summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorEtienne Millon <me@emillon.org>2021-01-04 11:33:55 +0100
committerTomas Mraz <tmraz@fedoraproject.org>2021-01-05 16:44:09 +0100
commitb043c41c0059786eb78492fb64217053272ef37d (patch)
tree14aa24f4e76c80f243388174095da949defb8974
parentb2d14651533897b709208e633d4b4f590e0eff1c (diff)
28-seclevel.cnf.in: fix typo in algo name
CLA: trivial Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/13768)
-rw-r--r--test/ssl-tests/28-seclevel.cnf.in4
1 files changed, 2 insertions, 2 deletions
diff --git a/test/ssl-tests/28-seclevel.cnf.in b/test/ssl-tests/28-seclevel.cnf.in
index ebb082c0af..b7b96e87b7 100644
--- a/test/ssl-tests/28-seclevel.cnf.in
+++ b/test/ssl-tests/28-seclevel.cnf.in
@@ -34,7 +34,7 @@ our @tests_ec = (
test => { "ExpectedResult" => "Success" },
},
{
- # The Ed488 signature algorithm will not be enabled.
+ # The Ed448 signature algorithm will not be enabled.
# Because of the config order, the certificate is first loaded, and
# then the security level is chaged. If you try this with s_server
# the order will be reversed and it will instead fail to load the key.
@@ -47,7 +47,7 @@ our @tests_ec = (
test => { "ExpectedResult" => "ServerFail" },
},
{
- # The client will not sent the Ed488 signature algorithm, so the server
+ # The client will not sent the Ed448 signature algorithm, so the server
# doesn't have a useable signature algorithm for the certificate.
name => "SECLEVEL 5 client with ED448 key",
server => { "CipherString" => "DEFAULT:\@SECLEVEL=4",