chore: fix typos across codebase (#2244)

* Update PROCEDURES.md

Signed-off-by: sukrucildirr <sukrucildirr@gmail.com>

* Update FUZZING.md

Signed-off-by: sukrucildirr <sukrucildirr@gmail.com>

* Update vectors_kem.c

Signed-off-by: sukrucildirr <sukrucildirr@gmail.com>

* Update ossl_functions.h

Signed-off-by: sukrucildirr <sukrucildirr@gmail.com>

---------

Signed-off-by: sukrucildirr <sukrucildirr@gmail.com>
This commit is contained in:
sukrucildirr 2025-08-18 17:19:28 +03:00 committed by GitHub
parent da42a978d1
commit 2dc4afc2cf
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
4 changed files with 5 additions and 5 deletions

View File

@ -43,7 +43,7 @@ You'll now be able to run a fuzz test e.g.
#9764 NEW cov: 4 ft: 708 corp: 100/318b lim: 43 exec/s: 9764 rss: 362Mb L: 41/41 MS: 4 EraseBytes-InsertRepeatedBytes-CMP-ChangeBit- DE: "\0004m\372"-
...
```
The fuzzer will run indefinetely or;
The fuzzer will run indefinitely or;
- until it finds a bug and crashes,
- you manually stop the fuzzer i.e. CTRL-C
- you set a timeout using the command line.

View File

@ -32,7 +32,7 @@ To add a new, or changed dependency:
### Github Actions
All actions used in `.github/worfklows` should pin the exact version of the action they are using, for
All actions used in `.github/workflows` should pin the exact version of the action they are using, for
example a step such as:
```yaml

View File

@ -3,7 +3,7 @@
// This file lists all OpenSSL functions used throughout the liboqs source code.
//
// Note that this file is included multiple times to generate custom
// code by definining the FUNC macro, so no header guard should be
// code by defining the FUNC macro, so no header guard should be
// added here.
VOID_FUNC(void, ERR_print_errors_fp, (FILE *fp), (fp))

View File

@ -117,7 +117,7 @@ static inline bool sanityCheckSK(const uint8_t *sk, const char *method_name) {
fprintf(stderr, "K value can be fetched only for ML-KEM !\n");
return false;
}
/* calcualte hash of the public key(len = 384k+32) stored in private key at offset of 384k */
/* calculate hash of the public key(len = 384k+32) stored in private key at offset of 384k */
OQS_SHA3_sha3_256(pkdig, sk + (ML_KEM_POLYBYTES * K), (ML_KEM_POLYBYTES * K) + 32);
/* compare it with public key hash stored at 768k+32 offset */
if (0 != memcmp(pkdig, sk + (ML_KEM_POLYBYTES * K * 2) + 32, SHA3_256_OP_LEN)) {
@ -170,7 +170,7 @@ static inline bool sanityCheckPK(const uint8_t *pk, size_t pkLen, const char *me
buff_enc[3 * j + 2] = (uint8_t)(t1 >> 4);
}
}
/* compare the encoded value with original public key. discard value of `rho(32 bytes)` during comparision as its not encoded */
/* compare the encoded value with original public key. discard value of `rho(32 bytes)` during comparison as its not encoded */
if (0 != memcmp(buffe, pk, pkLen - 32)) {
return false;
}