Fix typos in comments

Co-authored-by: David Horstmann <david.horstmann@arm.com>
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
diff --git a/library/ssl_misc.h b/library/ssl_misc.h
index b40f335..cbb1819 100644
--- a/library/ssl_misc.h
+++ b/library/ssl_misc.h
@@ -1686,7 +1686,7 @@
  *              leave NULL for no restartable behaviour.
  *
  * Return:
- * - 0 if the certificate is the handshake should continue. Depending on the
+ * - 0 if the handshake should continue. Depending on the
  *   authmode it means:
  *   - REQUIRED: the certificate was found to be valid, trusted & acceptable.
  *     ssl->session_negotiate->verify_result is 0.
diff --git a/library/ssl_tls.c b/library/ssl_tls.c
index 0081e04..e4a034c 100644
--- a/library/ssl_tls.c
+++ b/library/ssl_tls.c
@@ -6386,7 +6386,7 @@
     } else
 #endif
     {
-        /* This is either TLS 1.3 autentication, which always uses signatures,
+        /* This is either TLS 1.3 authentication, which always uses signatures,
          * or 1.2 client auth: rsa_sign and mbedtls_ecdsa_sign are the only
          * options we implement, both using signatures. */
         (void) tls_version;
@@ -8055,8 +8055,8 @@
         }
     }
 
-    /* With authmode optional, we want to keep going it the certificate was
-     * unacceptable, but still fail on other error (out of memory etc),
+    /* With authmode optional, we want to keep going if the certificate was
+     * unacceptable, but still fail on other errors (out of memory etc),
      * including fatal errors from the f_vrfy callback.
      *
      * The only acceptable errors are: