Skip to content

Commit b91329d

Browse files
cuishuanggopherbot
authored andcommitted
all: remove redundant words in comments and fix some typos
Change-Id: I3078492dc020770aca630e0b362df0212bd41e32 Reviewed-on: https://go-review.googlesource.com/c/crypto/+/569156 Auto-Submit: Ian Lance Taylor <[email protected]> Reviewed-by: David Chase <[email protected]> Reviewed-by: Nicola Murino <[email protected]> Reviewed-by: Ian Lance Taylor <[email protected]> Auto-Submit: Nicola Murino <[email protected]> LUCI-TryBot-Result: Go LUCI <[email protected]>
1 parent 7067223 commit b91329d

File tree

4 files changed

+13
-13
lines changed

4 files changed

+13
-13
lines changed

internal/testenv/exec.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -57,8 +57,8 @@ func CommandContext(t testing.TB, ctx context.Context, name string, args ...stri
5757
// grace periods to clean up: one for the delay between the first
5858
// termination signal being sent (via the Cancel callback when the Context
5959
// expires) and the process being forcibly terminated (via the WaitDelay
60-
// field), and a second one for the delay becween the process being
61-
// terminated and and the test logging its output for debugging.
60+
// field), and a second one for the delay between the process being
61+
// terminated and the test logging its output for debugging.
6262
//
6363
// (We want to ensure that the test process itself has enough time to
6464
// log the output before it is also terminated.)

md4/md4.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
// Package md4 implements the MD4 hash algorithm as defined in RFC 1320.
66
//
7-
// Deprecated: MD4 is cryptographically broken and should should only be used
7+
// Deprecated: MD4 is cryptographically broken and should only be used
88
// where compatibility with legacy systems, not security, is the goal. Instead,
99
// use a secure hash like SHA-256 (from crypto/sha256).
1010
package md4 // import "golang.org/x/crypto/md4"

ssh/certs_test.go

+9-9
Original file line numberDiff line numberDiff line change
@@ -367,21 +367,21 @@ func TestCertTypes(t *testing.T) {
367367

368368
func TestCertSignWithMultiAlgorithmSigner(t *testing.T) {
369369
type testcase struct {
370-
sigAlgo string
371-
algoritms []string
370+
sigAlgo string
371+
algorithms []string
372372
}
373373
cases := []testcase{
374374
{
375-
sigAlgo: KeyAlgoRSA,
376-
algoritms: []string{KeyAlgoRSA, KeyAlgoRSASHA512},
375+
sigAlgo: KeyAlgoRSA,
376+
algorithms: []string{KeyAlgoRSA, KeyAlgoRSASHA512},
377377
},
378378
{
379-
sigAlgo: KeyAlgoRSASHA256,
380-
algoritms: []string{KeyAlgoRSASHA256, KeyAlgoRSA, KeyAlgoRSASHA512},
379+
sigAlgo: KeyAlgoRSASHA256,
380+
algorithms: []string{KeyAlgoRSASHA256, KeyAlgoRSA, KeyAlgoRSASHA512},
381381
},
382382
{
383-
sigAlgo: KeyAlgoRSASHA512,
384-
algoritms: []string{KeyAlgoRSASHA512, KeyAlgoRSASHA256},
383+
sigAlgo: KeyAlgoRSASHA512,
384+
algorithms: []string{KeyAlgoRSASHA512, KeyAlgoRSASHA256},
385385
},
386386
}
387387

@@ -393,7 +393,7 @@ func TestCertSignWithMultiAlgorithmSigner(t *testing.T) {
393393

394394
for _, c := range cases {
395395
t.Run(c.sigAlgo, func(t *testing.T) {
396-
signer, err := NewSignerWithAlgorithms(testSigners["rsa"].(AlgorithmSigner), c.algoritms)
396+
signer, err := NewSignerWithAlgorithms(testSigners["rsa"].(AlgorithmSigner), c.algorithms)
397397
if err != nil {
398398
t.Fatalf("NewSignerWithAlgorithms error: %v", err)
399399
}

ssh/example_test.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -384,7 +384,7 @@ func ExampleCertificate_SignCert() {
384384
}
385385
mas, err := ssh.NewSignerWithAlgorithms(signer.(ssh.AlgorithmSigner), []string{ssh.KeyAlgoRSASHA256})
386386
if err != nil {
387-
log.Fatal("unable to create signer with algoritms: ", err)
387+
log.Fatal("unable to create signer with algorithms: ", err)
388388
}
389389
certificate := ssh.Certificate{
390390
Key: publicKey,

0 commit comments

Comments
 (0)