aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorHowJmay <yuanyanghau@gmail.com>2021-05-12 12:31:47 +0000
committerBrad Fitzpatrick <bradfitz@golang.org>2022-02-09 15:53:12 +0000
commit2f5cac09c9fdcbd7088e89628a9095ace3cb0c33 (patch)
treeca40c223a83d64aa6e54fb23cdb38196c3beea32
parent65fa2f7aa847778ef6fd782aa568929c3f77bc3a (diff)
downloadgo-x-crypto-2f5cac09c9fdcbd7088e89628a9095ace3cb0c33.tar.xz
acme, sha3, ssh: fix the typos
Change-Id: I2287ab3492c105791b03f40d45b5dff5a56aa32a GitHub-Last-Rev: 02cdf82d8b1604fc47b656172b102a48a70e6f05 GitHub-Pull-Request: golang/crypto#183 Reviewed-on: https://go-review.googlesource.com/c/crypto/+/319269 Trust: Alberto Donizetti <alb.donizetti@gmail.com> Reviewed-by: Brad Fitzpatrick <bradfitz@golang.org>
-rw-r--r--acme/autocert/renewal_test.go2
-rw-r--r--sha3/sha3.go2
-rw-r--r--ssh/agent/keyring.go2
3 files changed, 3 insertions, 3 deletions
diff --git a/acme/autocert/renewal_test.go b/acme/autocert/renewal_test.go
index 94bbc60..e5f48ff 100644
--- a/acme/autocert/renewal_test.go
+++ b/acme/autocert/renewal_test.go
@@ -59,7 +59,7 @@ func TestRenewFromCache(t *testing.T) {
t.Fatal(err)
}
- // veriy the renewal happened
+ // verify the renewal happened
defer func() {
testDidRenewLoop = func(next time.Duration, err error) {}
}()
diff --git a/sha3/sha3.go b/sha3/sha3.go
index ba269a0..fa182be 100644
--- a/sha3/sha3.go
+++ b/sha3/sha3.go
@@ -86,7 +86,7 @@ func (d *state) permute() {
d.buf = d.storage.asBytes()[:0]
keccakF1600(&d.a)
case spongeSqueezing:
- // If we're squeezing, we need to apply the permutatin before
+ // If we're squeezing, we need to apply the permutation before
// copying more output.
keccakF1600(&d.a)
d.buf = d.storage.asBytes()[:d.rate]
diff --git a/ssh/agent/keyring.go b/ssh/agent/keyring.go
index c9d9794..c6eb56d 100644
--- a/ssh/agent/keyring.go
+++ b/ssh/agent/keyring.go
@@ -113,7 +113,7 @@ func (r *keyring) Unlock(passphrase []byte) error {
// expireKeysLocked removes expired keys from the keyring. If a key was added
// with a lifetimesecs contraint and seconds >= lifetimesecs seconds have
-// ellapsed, it is removed. The caller *must* be holding the keyring mutex.
+// elapsed, it is removed. The caller *must* be holding the keyring mutex.
func (r *keyring) expireKeysLocked() {
for _, k := range r.keys {
if k.expire != nil && time.Now().After(*k.expire) {