Fix typos in comments
Co-authored-by: David Horstmann <david.horstmann@arm.com>
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
diff --git a/library/ssl_misc.h b/library/ssl_misc.h
index b40f335..cbb1819 100644
--- a/library/ssl_misc.h
+++ b/library/ssl_misc.h
@@ -1686,7 +1686,7 @@
* leave NULL for no restartable behaviour.
*
* Return:
- * - 0 if the certificate is the handshake should continue. Depending on the
+ * - 0 if the handshake should continue. Depending on the
* authmode it means:
* - REQUIRED: the certificate was found to be valid, trusted & acceptable.
* ssl->session_negotiate->verify_result is 0.
diff --git a/library/ssl_tls.c b/library/ssl_tls.c
index 0081e04..e4a034c 100644
--- a/library/ssl_tls.c
+++ b/library/ssl_tls.c
@@ -6386,7 +6386,7 @@
} else
#endif
{
- /* This is either TLS 1.3 autentication, which always uses signatures,
+ /* This is either TLS 1.3 authentication, which always uses signatures,
* or 1.2 client auth: rsa_sign and mbedtls_ecdsa_sign are the only
* options we implement, both using signatures. */
(void) tls_version;
@@ -8055,8 +8055,8 @@
}
}
- /* With authmode optional, we want to keep going it the certificate was
- * unacceptable, but still fail on other error (out of memory etc),
+ /* With authmode optional, we want to keep going if the certificate was
+ * unacceptable, but still fail on other errors (out of memory etc),
* including fatal errors from the f_vrfy callback.
*
* The only acceptable errors are: