diff options
author | Dimitris Apostolou <dimitris.apostolou@icloud.com> | 2022-01-03 01:00:27 +0200 |
---|---|---|
committer | Tomas Mraz <tomas@openssl.org> | 2022-11-09 15:30:29 +0100 |
commit | 0aaa71b90a9460e0e57c8e45163d1b2ba16e2d64 (patch) | |
tree | 5a64e3350b1c0c38ea14c0ce84929eb2cb3eba38 /test | |
parent | 53f2ed743700a15cb8e2d56a7f2ac77396f94e78 (diff) |
Fix typos
Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/17392)
(cherry picked from commit e304aa87b35fac5ea97c405dd3c21549faa45e78)
Diffstat (limited to 'test')
-rw-r--r-- | test/cmp_vfy_test.c | 2 | ||||
-rw-r--r-- | test/evp_extra_test.c | 4 | ||||
-rw-r--r-- | test/param_build_test.c | 4 | ||||
-rw-r--r-- | test/params_api_test.c | 2 | ||||
-rw-r--r-- | test/params_test.c | 2 | ||||
-rw-r--r-- | test/recipes/70-test_sslrecords.t | 2 | ||||
-rw-r--r-- | test/recipes/90-test_threads.t | 2 | ||||
-rw-r--r-- | test/ssl-tests/28-seclevel.cnf.in | 4 | ||||
-rw-r--r-- | test/sslapitest.c | 2 | ||||
-rw-r--r-- | test/tls-provider.c | 6 |
10 files changed, 15 insertions, 15 deletions
diff --git a/test/cmp_vfy_test.c b/test/cmp_vfy_test.c index 5aa6a008cc..caa0eeabff 100644 --- a/test/cmp_vfy_test.c +++ b/test/cmp_vfy_test.c @@ -417,7 +417,7 @@ static int execute_msg_check_test(CMP_VFY_TEST_FIXTURE *fixture) fixture->additional_arg))) return 0; - if (fixture->expected == 0) /* error expected aready during above check */ + if (fixture->expected == 0) /* error expected already during above check */ return 1; return TEST_int_eq(0, diff --git a/test/evp_extra_test.c b/test/evp_extra_test.c index caffdbd53f..3dd9503fb9 100644 --- a/test/evp_extra_test.c +++ b/test/evp_extra_test.c @@ -3026,9 +3026,9 @@ static int test_pkey_ctx_fail_without_provider(int tst) /* * We check for certain algos in the null provider. - * If an algo is expected to have a provider keymgmt, contructing an + * If an algo is expected to have a provider keymgmt, constructing an * EVP_PKEY_CTX is expected to fail (return NULL). - * Otherwise, if it's expected to have legacy support, contructing an + * Otherwise, if it's expected to have legacy support, constructing an * EVP_PKEY_CTX is expected to succeed (return non-NULL). */ switch (tst) { diff --git a/test/param_build_test.c b/test/param_build_test.c index bfa463acc5..c54cfd200e 100644 --- a/test/param_build_test.c +++ b/test/param_build_test.c @@ -294,7 +294,7 @@ static int builder_limit_test(void) } if (!TEST_ptr(params = OSSL_PARAM_BLD_to_param(bld))) goto err; - /* Count the elements in the params arrary, expecting n */ + /* Count the elements in the params array, expecting n */ for (i = 0; params[i].key != NULL; i++); if (!TEST_int_eq(i, n)) goto err; @@ -306,7 +306,7 @@ static int builder_limit_test(void) if (!TEST_true(OSSL_PARAM_BLD_push_int(bld, "g", 2)) || !TEST_ptr(params = OSSL_PARAM_BLD_to_param(bld))) goto err; - /* Count the elements in the params arrary, expecting 1 */ + /* Count the elements in the params array, expecting 1 */ for (i = 0; params[i].key != NULL; i++); if (!TEST_int_eq(i, 1)) goto err; diff --git a/test/params_api_test.c b/test/params_api_test.c index 48e2f8920a..76cc6c30be 100644 --- a/test/params_api_test.c +++ b/test/params_api_test.c @@ -78,7 +78,7 @@ static int test_param_type_extra(OSSL_PARAM *param, const unsigned char *cmp, const int signd = param->data_type == OSSL_PARAM_INTEGER; /* - * Set the unmodified sentinal directly because there is no param array + * Set the unmodified sentinel directly because there is no param array * for these tests. */ param->return_size = OSSL_PARAM_UNMODIFIED; diff --git a/test/params_test.c b/test/params_test.c index 6a970feaa4..bcf397a55f 100644 --- a/test/params_test.c +++ b/test/params_test.c @@ -46,7 +46,7 @@ struct object_st { */ double p2; /* - * Documented as an arbitrarly large unsigned integer. + * Documented as an arbitrarily large unsigned integer. * The data size must be large enough to accommodate. * Assumed data type OSSL_PARAM_UNSIGNED_INTEGER */ diff --git a/test/recipes/70-test_sslrecords.t b/test/recipes/70-test_sslrecords.t index 318c9235b0..9084ed1a21 100644 --- a/test/recipes/70-test_sslrecords.t +++ b/test/recipes/70-test_sslrecords.t @@ -88,7 +88,7 @@ use constant { }; # The TLSv1.2 in SSLv2 ClientHello need to run at security level 0 -# because in a SSLv2 ClientHello we can't send extentions to indicate +# because in a SSLv2 ClientHello we can't send extensions to indicate # which signature algorithm we want to use, and the default is SHA1. #Test 5: Inject an SSLv2 style record format for a TLSv1.2 ClientHello diff --git a/test/recipes/90-test_threads.t b/test/recipes/90-test_threads.t index d373fcbd16..4e892351ab 100644 --- a/test/recipes/90-test_threads.t +++ b/test/recipes/90-test_threads.t @@ -34,7 +34,7 @@ if ($no_fips) { } # Merge the configuration files into one filtering the contents so the failure -# condition is reproducable. A working FIPS configuration without the install +# condition is reproducible. A working FIPS configuration without the install # status is required. open CFGBASE, '<', $config_path; diff --git a/test/ssl-tests/28-seclevel.cnf.in b/test/ssl-tests/28-seclevel.cnf.in index 945f4599d1..2ec9ec1349 100644 --- a/test/ssl-tests/28-seclevel.cnf.in +++ b/test/ssl-tests/28-seclevel.cnf.in @@ -36,7 +36,7 @@ our @tests_ec = ( { # The Ed448 signature algorithm will not be enabled. # Because of the config order, the certificate is first loaded, and - # then the security level is chaged. If you try this with s_server + # then the security level is changed. If you try this with s_server # the order will be reversed and it will instead fail to load the key. name => "SECLEVEL 5 server with ED448 key", server => { "CipherString" => "DEFAULT:\@SECLEVEL=5", @@ -48,7 +48,7 @@ our @tests_ec = ( }, { # The client will not sent the Ed448 signature algorithm, so the server - # doesn't have a useable signature algorithm for the certificate. + # doesn't have a usable signature algorithm for the certificate. name => "SECLEVEL 5 client with ED448 key", server => { "CipherString" => "DEFAULT:\@SECLEVEL=4", "Certificate" => test_pem("server-ed448-cert.pem"), diff --git a/test/sslapitest.c b/test/sslapitest.c index 19adc96b73..fb0bff54ae 100644 --- a/test/sslapitest.c +++ b/test/sslapitest.c @@ -852,7 +852,7 @@ static int test_ccs_change_cipher(void) size_t readbytes; /* - * Create a conection so we can resume and potentially (but not) use + * Create a connection so we can resume and potentially (but not) use * a different cipher in the second connection. */ if (!TEST_true(create_ssl_ctx_pair(libctx, TLS_server_method(), diff --git a/test/tls-provider.c b/test/tls-provider.c index 5c44b6812e..adbe88da52 100644 --- a/test/tls-provider.c +++ b/test/tls-provider.c @@ -313,7 +313,7 @@ static const OSSL_DISPATCH xor_keyexch_functions[] = { static const OSSL_ALGORITHM tls_prov_keyexch[] = { /* - * Obviously this is not FIPS approved, but in order to test in conjuction + * Obviously this is not FIPS approved, but in order to test in conjunction * with the FIPS provider we pretend that it is. */ { "XOR", "provider=tls-provider,fips=yes", xor_keyexch_functions }, @@ -442,7 +442,7 @@ static const OSSL_DISPATCH xor_kem_functions[] = { static const OSSL_ALGORITHM tls_prov_kem[] = { /* - * Obviously this is not FIPS approved, but in order to test in conjuction + * Obviously this is not FIPS approved, but in order to test in conjunction * with the FIPS provider we pretend that it is. */ { "XOR", "provider=tls-provider,fips=yes", xor_kem_functions }, @@ -758,7 +758,7 @@ static const OSSL_DISPATCH xor_keymgmt_functions[] = { static const OSSL_ALGORITHM tls_prov_keymgmt[] = { /* - * Obviously this is not FIPS approved, but in order to test in conjuction + * Obviously this is not FIPS approved, but in order to test in conjunction * with the FIPS provider we pretend that it is. */ { "XOR", "provider=tls-provider,fips=yes", xor_keymgmt_functions }, |