diff options
| author | HowJmay <yuanyanghau@gmail.com> | 2021-05-12 12:31:47 +0000 |
|---|---|---|
| committer | Brad Fitzpatrick <bradfitz@golang.org> | 2022-02-09 15:53:12 +0000 |
| commit | 2f5cac09c9fdcbd7088e89628a9095ace3cb0c33 (patch) | |
| tree | ca40c223a83d64aa6e54fb23cdb38196c3beea32 | |
| parent | 65fa2f7aa847778ef6fd782aa568929c3f77bc3a (diff) | |
| download | go-x-crypto-2f5cac09c9fdcbd7088e89628a9095ace3cb0c33.tar.xz | |
acme, sha3, ssh: fix the typos
Change-Id: I2287ab3492c105791b03f40d45b5dff5a56aa32a
GitHub-Last-Rev: 02cdf82d8b1604fc47b656172b102a48a70e6f05
GitHub-Pull-Request: golang/crypto#183
Reviewed-on: https://go-review.googlesource.com/c/crypto/+/319269
Trust: Alberto Donizetti <alb.donizetti@gmail.com>
Reviewed-by: Brad Fitzpatrick <bradfitz@golang.org>
| -rw-r--r-- | acme/autocert/renewal_test.go | 2 | ||||
| -rw-r--r-- | sha3/sha3.go | 2 | ||||
| -rw-r--r-- | ssh/agent/keyring.go | 2 |
3 files changed, 3 insertions, 3 deletions
diff --git a/acme/autocert/renewal_test.go b/acme/autocert/renewal_test.go index 94bbc60..e5f48ff 100644 --- a/acme/autocert/renewal_test.go +++ b/acme/autocert/renewal_test.go @@ -59,7 +59,7 @@ func TestRenewFromCache(t *testing.T) { t.Fatal(err) } - // veriy the renewal happened + // verify the renewal happened defer func() { testDidRenewLoop = func(next time.Duration, err error) {} }() diff --git a/sha3/sha3.go b/sha3/sha3.go index ba269a0..fa182be 100644 --- a/sha3/sha3.go +++ b/sha3/sha3.go @@ -86,7 +86,7 @@ func (d *state) permute() { d.buf = d.storage.asBytes()[:0] keccakF1600(&d.a) case spongeSqueezing: - // If we're squeezing, we need to apply the permutatin before + // If we're squeezing, we need to apply the permutation before // copying more output. keccakF1600(&d.a) d.buf = d.storage.asBytes()[:d.rate] diff --git a/ssh/agent/keyring.go b/ssh/agent/keyring.go index c9d9794..c6eb56d 100644 --- a/ssh/agent/keyring.go +++ b/ssh/agent/keyring.go @@ -113,7 +113,7 @@ func (r *keyring) Unlock(passphrase []byte) error { // expireKeysLocked removes expired keys from the keyring. If a key was added // with a lifetimesecs contraint and seconds >= lifetimesecs seconds have -// ellapsed, it is removed. The caller *must* be holding the keyring mutex. +// elapsed, it is removed. The caller *must* be holding the keyring mutex. func (r *keyring) expireKeysLocked() { for _, k := range r.keys { if k.expire != nil && time.Now().After(*k.expire) { |
