diff options
author | Josh Soref <jsoref@users.noreply.github.com> | 2017-11-11 19:03:10 -0500 |
---|---|---|
committer | Rich Salz <rsalz@openssl.org> | 2017-11-11 19:03:10 -0500 |
commit | 46f4e1bec51dc96fa275c168752aa34359d9ee51 (patch) | |
tree | c80b737d1fff479fd88f6c41175187ebad868299 /test/recipes | |
parent | b4d0fa49d9d1a43792e58b0c8066bb23b9e53ef4 (diff) | |
download | openssl-new-46f4e1bec51dc96fa275c168752aa34359d9ee51.tar.gz |
Many spelling fixes/typo's corrected.
Around 138 distinct errors found and fixed; thanks!
Reviewed-by: Kurt Roeckx <kurt@roeckx.be>
Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Rich Salz <rsalz@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/3459)
Diffstat (limited to 'test/recipes')
-rw-r--r-- | test/recipes/25-test_verify.t | 6 | ||||
-rw-r--r-- | test/recipes/70-test_key_share.t | 2 | ||||
-rw-r--r-- | test/recipes/70-test_sslmessages.t | 2 | ||||
-rw-r--r-- | test/recipes/70-test_sslrecords.t | 6 | ||||
-rw-r--r-- | test/recipes/70-test_tls13kexmodes.t | 8 | ||||
-rw-r--r-- | test/recipes/80-test_pkcs12.t | 2 | ||||
-rw-r--r-- | test/recipes/80-test_ssl_old.t | 2 |
7 files changed, 14 insertions, 14 deletions
diff --git a/test/recipes/25-test_verify.t b/test/recipes/25-test_verify.t index 4d3e8963d1..a196129233 100644 --- a/test/recipes/25-test_verify.t +++ b/test/recipes/25-test_verify.t @@ -322,13 +322,13 @@ ok(!verify("badalt7-cert", "sslserver", ["root-cert"], ["ncca1-cert"], ), "Name Constraints CN BMPSTRING hostname not permitted"); ok(!verify("badalt8-cert", "sslserver", ["root-cert"], ["ncca1-cert", "ncca3-cert"], ), - "Name constaints nested DNS name not permitted 1"); + "Name constraints nested DNS name not permitted 1"); ok(!verify("badalt9-cert", "sslserver", ["root-cert"], ["ncca1-cert", "ncca3-cert"], ), - "Name constaints nested DNS name not permitted 2"); + "Name constraints nested DNS name not permitted 2"); ok(!verify("badalt10-cert", "sslserver", ["root-cert"], ["ncca1-cert", "ncca3-cert"], ), - "Name constaints nested DNS name excluded"); + "Name constraints nested DNS name excluded"); ok(verify("ee-pss-sha1-cert", "sslserver", ["root-cert"], ["ca-cert"], ), "Certificate PSS signature using SHA1"); diff --git a/test/recipes/70-test_key_share.t b/test/recipes/70-test_key_share.t index 62ab66cb2e..ae0a2b0c29 100644 --- a/test/recipes/70-test_key_share.t +++ b/test/recipes/70-test_key_share.t @@ -168,7 +168,7 @@ $proxy->start(); ok(TLSProxy::Message->success() && ($selectedgroupid == X25519), "Multiple acceptable key_shares (part 2)"); -#Test 15: Server sends key_share that wasn't offerred should fail +#Test 15: Server sends key_share that wasn't offered should fail $proxy->clear(); $testtype = SELECT_X25519; $proxy->clientflags("-curves P-256"); diff --git a/test/recipes/70-test_sslmessages.t b/test/recipes/70-test_sslmessages.t index 6aab5af33c..5ddf384fe2 100644 --- a/test/recipes/70-test_sslmessages.t +++ b/test/recipes/70-test_sslmessages.t @@ -221,7 +221,7 @@ $proxy->reneg(1); $proxy->start(); checkhandshake($proxy, checkhandshake::RENEG_HANDSHAKE, checkhandshake::DEFAULT_EXTENSIONS, - "Rengotiation handshake test"); + "Renegotiation handshake test"); #Test 8: Server name handshake (no client request) $proxy->clear(); diff --git a/test/recipes/70-test_sslrecords.t b/test/recipes/70-test_sslrecords.t index bac738c311..ef4679261d 100644 --- a/test/recipes/70-test_sslrecords.t +++ b/test/recipes/70-test_sslrecords.t @@ -180,7 +180,7 @@ SKIP: { $boundary_test_type = DATA_AFTER_SERVER_HELLO; $proxy->filter(\¬_on_record_boundary); $proxy->start(); - ok(TLSProxy::Message->fail(), "Record not on bounday in TLS1.3 (ServerHello)"); + ok(TLSProxy::Message->fail(), "Record not on boundary in TLS1.3 (ServerHello)"); #Test 17: Sending a Finished which doesn't end on a record boundary # should fail @@ -188,7 +188,7 @@ SKIP: { $boundary_test_type = DATA_AFTER_FINISHED; $proxy->filter(\¬_on_record_boundary); $proxy->start(); - ok(TLSProxy::Message->fail(), "Record not on bounday in TLS1.3 (Finished)"); + ok(TLSProxy::Message->fail(), "Record not on boundary in TLS1.3 (Finished)"); #Test 18: Sending a KeyUpdate which doesn't end on a record boundary # should fail @@ -196,7 +196,7 @@ SKIP: { $boundary_test_type = DATA_AFTER_KEY_UPDATE; $proxy->filter(\¬_on_record_boundary); $proxy->start(); - ok(TLSProxy::Message->fail(), "Record not on bounday in TLS1.3 (KeyUpdate)"); + ok(TLSProxy::Message->fail(), "Record not on boundary in TLS1.3 (KeyUpdate)"); } diff --git a/test/recipes/70-test_tls13kexmodes.t b/test/recipes/70-test_tls13kexmodes.t index 3f3cfafa39..97cbf7676b 100644 --- a/test/recipes/70-test_tls13kexmodes.t +++ b/test/recipes/70-test_tls13kexmodes.t @@ -137,7 +137,7 @@ use constant { EMPTY_EXTENSION => 1, NON_DHE_KEX_MODE_ONLY => 2, DHE_KEX_MODE_ONLY => 3, - UNKNONW_KEX_MODES => 4, + UNKNOWN_KEX_MODES => 4, BOTH_KEX_MODES => 5 }; @@ -207,7 +207,7 @@ checkhandshake($proxy, checkhandshake::RESUME_HANDSHAKE, #Test 6: Attempt a resume with only unrecognised kex modes. Should not resume $proxy->clear(); $proxy->clientflags("-sess_in ".$session); -$testtype = UNKNONW_KEX_MODES; +$testtype = UNKNOWN_KEX_MODES; $proxy->start(); checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE, checkhandshake::DEFAULT_EXTENSIONS @@ -246,7 +246,7 @@ checkhandshake($proxy, checkhandshake::HRR_RESUME_HANDSHAKE, | checkhandshake::PSK_SRV_EXTENSION, "Resume with both kex modes and HRR"); -#Test 9: Attempt a resume with dhe kex mode only and an unnacceptable initial +#Test 9: Attempt a resume with dhe kex mode only and an unacceptable initial # key_share. Should resume with a key_share following an HRR $proxy->clear(); $proxy->clientflags("-sess_in ".$session); @@ -310,7 +310,7 @@ sub modify_kex_modes_filter $ext = pack "C2", 0x01, #List length 0x01; #psk_dhe_ke - } elsif ($testtype == UNKNONW_KEX_MODES) { + } elsif ($testtype == UNKNOWN_KEX_MODES) { $ext = pack "C3", 0x02, #List length 0xfe, #unknown diff --git a/test/recipes/80-test_pkcs12.t b/test/recipes/80-test_pkcs12.t index be9a72c8e2..5bcfb695e0 100644 --- a/test/recipes/80-test_pkcs12.t +++ b/test/recipes/80-test_pkcs12.t @@ -42,7 +42,7 @@ if (eval { require Win32::API; 1; }) { $pass = Encode::encode("cp1253",Encode::decode("utf-8",$pass)); } } else { - # Running MinGW tests transparenly under Wine apparently requires + # Running MinGW tests transparently under Wine apparently requires # UTF-8 locale... foreach(`locale -a`) { diff --git a/test/recipes/80-test_ssl_old.t b/test/recipes/80-test_ssl_old.t index ea7623125c..8b2d02fd0a 100644 --- a/test/recipes/80-test_ssl_old.t +++ b/test/recipes/80-test_ssl_old.t @@ -441,7 +441,7 @@ sub testssl { plan skip_all => "None of the ciphersuites to test are available in this OpenSSL build" if $protocolciphersuitecount + scalar(keys %ciphersuites) == 0; - # The count of protocols is because in addition to the ciphersuits + # The count of protocols is because in addition to the ciphersuites # we got above, we're running a weak DH test for each protocol plan tests => scalar(@protocols) + $protocolciphersuitecount + scalar(keys %ciphersuites); |