aboutsummaryrefslogtreecommitdiff
path: root/ssh
diff options
context:
space:
mode:
Diffstat (limited to 'ssh')
-rw-r--r--ssh/agent/keyring.go2
-rw-r--r--ssh/agent/keyring_test.go2
-rw-r--r--ssh/client_auth_test.go2
-rw-r--r--ssh/example_test.go6
-rw-r--r--ssh/handshake_test.go2
-rw-r--r--ssh/server_test.go4
-rw-r--r--ssh/test/recording_client_test.go2
-rw-r--r--ssh/test/recording_server_test.go2
8 files changed, 11 insertions, 11 deletions
diff --git a/ssh/agent/keyring.go b/ssh/agent/keyring.go
index c1b4361..d129875 100644
--- a/ssh/agent/keyring.go
+++ b/ssh/agent/keyring.go
@@ -112,7 +112,7 @@ func (r *keyring) Unlock(passphrase []byte) error {
}
// expireKeysLocked removes expired keys from the keyring. If a key was added
-// with a lifetimesecs contraint and seconds >= lifetimesecs seconds have
+// with a lifetimesecs constraint and seconds >= lifetimesecs seconds have
// elapsed, it is removed. The caller *must* be holding the keyring mutex.
func (r *keyring) expireKeysLocked() {
for _, k := range r.keys {
diff --git a/ssh/agent/keyring_test.go b/ssh/agent/keyring_test.go
index e9c90a3..5e495d5 100644
--- a/ssh/agent/keyring_test.go
+++ b/ssh/agent/keyring_test.go
@@ -30,7 +30,7 @@ func validateListedKeys(t *testing.T, a Agent, expectedKeys []string) {
return
}
if len(listedKeys) != len(expectedKeys) {
- t.Fatalf("expeted %d key, got %d", len(expectedKeys), len(listedKeys))
+ t.Fatalf("expected %d key, got %d", len(expectedKeys), len(listedKeys))
return
}
actualKeys := make(map[string]bool)
diff --git a/ssh/client_auth_test.go b/ssh/client_auth_test.go
index e398c40..a183c21 100644
--- a/ssh/client_auth_test.go
+++ b/ssh/client_auth_test.go
@@ -1136,7 +1136,7 @@ func TestPickSignatureAlgorithm(t *testing.T) {
t.Fatalf("error generating cert signer: %v", err)
}
// The signer supports the public key algorithm and the
- // public key format is a certificate type so the cerificate
+ // public key format is a certificate type so the certificate
// algorithm matching the key format must be returned
_, algo, err = pickSignatureAlgorithm(certSigner, c.extensions)
if err != nil {
diff --git a/ssh/example_test.go b/ssh/example_test.go
index d6bad3e..653f2c8 100644
--- a/ssh/example_test.go
+++ b/ssh/example_test.go
@@ -155,7 +155,7 @@ func ExampleNewServerConn() {
}
func ExampleServerConfig() {
- // Minimal ServerConfig with SHA-1 algoritms disabled and supporting only
+ // Minimal ServerConfig with SHA-1 algorithms disabled and supporting only
// public key authentication.
// The algorithms returned by ssh.SupportedAlgorithms() are different from
@@ -344,7 +344,7 @@ func ExampleClientConfig() {
log.Fatalf("unable to parse private key: %v", err)
}
- // Minimal ClientConfig with SHA-1 algoritms disabled.
+ // Minimal ClientConfig with SHA-1 algorithms disabled.
// The algorithms returned by ssh.SupportedAlgorithms() are different from
// the default ones and do not include algorithms that are considered
// insecure, such as those using SHA-1, returned by
@@ -361,7 +361,7 @@ func ExampleClientConfig() {
ssh.PublicKeys(signer),
},
HostKeyCallback: ssh.FixedHostKey(hostKey),
- // We should check that hostKey algorithm is inlcuded in
+ // We should check that hostKey algorithm is included in
// algorithms.HostKeys.
HostKeyAlgorithms: algorithms.HostKeys,
}
diff --git a/ssh/handshake_test.go b/ssh/handshake_test.go
index 61f9784..56f230c 100644
--- a/ssh/handshake_test.go
+++ b/ssh/handshake_test.go
@@ -1330,7 +1330,7 @@ func TestAlgorithmNegotiationError(t *testing.T) {
_, _, _, err = NewClientConn(c2, "", clientConf)
if err == nil {
- t.Fatal("client connection succeded expected algorithm negotiation error")
+ t.Fatal("client connection succeeded expected algorithm negotiation error")
}
var negotiationError *AlgorithmNegotiationError
if !errors.As(err, &negotiationError) {
diff --git a/ssh/server_test.go b/ssh/server_test.go
index e48f7e3..e186193 100644
--- a/ssh/server_test.go
+++ b/ssh/server_test.go
@@ -724,7 +724,7 @@ func TestVerifiedPublicCallbackPartialSuccessBadUsage(t *testing.T) {
_, _, _, err = NewClientConn(c2, "", &clientConf)
if err == nil {
- t.Fatal("authentication suceeded with PartialSuccess returned from PublicKeyCallback and VerifiedPublicKeyCallback defined")
+ t.Fatal("authentication succeeded with PartialSuccess returned from PublicKeyCallback and VerifiedPublicKeyCallback defined")
}
}
@@ -803,7 +803,7 @@ func TestVerifiedPublicKeyCallbackOnly(t *testing.T) {
_, _, _, err = NewClientConn(c2, "", &clientConf)
if err == nil {
- t.Fatal("authentication suceeded with only VerifiedPublicKeyCallback defined")
+ t.Fatal("authentication succeeded with only VerifiedPublicKeyCallback defined")
}
<-done
}
diff --git a/ssh/test/recording_client_test.go b/ssh/test/recording_client_test.go
index 5c7830f..b744bd3 100644
--- a/ssh/test/recording_client_test.go
+++ b/ssh/test/recording_client_test.go
@@ -251,7 +251,7 @@ func TestClientKeyExchanges(t *testing.T) {
var keyExchanges []string
for _, kex := range config.KeyExchanges {
- // Exclude ecdh for now, to make them determistic we should use see a
+ // Exclude ecdh for now, to make them deterministic we should use see a
// stream of fixed bytes as the random source.
if !strings.HasPrefix(kex, "ecdh-") {
keyExchanges = append(keyExchanges, kex)
diff --git a/ssh/test/recording_server_test.go b/ssh/test/recording_server_test.go
index fe99198..898a847 100644
--- a/ssh/test/recording_server_test.go
+++ b/ssh/test/recording_server_test.go
@@ -232,7 +232,7 @@ func TestServerKeyExchanges(t *testing.T) {
var keyExchanges []string
for _, kex := range config.KeyExchanges {
- // Exclude ecdh for now, to make them determistic we should use see a
+ // Exclude ecdh for now, to make them deterministic we should use see a
// stream of fixed bytes as the random source.
// Exclude ML-KEM because server side is not deterministic.
if !strings.HasPrefix(kex, "ecdh-") && !strings.HasPrefix(kex, "mlkem") {