summaryrefslogtreecommitdiffstats
path: root/test
diff options
context:
space:
mode:
authorDimitris Apostolou <dimitris.apostolou@icloud.com>2022-01-03 01:00:27 +0200
committerTomas Mraz <tomas@openssl.org>2022-11-09 15:30:29 +0100
commit0aaa71b90a9460e0e57c8e45163d1b2ba16e2d64 (patch)
tree5a64e3350b1c0c38ea14c0ce84929eb2cb3eba38 /test
parent53f2ed743700a15cb8e2d56a7f2ac77396f94e78 (diff)
Fix typos
Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/17392) (cherry picked from commit e304aa87b35fac5ea97c405dd3c21549faa45e78)
Diffstat (limited to 'test')
-rw-r--r--test/cmp_vfy_test.c2
-rw-r--r--test/evp_extra_test.c4
-rw-r--r--test/param_build_test.c4
-rw-r--r--test/params_api_test.c2
-rw-r--r--test/params_test.c2
-rw-r--r--test/recipes/70-test_sslrecords.t2
-rw-r--r--test/recipes/90-test_threads.t2
-rw-r--r--test/ssl-tests/28-seclevel.cnf.in4
-rw-r--r--test/sslapitest.c2
-rw-r--r--test/tls-provider.c6
10 files changed, 15 insertions, 15 deletions
diff --git a/test/cmp_vfy_test.c b/test/cmp_vfy_test.c
index 5aa6a008cc..caa0eeabff 100644
--- a/test/cmp_vfy_test.c
+++ b/test/cmp_vfy_test.c
@@ -417,7 +417,7 @@ static int execute_msg_check_test(CMP_VFY_TEST_FIXTURE *fixture)
fixture->additional_arg)))
return 0;
- if (fixture->expected == 0) /* error expected aready during above check */
+ if (fixture->expected == 0) /* error expected already during above check */
return 1;
return
TEST_int_eq(0,
diff --git a/test/evp_extra_test.c b/test/evp_extra_test.c
index caffdbd53f..3dd9503fb9 100644
--- a/test/evp_extra_test.c
+++ b/test/evp_extra_test.c
@@ -3026,9 +3026,9 @@ static int test_pkey_ctx_fail_without_provider(int tst)
/*
* We check for certain algos in the null provider.
- * If an algo is expected to have a provider keymgmt, contructing an
+ * If an algo is expected to have a provider keymgmt, constructing an
* EVP_PKEY_CTX is expected to fail (return NULL).
- * Otherwise, if it's expected to have legacy support, contructing an
+ * Otherwise, if it's expected to have legacy support, constructing an
* EVP_PKEY_CTX is expected to succeed (return non-NULL).
*/
switch (tst) {
diff --git a/test/param_build_test.c b/test/param_build_test.c
index bfa463acc5..c54cfd200e 100644
--- a/test/param_build_test.c
+++ b/test/param_build_test.c
@@ -294,7 +294,7 @@ static int builder_limit_test(void)
}
if (!TEST_ptr(params = OSSL_PARAM_BLD_to_param(bld)))
goto err;
- /* Count the elements in the params arrary, expecting n */
+ /* Count the elements in the params array, expecting n */
for (i = 0; params[i].key != NULL; i++);
if (!TEST_int_eq(i, n))
goto err;
@@ -306,7 +306,7 @@ static int builder_limit_test(void)
if (!TEST_true(OSSL_PARAM_BLD_push_int(bld, "g", 2))
|| !TEST_ptr(params = OSSL_PARAM_BLD_to_param(bld)))
goto err;
- /* Count the elements in the params arrary, expecting 1 */
+ /* Count the elements in the params array, expecting 1 */
for (i = 0; params[i].key != NULL; i++);
if (!TEST_int_eq(i, 1))
goto err;
diff --git a/test/params_api_test.c b/test/params_api_test.c
index 48e2f8920a..76cc6c30be 100644
--- a/test/params_api_test.c
+++ b/test/params_api_test.c
@@ -78,7 +78,7 @@ static int test_param_type_extra(OSSL_PARAM *param, const unsigned char *cmp,
const int signd = param->data_type == OSSL_PARAM_INTEGER;
/*
- * Set the unmodified sentinal directly because there is no param array
+ * Set the unmodified sentinel directly because there is no param array
* for these tests.
*/
param->return_size = OSSL_PARAM_UNMODIFIED;
diff --git a/test/params_test.c b/test/params_test.c
index 6a970feaa4..bcf397a55f 100644
--- a/test/params_test.c
+++ b/test/params_test.c
@@ -46,7 +46,7 @@ struct object_st {
*/
double p2;
/*
- * Documented as an arbitrarly large unsigned integer.
+ * Documented as an arbitrarily large unsigned integer.
* The data size must be large enough to accommodate.
* Assumed data type OSSL_PARAM_UNSIGNED_INTEGER
*/
diff --git a/test/recipes/70-test_sslrecords.t b/test/recipes/70-test_sslrecords.t
index 318c9235b0..9084ed1a21 100644
--- a/test/recipes/70-test_sslrecords.t
+++ b/test/recipes/70-test_sslrecords.t
@@ -88,7 +88,7 @@ use constant {
};
# The TLSv1.2 in SSLv2 ClientHello need to run at security level 0
-# because in a SSLv2 ClientHello we can't send extentions to indicate
+# because in a SSLv2 ClientHello we can't send extensions to indicate
# which signature algorithm we want to use, and the default is SHA1.
#Test 5: Inject an SSLv2 style record format for a TLSv1.2 ClientHello
diff --git a/test/recipes/90-test_threads.t b/test/recipes/90-test_threads.t
index d373fcbd16..4e892351ab 100644
--- a/test/recipes/90-test_threads.t
+++ b/test/recipes/90-test_threads.t
@@ -34,7 +34,7 @@ if ($no_fips) {
}
# Merge the configuration files into one filtering the contents so the failure
-# condition is reproducable. A working FIPS configuration without the install
+# condition is reproducible. A working FIPS configuration without the install
# status is required.
open CFGBASE, '<', $config_path;
diff --git a/test/ssl-tests/28-seclevel.cnf.in b/test/ssl-tests/28-seclevel.cnf.in
index 945f4599d1..2ec9ec1349 100644
--- a/test/ssl-tests/28-seclevel.cnf.in
+++ b/test/ssl-tests/28-seclevel.cnf.in
@@ -36,7 +36,7 @@ our @tests_ec = (
{
# The Ed448 signature algorithm will not be enabled.
# Because of the config order, the certificate is first loaded, and
- # then the security level is chaged. If you try this with s_server
+ # then the security level is changed. If you try this with s_server
# the order will be reversed and it will instead fail to load the key.
name => "SECLEVEL 5 server with ED448 key",
server => { "CipherString" => "DEFAULT:\@SECLEVEL=5",
@@ -48,7 +48,7 @@ our @tests_ec = (
},
{
# The client will not sent the Ed448 signature algorithm, so the server
- # doesn't have a useable signature algorithm for the certificate.
+ # doesn't have a usable signature algorithm for the certificate.
name => "SECLEVEL 5 client with ED448 key",
server => { "CipherString" => "DEFAULT:\@SECLEVEL=4",
"Certificate" => test_pem("server-ed448-cert.pem"),
diff --git a/test/sslapitest.c b/test/sslapitest.c
index 19adc96b73..fb0bff54ae 100644
--- a/test/sslapitest.c
+++ b/test/sslapitest.c
@@ -852,7 +852,7 @@ static int test_ccs_change_cipher(void)
size_t readbytes;
/*
- * Create a conection so we can resume and potentially (but not) use
+ * Create a connection so we can resume and potentially (but not) use
* a different cipher in the second connection.
*/
if (!TEST_true(create_ssl_ctx_pair(libctx, TLS_server_method(),
diff --git a/test/tls-provider.c b/test/tls-provider.c
index 5c44b6812e..adbe88da52 100644
--- a/test/tls-provider.c
+++ b/test/tls-provider.c
@@ -313,7 +313,7 @@ static const OSSL_DISPATCH xor_keyexch_functions[] = {
static const OSSL_ALGORITHM tls_prov_keyexch[] = {
/*
- * Obviously this is not FIPS approved, but in order to test in conjuction
+ * Obviously this is not FIPS approved, but in order to test in conjunction
* with the FIPS provider we pretend that it is.
*/
{ "XOR", "provider=tls-provider,fips=yes", xor_keyexch_functions },
@@ -442,7 +442,7 @@ static const OSSL_DISPATCH xor_kem_functions[] = {
static const OSSL_ALGORITHM tls_prov_kem[] = {
/*
- * Obviously this is not FIPS approved, but in order to test in conjuction
+ * Obviously this is not FIPS approved, but in order to test in conjunction
* with the FIPS provider we pretend that it is.
*/
{ "XOR", "provider=tls-provider,fips=yes", xor_kem_functions },
@@ -758,7 +758,7 @@ static const OSSL_DISPATCH xor_keymgmt_functions[] = {
static const OSSL_ALGORITHM tls_prov_keymgmt[] = {
/*
- * Obviously this is not FIPS approved, but in order to test in conjuction
+ * Obviously this is not FIPS approved, but in order to test in conjunction
* with the FIPS provider we pretend that it is.
*/
{ "XOR", "provider=tls-provider,fips=yes", xor_keymgmt_functions },