diff --git a/src/crypto/MerkleTreeProof/argon2.h b/src/crypto/MerkleTreeProof/argon2.h index 61cea72eb3..fc8682c2db 100644 --- a/src/crypto/MerkleTreeProof/argon2.h +++ b/src/crypto/MerkleTreeProof/argon2.h @@ -93,7 +93,7 @@ extern "C" { #define ARGON2_FLAG_CLEAR_SECRET (UINT32_C(1) << 1) /* Global flag to determine if we are wiping internal memory buffers. This flag - * is defined in core.c and deafults to 1 (wipe internal memory). */ + * is defined in core.c and defaults to 1 (wipe internal memory). */ extern int FLAG_clear_internal_memory; /* Error codes */ diff --git a/src/ctpl.h b/src/ctpl.h index 64f650d3e8..73a43373ca 100644 --- a/src/ctpl.h +++ b/src/ctpl.h @@ -116,7 +116,7 @@ namespace ctpl { // wait for all computing threads to finish and stop all threads - // may be called asyncronously to not pause the calling thread while waiting + // may be called asynchronously to not pause the calling thread while waiting // if isWait == true, all the functions in the queue are run, otherwise the queue is cleared without running the functions void stop(bool isWait = false) { if (!isWait) { diff --git a/src/fixed.h b/src/fixed.h index 19d0107b18..36a766206b 100644 --- a/src/fixed.h +++ b/src/fixed.h @@ -222,7 +222,7 @@ namespace detail { // lets us do things like "typedef numeric::fixed_from_type::fixed_type fixed"; -// NOTE: that we will use a type of equivalent size, not neccessarily the type +// NOTE: that we will use a type of equivalent size, not necessarily the type // specified. Should make little to no difference to the user template struct fixed_from_type { diff --git a/src/fuzz/FuzzedDataProvider.h b/src/fuzz/FuzzedDataProvider.h index 9f66afc9e7..ce16e95e17 100644 --- a/src/fuzz/FuzzedDataProvider.h +++ b/src/fuzz/FuzzedDataProvider.h @@ -158,7 +158,7 @@ FuzzedDataProvider::ConsumeRandomLengthString(size_t max_length) { // picking its contents. std::string result; - // Reserve the anticipated capaticity to prevent several reallocations. + // Reserve the anticipated capacity to prevent several reallocations. result.reserve(std::min(max_length, remaining_bytes_)); for (size_t i = 0; i < max_length && remaining_bytes_ != 0; ++i) { char next = ConvertUnsignedToSigned(data_ptr_[0]); diff --git a/src/fuzz/README.md b/src/fuzz/README.md index e3c68835e9..f23b23732b 100644 --- a/src/fuzz/README.md +++ b/src/fuzz/README.md @@ -75,7 +75,7 @@ example: 2. `honggfuzz -i ../input -- ./../libspark/bpplus_hfuzz ___FILE___` 3. To stop press `ctrl+c` -Here we are providing an empty corpora. In case of an already available corpora, we can provide the availabe corpora. +Here we are providing an empty corpora. In case of an already available corpora, we can provide the available corpora. The flag `-i` is for the input folder which we are providing `./../_hfuzz>` is the target binary which we want to fuzz. ### Analyzing the crashes @@ -129,7 +129,7 @@ sudo make install Once successfully installed, follow the below instructions to generate the code-coverage 1. First compile the harness with gdb flag. run `make _debug` inside src/fuzz to compile using gdb debugger. -2. take the input_folder as the input corpora from fuzzing or one can also create it by running: `honggfuzz -i -– ./_hfuzz ___FILE___ @@`. This will start the fuzzer. Kill it by `ctrl+C`. The fuzzer will generate some random inputs inside the input_folder. Since kcov will generate coverage for each input inside the input_folder, it's preffered to have only a few inputs, otherwise it will take a long time to generate the entire coverage. +2. take the input_folder as the input corpora from fuzzing or one can also create it by running: `honggfuzz -i -– ./_hfuzz ___FILE___ @@`. This will start the fuzzer. Kill it by `ctrl+C`. The fuzzer will generate some random inputs inside the input_folder. Since kcov will generate coverage for each input inside the input_folder, it's preferred to have only a few inputs, otherwise it will take a long time to generate the entire coverage. 3. inside the `generate_coverage.sh` replace the input_folder, output_folder and fuzz_exe by your inpur corpora, coverage output folder and harness binary. 4. run `./generate_coverage.sh`. This will generated a merged output for all the inputs present in the input_folder. diff --git a/src/hdmint/wallet.cpp b/src/hdmint/wallet.cpp index 98444fd720..829dcc3448 100644 --- a/src/hdmint/wallet.cpp +++ b/src/hdmint/wallet.cpp @@ -788,7 +788,7 @@ CKeyID CHDMintWallet::GetMintSeedID(CWalletDB& walletdb, int32_t nCount){ * @param mintSeed * @param nCount (optional) count in the HD Chain of the key to use for mint generation. * @param seedId (optional) seedId of the key to use for mint generation. - * @return sucess + * @return success */ bool CHDMintWallet::CreateMintSeed(CWalletDB& walletdb, uint512& mintSeed, const int32_t& nCount, CKeyID& seedId, bool fWriteChain) {