diff --git a/src/internal.c b/src/internal.c index 95efbb6611..3596ebb0a2 100644 --- a/src/internal.c +++ b/src/internal.c @@ -17482,7 +17482,7 @@ int DoHandShakeMsgType(WOLFSSL* ssl, byte* input, word32* inOutIdx, /* The server's decision to resume isn't known until after the * "server_hello". If subsequent handshake messages like - * "certificate" or "server_key_exchange" are recevied then we + * "certificate" or "server_key_exchange" are received then we * are doing a full handshake */ /* If the server included a session id then we diff --git a/tests/api.c b/tests/api.c index 6800a07fd2..5c83aabfe9 100644 --- a/tests/api.c +++ b/tests/api.c @@ -60426,7 +60426,7 @@ static int test_X509_STORE_untrusted(void) ExpectIntEQ(test_X509_STORE_untrusted_certs(untrusted3, 1, 0, 1), TEST_SUCCESS); /* Still needs properly loaded CA, while including it in untrusted - * list is not an error, it also doesnt count for verify */ + * list is not an error, it also doesn't count for verify */ ExpectIntEQ(test_X509_STORE_untrusted_certs(untrusted3, 0, X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY, 0), TEST_SUCCESS); diff --git a/wolfcrypt/src/aes.c b/wolfcrypt/src/aes.c index 1cb98431aa..8887ef502f 100644 --- a/wolfcrypt/src/aes.c +++ b/wolfcrypt/src/aes.c @@ -8063,7 +8063,7 @@ static void GHASH_FINAL(Aes* aes, byte* s, word32 sSz) GHASH_LEN_BLOCK(aes); /* Copy the result into s. */ XMEMCPY(s, AES_TAG(aes), sSz); - /* reset aes->gcm.H in case of re-use */ + /* reset aes->gcm.H in case of reuse */ GHASH_INIT_EXTRA(aes); } #endif /* WOLFSSL_AESGCM_STREAM */