hx509: Fix code spelling

Signed-off-by: Joseph Sutton <josephsutton@catalyst.net.nz>
This commit is contained in:
Joseph Sutton
2023-06-29 15:52:05 +12:00
committed by Jeffrey Altman
parent ef083a0e2c
commit 05602c2286

View File

@@ -977,14 +977,14 @@ hx509_cms_verify_signed_ext(hx509_context context,
"SignerInfo has signed attributes " "SignerInfo has signed attributes "
"but messageDigest (signature) " "but messageDigest (signature) "
"is missing"); "is missing");
goto next_sigature; goto next_signature;
} }
if (attr->value.len != 1) { if (attr->value.len != 1) {
ret = HX509_CRYPTO_SIGNATURE_MISSING; ret = HX509_CRYPTO_SIGNATURE_MISSING;
hx509_set_error_string(context, 0, ret, hx509_set_error_string(context, 0, ret,
"SignerInfo has more than one " "SignerInfo has more than one "
"messageDigest (signature)"); "messageDigest (signature)");
goto next_sigature; goto next_signature;
} }
ret = decode_MessageDigest(attr->value.val[0].data, ret = decode_MessageDigest(attr->value.val[0].data,
@@ -995,7 +995,7 @@ hx509_cms_verify_signed_ext(hx509_context context,
hx509_set_error_string(context, 0, ret, hx509_set_error_string(context, 0, ret,
"Failed to decode " "Failed to decode "
"messageDigest (signature)"); "messageDigest (signature)");
goto next_sigature; goto next_signature;
} }
ret = _hx509_verify_signature(context, ret = _hx509_verify_signature(context,
@@ -1007,7 +1007,7 @@ hx509_cms_verify_signed_ext(hx509_context context,
if (ret) { if (ret) {
hx509_set_error_string(context, HX509_ERROR_APPEND, ret, hx509_set_error_string(context, HX509_ERROR_APPEND, ret,
"Failed to verify messageDigest"); "Failed to verify messageDigest");
goto next_sigature; goto next_signature;
} }
/* /*
@@ -1022,7 +1022,7 @@ hx509_cms_verify_signed_ext(hx509_context context,
ret = HX509_CMS_DATA_OID_MISMATCH; ret = HX509_CMS_DATA_OID_MISMATCH;
hx509_set_error_string(context, 0, ret, hx509_set_error_string(context, 0, ret,
"More than one oid in signedAttrs"); "More than one oid in signedAttrs");
goto next_sigature; goto next_signature;
} }
ret = decode_ContentType(attr->value.val[0].data, ret = decode_ContentType(attr->value.val[0].data,
@@ -1033,7 +1033,7 @@ hx509_cms_verify_signed_ext(hx509_context context,
hx509_set_error_string(context, 0, ret, hx509_set_error_string(context, 0, ret,
"Failed to decode " "Failed to decode "
"oid in signedAttrs"); "oid in signedAttrs");
goto next_sigature; goto next_signature;
} }
match_oid = &decode_oid; match_oid = &decode_oid;
} }
@@ -1047,7 +1047,7 @@ hx509_cms_verify_signed_ext(hx509_context context,
if (match_oid == &decode_oid) if (match_oid == &decode_oid)
der_free_oid(&decode_oid); der_free_oid(&decode_oid);
hx509_clear_error_string(context); hx509_clear_error_string(context);
goto next_sigature; goto next_signature;
} }
if (size != signed_data.length) if (size != signed_data.length)
_hx509_abort("internal ASN.1 encoder error"); _hx509_abort("internal ASN.1 encoder error");
@@ -1091,7 +1091,7 @@ hx509_cms_verify_signed_ext(hx509_context context,
signed_data.data = NULL; signed_data.data = NULL;
} }
if (ret) if (ret)
goto next_sigature; goto next_signature;
/** /**
* If HX509_CMS_VS_NO_VALIDATE flags is set, return the signer * If HX509_CMS_VS_NO_VALIDATE flags is set, return the signer
@@ -1107,7 +1107,7 @@ hx509_cms_verify_signed_ext(hx509_context context,
found_valid_sig++; found_valid_sig++;
} }
next_sigature: next_signature:
if (cert) if (cert)
hx509_cert_free(cert); hx509_cert_free(cert);
cert = NULL; cert = NULL;