|
* error
|
||||||
*/
|
*/
|
||||||
#if defined(MBEDTLS_PKCS12_C) || defined(MBEDTLS_PKCS5_C)
|
#if defined(MBEDTLS_PKCS12_C) || defined(MBEDTLS_PKCS5_C)
|
||||||
if( ( ret = pk_parse_key_pkcs8_encrypted_der( pk, key, keylen,
|
if( ( ret = pk_parse_key_pkcs8_encrypted_der( pk, key, keylen,
|
||||||
pwd, pwdlen ) ) == 0 )
|
pwd, pwdlen ) ) == 0 )
|
||||||
|
@ -3428,7 +3428,7 @@ static int ssl_handle_possible_reconnect( mbedtls_ssl_context *ssl )
|
|||||||
|
|
||||||
if( ret == MBEDTLS_ERR_SSL_HELLO_VERIFY_REQUIRED )
|
if( ret == MBEDTLS_ERR_SSL_HELLO_VERIFY_REQUIRED )
|
||||||
{
|
{
|
||||||
/* Dont check write errors as we can't do anything here.
|
/* Don't check write errors as we can't do anything here.
|
||||||
* If the error is permanent we'll catch it later,
|
* If the error is permanent we'll catch it later,
|
||||||
* if it's not, then hopefully it'll work next time. */
|
* if it's not, then hopefully it'll work next time. */
|
||||||
(void) ssl->f_send( ssl->p_bio, ssl->out_buf, len );
|
(void) ssl->f_send( ssl->p_bio, ssl->out_buf, len );
|
||||||
@ -6006,8 +6006,9 @@ int mbedtls_ssl_conf_alpn_protocols( mbedtls_ssl_config *conf, const char **prot
|
|||||||
const char **p;
|
const char **p;
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* "Empty strings MUST NOT be included and byte strings MUST NOT be
|
* RFC 7301 3.1: "Empty strings MUST NOT be included and byte strings
|
||||||
* truncated". Check lengths now rather than later.
|
* MUST NOT be truncated."
|
||||||
|
* We check lengths now rather than later.
|
||||||
*/
|
*/
|
||||||
tot_len = 0;
|
tot_len = 0;
|
||||||
for( p = protos; *p != NULL; p++ )
|
for( p = protos; *p != NULL; p++ )
|
||||||
@ -7585,7 +7586,7 @@ int mbedtls_ssl_check_cert_usage( const mbedtls_x509_crt *cert,
|
|||||||
* and, for DTLS, to/from TLS equivalent.
|
* and, for DTLS, to/from TLS equivalent.
|
||||||
*
|
*
|
||||||
* For TLS this is the identity.
|
* For TLS this is the identity.
|
||||||
* For DTLS, use one complement (v -> 255 - v, and then map as follows:
|
* For DTLS, use 1's complement (v -> 255 - v, and then map as follows:
|
||||||
* 1.0 <-> 3.2 (DTLS 1.0 is based on TLS 1.1)
|
* 1.0 <-> 3.2 (DTLS 1.0 is based on TLS 1.1)
|
||||||
* 1.x <-> 3.x+1 for x != 0 (DTLS 1.2 based on TLS 1.2)
|
* 1.x <-> 3.x+1 for x != 0 (DTLS 1.2 based on TLS 1.2)
|
||||||
*/
|
*/
|
||||||
|
@ -661,7 +661,7 @@ int mbedtls_x509_get_sig_alg( const mbedtls_x509_buf *sig_oid, const mbedtls_x50
|
|||||||
|
|
||||||
/*
|
/*
|
||||||
* X.509 Extensions (No parsing of extensions, pointer should
|
* X.509 Extensions (No parsing of extensions, pointer should
|
||||||
* be either manually updated or extensions should be parsed!
|
* be either manually updated or extensions should be parsed!)
|
||||||
*/
|
*/
|
||||||
int mbedtls_x509_get_ext( unsigned char **p, const unsigned char *end,
|
int mbedtls_x509_get_ext( unsigned char **p, const unsigned char *end,
|
||||||
mbedtls_x509_buf *ext, int tag )
|
mbedtls_x509_buf *ext, int tag )
|
||||||
|
@ -70,7 +70,7 @@ Options
|
|||||||
used:
|
used:
|
||||||
$config_file
|
$config_file
|
||||||
-o | --force - If the symbol isn't present in the configuration
|
-o | --force - If the symbol isn't present in the configuration
|
||||||
file when setting it's value, a #define is
|
file when setting its value, a #define is
|
||||||
appended to the end of the file.
|
appended to the end of the file.
|
||||||
|
|
||||||
EOU
|
EOU
|
||||||
|
Loading…
Reference in New Issue
Block a user