diff options
Diffstat (limited to 'tests')
-rw-r--r-- | tests/global-init-override.c | 2 | ||||
-rw-r--r-- | tests/pkcs11/pkcs11-cert-import-url-exts.c | 2 | ||||
-rw-r--r-- | tests/pkcs11/pkcs11-cert-import-url4-exts.c | 2 | ||||
-rw-r--r-- | tests/pkcs11/pkcs11-get-raw-issuer-exts.c | 2 | ||||
-rw-r--r-- | tests/set-default-prio.c | 2 | ||||
-rwxr-xr-x | tests/slow/override-ciphers | 10 | ||||
-rw-r--r-- | tests/tls-session-ext-override.c | 24 |
7 files changed, 22 insertions, 22 deletions
diff --git a/tests/global-init-override.c b/tests/global-init-override.c index 618775c7f7..beeca03daa 100644 --- a/tests/global-init-override.c +++ b/tests/global-init-override.c @@ -37,7 +37,7 @@ #include "utils.h" -/* We test whether implicit global initialization can be overriden */ +/* We test whether implicit global initialization can be overridden */ GNUTLS_SKIP_GLOBAL_INIT diff --git a/tests/pkcs11/pkcs11-cert-import-url-exts.c b/tests/pkcs11/pkcs11-cert-import-url-exts.c index abc84834fd..bf806b1321 100644 --- a/tests/pkcs11/pkcs11-cert-import-url-exts.c +++ b/tests/pkcs11/pkcs11-cert-import-url-exts.c @@ -117,7 +117,7 @@ void doit(void) } if (ret == 0) { - fail("overriden cert is not a CA!\n"); + fail("overridden cert is not a CA!\n"); exit(1); } diff --git a/tests/pkcs11/pkcs11-cert-import-url4-exts.c b/tests/pkcs11/pkcs11-cert-import-url4-exts.c index 13dd76a6c2..f9fe82f4b1 100644 --- a/tests/pkcs11/pkcs11-cert-import-url4-exts.c +++ b/tests/pkcs11/pkcs11-cert-import-url4-exts.c @@ -142,7 +142,7 @@ void doit(void) } if (ret == 0) { - fail("overriden cert is not a CA!\n"); + fail("overridden cert is not a CA!\n"); exit(1); } diff --git a/tests/pkcs11/pkcs11-get-raw-issuer-exts.c b/tests/pkcs11/pkcs11-get-raw-issuer-exts.c index a395376f29..dec3088e11 100644 --- a/tests/pkcs11/pkcs11-get-raw-issuer-exts.c +++ b/tests/pkcs11/pkcs11-get-raw-issuer-exts.c @@ -126,7 +126,7 @@ void doit(void) } if (ret == 0) { - fail("overriden cert is not a CA!\n"); + fail("overridden cert is not a CA!\n"); exit(1); } diff --git a/tests/set-default-prio.c b/tests/set-default-prio.c index cf4f00b764..68e60d7889 100644 --- a/tests/set-default-prio.c +++ b/tests/set-default-prio.c @@ -97,7 +97,7 @@ static void start(struct test_st *test) ret = gnutls_set_default_priority_append(server, test->add_prio, &ep, 0); if (ret < 0) { if (test->exp_err == ret) { - /* the &ep value is only accurate when the default priorities are not overriden; + /* the &ep value is only accurate when the default priorities are not overridden; * otherwise it should be a pointer to the start of the string */ if (strchr(_gnutls_default_priority_string, '@') != 0) { if (ep != test->add_prio) { diff --git a/tests/slow/override-ciphers b/tests/slow/override-ciphers index a95253ba94..2a87b7655f 100755 --- a/tests/slow/override-ciphers +++ b/tests/slow/override-ciphers @@ -29,21 +29,21 @@ PROG=./cipher-override${EXEEXT} GNUTLS_NO_EXPLICIT_INIT=1 ${VALGRIND} ${PROG} ret=$? if test $ret != 0; then - echo "overriden cipher tests failed" + echo "overridden cipher tests failed" exit $ret fi ${VALGRIND} ${PROG} ret=$? if test $ret != 0; then - echo "overriden cipher tests 2 failed" + echo "overridden cipher tests 2 failed" exit $ret fi ${VALGRIND} ${PROG} ret=$? if test $ret != 0; then - echo "overriden cipher tests 3 failed" + echo "overridden cipher tests 3 failed" exit $ret fi @@ -54,14 +54,14 @@ else GNUTLS_NO_EXPLICIT_INIT=1 ${VALGRIND} ./mac-override ret=$? if test $ret != 0; then - echo "overriden mac tests failed" + echo "overridden mac tests failed" exit $ret fi ${VALGRIND} ./mac-override ret=$? if test $ret != 0; then - echo "overriden mac tests 2 failed" + echo "overridden mac tests 2 failed" exit $ret fi fi diff --git a/tests/tls-session-ext-override.c b/tests/tls-session-ext-override.c index 56bebe6644..9ddfc921f0 100644 --- a/tests/tls-session-ext-override.c +++ b/tests/tls-session-ext-override.c @@ -64,7 +64,7 @@ static int TLSEXT_TYPE_client_sent = 0; static int TLSEXT_TYPE_client_received = 0; static int TLSEXT_TYPE_server_sent = 0; static int TLSEXT_TYPE_server_received = 0; -static int overriden_extension = -1; +static int overridden_extension = -1; static const unsigned char ext_data[] = { @@ -82,7 +82,7 @@ static int ext_recv_client_params(gnutls_session_t session, const unsigned char TLSEXT_TYPE_client_received = 1; - gnutls_ext_set_data(session, overriden_extension, session); + gnutls_ext_set_data(session, overridden_extension, session); return 0; //Success } @@ -146,24 +146,24 @@ static void client(int sd) gnutls_transport_set_int(session, sd); gnutls_handshake_set_timeout(session, 20 * 1000); - ret = gnutls_session_ext_register(session, "ext_client", overriden_extension, GNUTLS_EXT_TLS, ext_recv_client_params, ext_send_client_params, NULL, NULL, NULL, 0); + ret = gnutls_session_ext_register(session, "ext_client", overridden_extension, GNUTLS_EXT_TLS, ext_recv_client_params, ext_send_client_params, NULL, NULL, NULL, 0); if (ret != GNUTLS_E_ALREADY_REGISTERED) - fail("client: register existing extension (%d)\n", overriden_extension); + fail("client: register existing extension (%d)\n", overridden_extension); ret = gnutls_session_ext_register(session, "ext_client", 0, GNUTLS_EXT_TLS, ext_recv_client_params, ext_send_client_params, NULL, NULL, NULL, GNUTLS_EXT_FLAG_OVERRIDE_INTERNAL); if (ret != GNUTLS_E_ALREADY_REGISTERED) fail("client: register extension %d\n", 0); - ret = gnutls_session_ext_register(session, "ext_client", overriden_extension, GNUTLS_EXT_TLS, ext_recv_client_params, ext_send_client_params, NULL, NULL, NULL, GNUTLS_EXT_FLAG_OVERRIDE_INTERNAL); + ret = gnutls_session_ext_register(session, "ext_client", overridden_extension, GNUTLS_EXT_TLS, ext_recv_client_params, ext_send_client_params, NULL, NULL, NULL, GNUTLS_EXT_FLAG_OVERRIDE_INTERNAL); if (ret < 0) - fail("client: register extension (%d)\n", overriden_extension); + fail("client: register extension (%d)\n", overridden_extension); /* Perform the TLS handshake */ ret = gnutls_handshake(session); if (ret < 0) { - fail("[%d]: client: Handshake failed\n", overriden_extension); + fail("[%d]: client: Handshake failed\n", overridden_extension); gnutls_perror(ret); goto end; } else { @@ -174,7 +174,7 @@ static void client(int sd) if (TLSEXT_TYPE_client_sent != 1 || TLSEXT_TYPE_client_received != 1) fail("client: extension not properly sent/received\n"); - ret = gnutls_ext_get_data(session, overriden_extension, &p); + ret = gnutls_ext_get_data(session, overridden_extension, &p); if (ret < 0) { fail("gnutls_ext_get_data: %s\n", gnutls_strerror(ret)); } @@ -226,11 +226,11 @@ static void server(int sd) gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, serverx509cred); - ret = gnutls_session_ext_register(session, "ext_server", overriden_extension, GNUTLS_EXT_TLS, ext_recv_server_params, ext_send_server_params, NULL, NULL, NULL, 0); + ret = gnutls_session_ext_register(session, "ext_server", overridden_extension, GNUTLS_EXT_TLS, ext_recv_server_params, ext_send_server_params, NULL, NULL, NULL, 0); if (ret != GNUTLS_E_ALREADY_REGISTERED) fail("client: register existing extension\n"); - ret = gnutls_session_ext_register(session, "ext_server", overriden_extension, GNUTLS_EXT_TLS, ext_recv_server_params, ext_send_server_params, NULL, NULL, NULL, GNUTLS_EXT_FLAG_OVERRIDE_INTERNAL); + ret = gnutls_session_ext_register(session, "ext_server", overridden_extension, GNUTLS_EXT_TLS, ext_recv_server_params, ext_send_server_params, NULL, NULL, NULL, GNUTLS_EXT_FLAG_OVERRIDE_INTERNAL); if (ret < 0) fail("client: register extension\n"); @@ -242,7 +242,7 @@ static void server(int sd) close(sd); gnutls_deinit(session); fail("[%d]: server: Handshake has failed (%s)\n\n", - overriden_extension, gnutls_strerror(ret)); + overridden_extension, gnutls_strerror(ret)); return; } if (debug) @@ -285,7 +285,7 @@ static void override_ext(unsigned extension) TLSEXT_TYPE_client_received = 0; TLSEXT_TYPE_server_sent = 0; TLSEXT_TYPE_server_received = 0; - overriden_extension = extension; + overridden_extension = extension; child = fork(); if (child < 0) { |