From 77c89f5ad64ee8e7e1de611e6fde539907008a09 Mon Sep 17 00:00:00 2001 From: Ronald Cron Date: Tue, 10 Nov 2020 17:45:56 +0100 Subject: [PATCH] Fix several typos Signed-off-by: Ronald Cron --- include/mbedtls/config.h | 2 +- programs/psa/key_ladder_demo.c | 2 +- tests/suites/test_suite_psa_crypto_slot_management.function | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/include/mbedtls/config.h b/include/mbedtls/config.h index c930a8ff3..a85b0a45f 100644 --- a/include/mbedtls/config.h +++ b/include/mbedtls/config.h @@ -1266,7 +1266,7 @@ * which is currently hard-coded to be int32_t. * * Note that this option is meant for internal use only and may be removed - * without notice. It is incompatible with PSA_USE_PSA_CRYPTO. + * without notice. It is incompatible with MBEDTLS_USE_PSA_CRYPTO. */ //#define MBEDTLS_PSA_CRYPTO_KEY_ID_ENCODES_OWNER diff --git a/programs/psa/key_ladder_demo.c b/programs/psa/key_ladder_demo.c index c36b67faf..47d5de642 100644 --- a/programs/psa/key_ladder_demo.c +++ b/programs/psa/key_ladder_demo.c @@ -574,7 +574,7 @@ static psa_status_t run( enum program_mode mode, exit: /* Destroy any remaining key. Deinitializing the crypto library would do * this anyway since they are volatile keys, but explicitly destroying - * keys makes the code easier. */ + * keys makes the code easier to reuse. */ (void) psa_destroy_key( derivation_key ); (void) psa_destroy_key( wrapping_key ); /* Deinitialize the PSA crypto library. */ diff --git a/tests/suites/test_suite_psa_crypto_slot_management.function b/tests/suites/test_suite_psa_crypto_slot_management.function index 94bcade12..321ce4f33 100644 --- a/tests/suites/test_suite_psa_crypto_slot_management.function +++ b/tests/suites/test_suite_psa_crypto_slot_management.function @@ -106,7 +106,7 @@ static int invalidate_key( invalidate_method_t invalidate_method, case INVALIDATE_BY_DESTROYING_WITH_SHUTDOWN: PSA_ASSERT( psa_destroy_key( key ) ); break; - /* Purging the key just purge RAM data of persitent keys. */ + /* Purging the key just purges RAM data of persistent keys. */ case INVALIDATE_BY_PURGING: case INVALIDATE_BY_PURGING_WITH_SHUTDOWN: PSA_ASSERT( psa_purge_key( key ) );