summaryrefslogtreecommitdiff
path: root/test/recipes
diff options
context:
space:
mode:
authorJosh Soref <jsoref@users.noreply.github.com>2017-11-11 19:03:10 -0500
committerRich Salz <rsalz@openssl.org>2017-11-11 19:03:10 -0500
commit46f4e1bec51dc96fa275c168752aa34359d9ee51 (patch)
treec80b737d1fff479fd88f6c41175187ebad868299 /test/recipes
parentb4d0fa49d9d1a43792e58b0c8066bb23b9e53ef4 (diff)
downloadopenssl-new-46f4e1bec51dc96fa275c168752aa34359d9ee51.tar.gz
Many spelling fixes/typo's corrected.
Around 138 distinct errors found and fixed; thanks! Reviewed-by: Kurt Roeckx <kurt@roeckx.be> Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/3459)
Diffstat (limited to 'test/recipes')
-rw-r--r--test/recipes/25-test_verify.t6
-rw-r--r--test/recipes/70-test_key_share.t2
-rw-r--r--test/recipes/70-test_sslmessages.t2
-rw-r--r--test/recipes/70-test_sslrecords.t6
-rw-r--r--test/recipes/70-test_tls13kexmodes.t8
-rw-r--r--test/recipes/80-test_pkcs12.t2
-rw-r--r--test/recipes/80-test_ssl_old.t2
7 files changed, 14 insertions, 14 deletions
diff --git a/test/recipes/25-test_verify.t b/test/recipes/25-test_verify.t
index 4d3e8963d1..a196129233 100644
--- a/test/recipes/25-test_verify.t
+++ b/test/recipes/25-test_verify.t
@@ -322,13 +322,13 @@ ok(!verify("badalt7-cert", "sslserver", ["root-cert"], ["ncca1-cert"], ),
"Name Constraints CN BMPSTRING hostname not permitted");
ok(!verify("badalt8-cert", "sslserver", ["root-cert"], ["ncca1-cert", "ncca3-cert"], ),
- "Name constaints nested DNS name not permitted 1");
+ "Name constraints nested DNS name not permitted 1");
ok(!verify("badalt9-cert", "sslserver", ["root-cert"], ["ncca1-cert", "ncca3-cert"], ),
- "Name constaints nested DNS name not permitted 2");
+ "Name constraints nested DNS name not permitted 2");
ok(!verify("badalt10-cert", "sslserver", ["root-cert"], ["ncca1-cert", "ncca3-cert"], ),
- "Name constaints nested DNS name excluded");
+ "Name constraints nested DNS name excluded");
ok(verify("ee-pss-sha1-cert", "sslserver", ["root-cert"], ["ca-cert"], ),
"Certificate PSS signature using SHA1");
diff --git a/test/recipes/70-test_key_share.t b/test/recipes/70-test_key_share.t
index 62ab66cb2e..ae0a2b0c29 100644
--- a/test/recipes/70-test_key_share.t
+++ b/test/recipes/70-test_key_share.t
@@ -168,7 +168,7 @@ $proxy->start();
ok(TLSProxy::Message->success() && ($selectedgroupid == X25519),
"Multiple acceptable key_shares (part 2)");
-#Test 15: Server sends key_share that wasn't offerred should fail
+#Test 15: Server sends key_share that wasn't offered should fail
$proxy->clear();
$testtype = SELECT_X25519;
$proxy->clientflags("-curves P-256");
diff --git a/test/recipes/70-test_sslmessages.t b/test/recipes/70-test_sslmessages.t
index 6aab5af33c..5ddf384fe2 100644
--- a/test/recipes/70-test_sslmessages.t
+++ b/test/recipes/70-test_sslmessages.t
@@ -221,7 +221,7 @@ $proxy->reneg(1);
$proxy->start();
checkhandshake($proxy, checkhandshake::RENEG_HANDSHAKE,
checkhandshake::DEFAULT_EXTENSIONS,
- "Rengotiation handshake test");
+ "Renegotiation handshake test");
#Test 8: Server name handshake (no client request)
$proxy->clear();
diff --git a/test/recipes/70-test_sslrecords.t b/test/recipes/70-test_sslrecords.t
index bac738c311..ef4679261d 100644
--- a/test/recipes/70-test_sslrecords.t
+++ b/test/recipes/70-test_sslrecords.t
@@ -180,7 +180,7 @@ SKIP: {
$boundary_test_type = DATA_AFTER_SERVER_HELLO;
$proxy->filter(\&not_on_record_boundary);
$proxy->start();
- ok(TLSProxy::Message->fail(), "Record not on bounday in TLS1.3 (ServerHello)");
+ ok(TLSProxy::Message->fail(), "Record not on boundary in TLS1.3 (ServerHello)");
#Test 17: Sending a Finished which doesn't end on a record boundary
# should fail
@@ -188,7 +188,7 @@ SKIP: {
$boundary_test_type = DATA_AFTER_FINISHED;
$proxy->filter(\&not_on_record_boundary);
$proxy->start();
- ok(TLSProxy::Message->fail(), "Record not on bounday in TLS1.3 (Finished)");
+ ok(TLSProxy::Message->fail(), "Record not on boundary in TLS1.3 (Finished)");
#Test 18: Sending a KeyUpdate which doesn't end on a record boundary
# should fail
@@ -196,7 +196,7 @@ SKIP: {
$boundary_test_type = DATA_AFTER_KEY_UPDATE;
$proxy->filter(\&not_on_record_boundary);
$proxy->start();
- ok(TLSProxy::Message->fail(), "Record not on bounday in TLS1.3 (KeyUpdate)");
+ ok(TLSProxy::Message->fail(), "Record not on boundary in TLS1.3 (KeyUpdate)");
}
diff --git a/test/recipes/70-test_tls13kexmodes.t b/test/recipes/70-test_tls13kexmodes.t
index 3f3cfafa39..97cbf7676b 100644
--- a/test/recipes/70-test_tls13kexmodes.t
+++ b/test/recipes/70-test_tls13kexmodes.t
@@ -137,7 +137,7 @@ use constant {
EMPTY_EXTENSION => 1,
NON_DHE_KEX_MODE_ONLY => 2,
DHE_KEX_MODE_ONLY => 3,
- UNKNONW_KEX_MODES => 4,
+ UNKNOWN_KEX_MODES => 4,
BOTH_KEX_MODES => 5
};
@@ -207,7 +207,7 @@ checkhandshake($proxy, checkhandshake::RESUME_HANDSHAKE,
#Test 6: Attempt a resume with only unrecognised kex modes. Should not resume
$proxy->clear();
$proxy->clientflags("-sess_in ".$session);
-$testtype = UNKNONW_KEX_MODES;
+$testtype = UNKNOWN_KEX_MODES;
$proxy->start();
checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE,
checkhandshake::DEFAULT_EXTENSIONS
@@ -246,7 +246,7 @@ checkhandshake($proxy, checkhandshake::HRR_RESUME_HANDSHAKE,
| checkhandshake::PSK_SRV_EXTENSION,
"Resume with both kex modes and HRR");
-#Test 9: Attempt a resume with dhe kex mode only and an unnacceptable initial
+#Test 9: Attempt a resume with dhe kex mode only and an unacceptable initial
# key_share. Should resume with a key_share following an HRR
$proxy->clear();
$proxy->clientflags("-sess_in ".$session);
@@ -310,7 +310,7 @@ sub modify_kex_modes_filter
$ext = pack "C2",
0x01, #List length
0x01; #psk_dhe_ke
- } elsif ($testtype == UNKNONW_KEX_MODES) {
+ } elsif ($testtype == UNKNOWN_KEX_MODES) {
$ext = pack "C3",
0x02, #List length
0xfe, #unknown
diff --git a/test/recipes/80-test_pkcs12.t b/test/recipes/80-test_pkcs12.t
index be9a72c8e2..5bcfb695e0 100644
--- a/test/recipes/80-test_pkcs12.t
+++ b/test/recipes/80-test_pkcs12.t
@@ -42,7 +42,7 @@ if (eval { require Win32::API; 1; }) {
$pass = Encode::encode("cp1253",Encode::decode("utf-8",$pass));
}
} else {
- # Running MinGW tests transparenly under Wine apparently requires
+ # Running MinGW tests transparently under Wine apparently requires
# UTF-8 locale...
foreach(`locale -a`) {
diff --git a/test/recipes/80-test_ssl_old.t b/test/recipes/80-test_ssl_old.t
index ea7623125c..8b2d02fd0a 100644
--- a/test/recipes/80-test_ssl_old.t
+++ b/test/recipes/80-test_ssl_old.t
@@ -441,7 +441,7 @@ sub testssl {
plan skip_all => "None of the ciphersuites to test are available in this OpenSSL build"
if $protocolciphersuitecount + scalar(keys %ciphersuites) == 0;
- # The count of protocols is because in addition to the ciphersuits
+ # The count of protocols is because in addition to the ciphersuites
# we got above, we're running a weak DH test for each protocol
plan tests => scalar(@protocols) + $protocolciphersuitecount
+ scalar(keys %ciphersuites);