diff options
Diffstat (limited to 'ssh')
| -rw-r--r-- | ssh/agent/keyring.go | 2 | ||||
| -rw-r--r-- | ssh/agent/keyring_test.go | 2 | ||||
| -rw-r--r-- | ssh/client_auth_test.go | 2 | ||||
| -rw-r--r-- | ssh/example_test.go | 6 | ||||
| -rw-r--r-- | ssh/handshake_test.go | 2 | ||||
| -rw-r--r-- | ssh/server_test.go | 4 | ||||
| -rw-r--r-- | ssh/test/recording_client_test.go | 2 | ||||
| -rw-r--r-- | ssh/test/recording_server_test.go | 2 |
8 files changed, 11 insertions, 11 deletions
diff --git a/ssh/agent/keyring.go b/ssh/agent/keyring.go index c1b4361..d129875 100644 --- a/ssh/agent/keyring.go +++ b/ssh/agent/keyring.go @@ -112,7 +112,7 @@ func (r *keyring) Unlock(passphrase []byte) error { } // expireKeysLocked removes expired keys from the keyring. If a key was added -// with a lifetimesecs contraint and seconds >= lifetimesecs seconds have +// with a lifetimesecs constraint and seconds >= lifetimesecs seconds have // elapsed, it is removed. The caller *must* be holding the keyring mutex. func (r *keyring) expireKeysLocked() { for _, k := range r.keys { diff --git a/ssh/agent/keyring_test.go b/ssh/agent/keyring_test.go index e9c90a3..5e495d5 100644 --- a/ssh/agent/keyring_test.go +++ b/ssh/agent/keyring_test.go @@ -30,7 +30,7 @@ func validateListedKeys(t *testing.T, a Agent, expectedKeys []string) { return } if len(listedKeys) != len(expectedKeys) { - t.Fatalf("expeted %d key, got %d", len(expectedKeys), len(listedKeys)) + t.Fatalf("expected %d key, got %d", len(expectedKeys), len(listedKeys)) return } actualKeys := make(map[string]bool) diff --git a/ssh/client_auth_test.go b/ssh/client_auth_test.go index e398c40..a183c21 100644 --- a/ssh/client_auth_test.go +++ b/ssh/client_auth_test.go @@ -1136,7 +1136,7 @@ func TestPickSignatureAlgorithm(t *testing.T) { t.Fatalf("error generating cert signer: %v", err) } // The signer supports the public key algorithm and the - // public key format is a certificate type so the cerificate + // public key format is a certificate type so the certificate // algorithm matching the key format must be returned _, algo, err = pickSignatureAlgorithm(certSigner, c.extensions) if err != nil { diff --git a/ssh/example_test.go b/ssh/example_test.go index d6bad3e..653f2c8 100644 --- a/ssh/example_test.go +++ b/ssh/example_test.go @@ -155,7 +155,7 @@ func ExampleNewServerConn() { } func ExampleServerConfig() { - // Minimal ServerConfig with SHA-1 algoritms disabled and supporting only + // Minimal ServerConfig with SHA-1 algorithms disabled and supporting only // public key authentication. // The algorithms returned by ssh.SupportedAlgorithms() are different from @@ -344,7 +344,7 @@ func ExampleClientConfig() { log.Fatalf("unable to parse private key: %v", err) } - // Minimal ClientConfig with SHA-1 algoritms disabled. + // Minimal ClientConfig with SHA-1 algorithms disabled. // The algorithms returned by ssh.SupportedAlgorithms() are different from // the default ones and do not include algorithms that are considered // insecure, such as those using SHA-1, returned by @@ -361,7 +361,7 @@ func ExampleClientConfig() { ssh.PublicKeys(signer), }, HostKeyCallback: ssh.FixedHostKey(hostKey), - // We should check that hostKey algorithm is inlcuded in + // We should check that hostKey algorithm is included in // algorithms.HostKeys. HostKeyAlgorithms: algorithms.HostKeys, } diff --git a/ssh/handshake_test.go b/ssh/handshake_test.go index 61f9784..56f230c 100644 --- a/ssh/handshake_test.go +++ b/ssh/handshake_test.go @@ -1330,7 +1330,7 @@ func TestAlgorithmNegotiationError(t *testing.T) { _, _, _, err = NewClientConn(c2, "", clientConf) if err == nil { - t.Fatal("client connection succeded expected algorithm negotiation error") + t.Fatal("client connection succeeded expected algorithm negotiation error") } var negotiationError *AlgorithmNegotiationError if !errors.As(err, &negotiationError) { diff --git a/ssh/server_test.go b/ssh/server_test.go index e48f7e3..e186193 100644 --- a/ssh/server_test.go +++ b/ssh/server_test.go @@ -724,7 +724,7 @@ func TestVerifiedPublicCallbackPartialSuccessBadUsage(t *testing.T) { _, _, _, err = NewClientConn(c2, "", &clientConf) if err == nil { - t.Fatal("authentication suceeded with PartialSuccess returned from PublicKeyCallback and VerifiedPublicKeyCallback defined") + t.Fatal("authentication succeeded with PartialSuccess returned from PublicKeyCallback and VerifiedPublicKeyCallback defined") } } @@ -803,7 +803,7 @@ func TestVerifiedPublicKeyCallbackOnly(t *testing.T) { _, _, _, err = NewClientConn(c2, "", &clientConf) if err == nil { - t.Fatal("authentication suceeded with only VerifiedPublicKeyCallback defined") + t.Fatal("authentication succeeded with only VerifiedPublicKeyCallback defined") } <-done } diff --git a/ssh/test/recording_client_test.go b/ssh/test/recording_client_test.go index 5c7830f..b744bd3 100644 --- a/ssh/test/recording_client_test.go +++ b/ssh/test/recording_client_test.go @@ -251,7 +251,7 @@ func TestClientKeyExchanges(t *testing.T) { var keyExchanges []string for _, kex := range config.KeyExchanges { - // Exclude ecdh for now, to make them determistic we should use see a + // Exclude ecdh for now, to make them deterministic we should use see a // stream of fixed bytes as the random source. if !strings.HasPrefix(kex, "ecdh-") { keyExchanges = append(keyExchanges, kex) diff --git a/ssh/test/recording_server_test.go b/ssh/test/recording_server_test.go index fe99198..898a847 100644 --- a/ssh/test/recording_server_test.go +++ b/ssh/test/recording_server_test.go @@ -232,7 +232,7 @@ func TestServerKeyExchanges(t *testing.T) { var keyExchanges []string for _, kex := range config.KeyExchanges { - // Exclude ecdh for now, to make them determistic we should use see a + // Exclude ecdh for now, to make them deterministic we should use see a // stream of fixed bytes as the random source. // Exclude ML-KEM because server side is not deterministic. if !strings.HasPrefix(kex, "ecdh-") && !strings.HasPrefix(kex, "mlkem") { |
