diff options
Diffstat (limited to 'test/sslapitest.c')
-rw-r--r-- | test/sslapitest.c | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/test/sslapitest.c b/test/sslapitest.c index 85fcabc..9ac8728 100644 --- a/test/sslapitest.c +++ b/test/sslapitest.c @@ -447,7 +447,7 @@ static int test_keylog_no_master_key(void) { /* * Now we want to test that our output data was vaguely sensible. For this - * test, we expect no CLIENT_RANDOM entry becuase it doesn't make sense for + * test, we expect no CLIENT_RANDOM entry because it doesn't make sense for * TLSv1.3, but we do expect both client and server to emit keys. */ expected.client_handshake_secret_count = 1; @@ -503,7 +503,7 @@ static int full_early_callback(SSL *s, int *al, void *arg) } len = SSL_early_get0_compression_methods(s, &p); if (len != 1 || *p != 0) { - printf("Early callback expected comperssion methods mismatch\n"); + printf("Early callback expected compression methods mismatch\n"); return 0; } return 1; @@ -574,7 +574,7 @@ static int execute_test_large_message(const SSL_METHOD *smeth, int certlen; if (certbio == NULL) { - printf("Can't load the certficate file\n"); + printf("Can't load the certificate file\n"); goto end; } chaincert = PEM_read_bio_X509(certbio, NULL, NULL, NULL); @@ -603,7 +603,7 @@ static int execute_test_large_message(const SSL_METHOD *smeth, * We assume the supplied certificate is big enough so that if we add * NUM_EXTRA_CERTS it will make the overall message large enough. The * default buffer size is requested to be 16k, but due to the way BUF_MEM - * works, it ends up allocing a little over 21k (16 * 4/3). So, in this test + * works, it ends up allocating a little over 21k (16 * 4/3). So, in this test * we need to have a message larger than that. */ certlen = i2d_X509(chaincert, NULL); @@ -860,11 +860,11 @@ static int test_tlsext_status_type(void) /* * We'll just use any old cert for this test - it doesn't have to be an OCSP - * specifc one. We'll use the server cert. + * specific one. We'll use the server cert. */ certbio = BIO_new_file(cert, "r"); if (certbio == NULL) { - printf("Can't load the certficate file\n"); + printf("Can't load the certificate file\n"); goto end; } id = OCSP_RESPID_new(); @@ -1246,7 +1246,7 @@ static int test_ssl_set_bio(int idx) /* * We want to maintain our own refs to these BIO, so do an up ref for each - * BIO that will have ownersip transferred in the SSL_set_bio() call + * BIO that will have ownership transferred in the SSL_set_bio() call */ if (irbio != NULL) BIO_up_ref(irbio); @@ -1342,7 +1342,7 @@ static int execute_test_ssl_bio(SSL_BIO_TEST_FIXTURE fix) */ BIO_push(sslbio, membio1); - /* Verify chaning the rbio/wbio directly does not cause leaks */ + /* Verify changing the rbio/wbio directly does not cause leaks */ if (fix.change_bio != NO_BIO_CHANGE) { membio2 = BIO_new(BIO_s_mem()); if (membio2 == NULL) { |