diff --git a/component/local_attest/sg_local_attest.h b/component/local_attest/sg_local_attest.h index e61507306526958c4c1bb6ff7563b1702f2ea0e5..8fa42da01edfb593a1157a317c79a3e53df57557 100644 --- a/component/local_attest/sg_local_attest.h +++ b/component/local_attest/sg_local_attest.h @@ -25,7 +25,7 @@ extern "C" { * [NOTICE] before calling cc_local_attest, the attestation service * need to be initialized by cc_prepare_ra_env, otherwise get report error * -* @param[in] taid, the unique ID stirng of target TA +* @param[in] taid, the unique ID string of target TA * * @param[in] img_hash, the static image measure of target TA * diff --git a/component/secure_channel/host/secure_channel_host.h b/component/secure_channel/host/secure_channel_host.h index 108dd8f14e59b25a8b8fe80d815f9804f5dfff8d..a292e6d28ba8fd938b32fcc8f6807e6ddccaf5af 100644 --- a/component/secure_channel/host/secure_channel_host.h +++ b/component/secure_channel/host/secure_channel_host.h @@ -35,7 +35,7 @@ typedef struct { cc_conn_kit_t conn_kit; } cc_sec_chl_conn_ctx_t; /** -* start seucre channel service +* start secure channel service * @param[in] ctx, The pointer of secure channel context * * @retval, On success, return 0. @@ -44,7 +44,7 @@ typedef struct { cc_enclave_result_t cc_sec_chl_svr_init(cc_sec_chl_svr_ctx_t *ctx); /** -* secure channel service uninit function, destory secure channel server resource +* secure channel service uninit function, destroy secure channel server resource * * @param[in] ctx, The pointer of secure channel context * diff --git a/component/secure_channel/secure_channel_common.h b/component/secure_channel/secure_channel_common.h index 4250e60e2e1f75eb089efb5815b5e100234d4541..846abeedc04273a8d3ce09f71eb4cc7826662ba9 100644 --- a/component/secure_channel/secure_channel_common.h +++ b/component/secure_channel/secure_channel_common.h @@ -29,7 +29,7 @@ typedef struct sec_chl_ecdh_ctx { size_t signature_len; // RSA_size(svr_rsa_key); int ec_nid; // Elliptic Curve nid EC_KEY *ecdh_key; // generate from ec_nid; include ecdh pubkey and privatekey - size_t ecdh_pubkey_len; // calucate from ecdh_key + size_t ecdh_pubkey_len; // calculate from ecdh_key size_t shared_key_len; uint8_t *shared_key; // ecdh output shared secret uint8_t session_key[SECURE_KEY_LEN]; // derived from shared key, used to encrypt/decrypt user data diff --git a/examples/secure_channel/Readme.md b/examples/secure_channel/Readme.md index 003e668aa48c44ecac2538cacef0d381f8e7acd5..bbda92a11923ddb689145012e07dc489f21a0fd3 100644 --- a/examples/secure_channel/Readme.md +++ b/examples/secure_channel/Readme.md @@ -29,7 +29,7 @@ ### Intel SGX ``` -// intall build require +// install build require sudo yum install -y cmake ocaml-dune linux-sgx-driver sgxsdk libsgx-launch libsgx-urts intel-sgx-ssl secGear-devel // clone secGear repository @@ -58,7 +58,7 @@ mkdir debug && cd debug && cmake .. && make && sudo make install #### 编译运行secGear样例 ``` -// intall build require depends openEuler 23.03 repo +// install build require depends openEuler 23.03 repo sudo yum install -y cmake ocaml-dune itrustee_sdk-devel secGear-devel // clone secGear repository diff --git a/examples/switchless_performance/README.md b/examples/switchless_performance/README.md index 9f40d28c89e321a2570d39e3d5ec731ad9dfeb08..7f37f4d8e6280f8e7c75d286958cab67b0532f71 100644 --- a/examples/switchless_performance/README.md +++ b/examples/switchless_performance/README.md @@ -39,7 +39,7 @@ switchless函数需添加'transition_using_threads'标识。 - 调用cc_malloc_shared_memory创建共享内存 - 调用cc_register_shared_memory注册共享内存 - 调用ecall函数 -- 调用cc_unregister_shared_memory去注册共享内存 +- 调用cc_unregister_shared_memory去注销共享内存 - 调用cc_free_shared_memory释放共享内存 - 调用cc_enclave_destroy销毁enclave diff --git a/service/attestation/attestation-service/README.md b/service/attestation/attestation-service/README.md index af33f25c3ecb9a690b456aa2edc87b19fb8e2c77..6443ab2f7a76a470644a89f348a02e3166c02953 100644 --- a/service/attestation/attestation-service/README.md +++ b/service/attestation/attestation-service/README.md @@ -13,7 +13,7 @@ baseurl=https://repo.openeuler.org/openEuler-24.09/everything/aarch64/ enabled=1 gpgcheck=0 -//run service in current host like this, initialize environment automaticly +//run service in current host like this, initialize environment automatically ./as_startup.sh //or in docker and specified ip:port diff --git a/service/attestation/attestation-service/verifier/src/virtcca/ima.rs b/service/attestation/attestation-service/verifier/src/virtcca/ima.rs index 4a9a9548b6847c687a4be1063c69873b63c00cef..7af55e8e8bfe47c2158dcec81c37ec69d375392d 100644 --- a/service/attestation/attestation-service/verifier/src/virtcca/ima.rs +++ b/service/attestation/attestation-service/verifier/src/virtcca/ima.rs @@ -57,7 +57,7 @@ impl ImaVerify { for event in events { let (name ,file_digest) = match event.data { EventData::ImaNg{digest, name} => (name, digest.digest), - _ => bail!("Inalid event {:?}", event), + _ => bail!("Invalid event {:?}", event), }; if name == "boot_aggregate".to_string() { continue; diff --git a/src/enclave_src/sgx/bottom_memory_check.c b/src/enclave_src/sgx/bottom_memory_check.c index 4c59858f44c554c6501a2f14694e00a6b252b874..f4f59710f27785e20d006fdac614388192250c54 100644 --- a/src/enclave_src/sgx/bottom_memory_check.c +++ b/src/enclave_src/sgx/bottom_memory_check.c @@ -16,7 +16,7 @@ * param buffer [IN] point to buffer address * param size [IN] buffer size to be checked * - * retval ture target buffer is within enclave + * retval true target buffer is within enclave * retval false target buffer is outside of enclave */ bool sgx_memory_in_enclave(const void *buffer, size_t size)