Skip to content

Commit bf875f2

Browse files
authored
Merge pull request #46 from per1234/fix-typos
Fix typos in documentation
2 parents 022ac98 + a11f92a commit bf875f2

File tree

5 files changed

+9
-9
lines changed

5 files changed

+9
-9
lines changed

examples/ECCX08HMAC/ECCX08HMAC.ino

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
/*
22
ECCX08 HMAC functionality example
33
4-
This sketch uses the ECC608 to generate an hmac on some data.
4+
This sketch uses the ECC608 to generate an HMAC on some data.
55
Stores key using nonce.
66
77
Tested on the Arduino Nano RP2040.

examples/ECCX08RandomNumber/ECCX08RandomNumber.ino

+1-1
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
ECCX08 Random Number
33
44
This sketch uses the ECC508 or ECC608 to generate a random number
5-
every second and print it to the Serial monitor
5+
every second and print it to the Serial Monitor
66
77
Circuit:
88
- MKR board with ECC508 or ECC608 on board

examples/ECCX08Signing/ECCX08Signing.ino

+3-3
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
44
This sketch uses the ECC508 or ECC608 to sign some data
55
using the private key of a key slot, the signature
6-
is printed to the Serial monitor. Then the signature is
6+
is printed to the Serial Monitor. Then the signature is
77
verified using the public key of the slot.
88
99
NOTE: the input data must be 64 bytes in length!
@@ -69,14 +69,14 @@ void setup() {
6969

7070
Serial.println();
7171

72-
// To make the signature verifcation fail, uncomment the next line:
72+
// To make the signature verification fail, uncomment the next line:
7373
// signature[0] = 0x00;
7474

7575
// validate the signature
7676
if (ECCX08.ecdsaVerify(input, signature, publicKey)) {
7777
Serial.println("Verified signature successfully :D");
7878
} else {
79-
Serial.println("oh no! failed to verify signature :(");
79+
Serial.println("Oh no! Failed to verify signature :(");
8080
}
8181
}
8282

examples/Tools/ECCX08SelfSignedCert/ECCX08SelfSignedCert.ino

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
This sketch can be used to generate a self signed certificate
55
for a private key generated in an ECC508/ECC608 crypto chip slot.
66
The issue and expired date, and signature are stored in another
7-
slot for reconstrution.
7+
slot for reconstruction.
88
99
If the ECC508/ECC608 is not configured and locked it prompts
1010
the user to configure and lock the chip with a default TLS

src/ECCX08.cpp

+3-3
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ int ECCX08Class::begin()
6262

6363
void ECCX08Class::end()
6464
{
65-
// First wake up the device otherwise the chip didn't react to a sleep commando
65+
// First wake up the device otherwise the chip didn't react to a sleep command
6666
wakeup();
6767
sleep();
6868
#ifdef WIRE_HAS_END
@@ -627,7 +627,7 @@ int ECCX08Class::challenge(const byte message[])
627627
return 0;
628628
}
629629

630-
// Nounce, pass through
630+
// Nonce, pass through
631631
if (!sendCommand(0x16, 0x03, 0x0000, message, 32)) {
632632
return 0;
633633
}
@@ -807,7 +807,7 @@ int ECCX08Class::addressForSlotOffset(int slot, int offset)
807807

808808
int ECCX08Class::sendCommand(uint8_t opcode, uint8_t param1, uint16_t param2, const byte data[], size_t dataLength)
809809
{
810-
int commandLength = 8 + dataLength; // 1 for type, 1 for length, 1 for opcode, 1 for param1, 2 for param2, 2 for crc
810+
int commandLength = 8 + dataLength; // 1 for type, 1 for length, 1 for opcode, 1 for param1, 2 for param2, 2 for CRC
811811
byte command[commandLength];
812812

813813
command[0] = 0x03;

0 commit comments

Comments
 (0)