all: remove redundant words in comments and fix some typos
Change-Id: I3078492dc020770aca630e0b362df0212bd41e32
Reviewed-on: https://go-review.googlesource.com/c/crypto/+/569156
Auto-Submit: Ian Lance Taylor <iant@google.com>
Reviewed-by: David Chase <drchase@google.com>
Reviewed-by: Nicola Murino <nicola.murino@gmail.com>
Reviewed-by: Ian Lance Taylor <iant@google.com>
Auto-Submit: Nicola Murino <nicola.murino@gmail.com>
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
diff --git a/internal/testenv/exec.go b/internal/testenv/exec.go
index 4bacdc3..df5d3c2 100644
--- a/internal/testenv/exec.go
+++ b/internal/testenv/exec.go
@@ -57,8 +57,8 @@
// grace periods to clean up: one for the delay between the first
// termination signal being sent (via the Cancel callback when the Context
// expires) and the process being forcibly terminated (via the WaitDelay
- // field), and a second one for the delay becween the process being
- // terminated and and the test logging its output for debugging.
+ // field), and a second one for the delay between the process being
+ // terminated and the test logging its output for debugging.
//
// (We want to ensure that the test process itself has enough time to
// log the output before it is also terminated.)
diff --git a/md4/md4.go b/md4/md4.go
index 59d3480..d1911c2 100644
--- a/md4/md4.go
+++ b/md4/md4.go
@@ -4,7 +4,7 @@
// Package md4 implements the MD4 hash algorithm as defined in RFC 1320.
//
-// Deprecated: MD4 is cryptographically broken and should should only be used
+// Deprecated: MD4 is cryptographically broken and should only be used
// where compatibility with legacy systems, not security, is the goal. Instead,
// use a secure hash like SHA-256 (from crypto/sha256).
package md4 // import "golang.org/x/crypto/md4"
diff --git a/ssh/certs_test.go b/ssh/certs_test.go
index 97b7486..66000f1 100644
--- a/ssh/certs_test.go
+++ b/ssh/certs_test.go
@@ -367,21 +367,21 @@
func TestCertSignWithMultiAlgorithmSigner(t *testing.T) {
type testcase struct {
- sigAlgo string
- algoritms []string
+ sigAlgo string
+ algorithms []string
}
cases := []testcase{
{
- sigAlgo: KeyAlgoRSA,
- algoritms: []string{KeyAlgoRSA, KeyAlgoRSASHA512},
+ sigAlgo: KeyAlgoRSA,
+ algorithms: []string{KeyAlgoRSA, KeyAlgoRSASHA512},
},
{
- sigAlgo: KeyAlgoRSASHA256,
- algoritms: []string{KeyAlgoRSASHA256, KeyAlgoRSA, KeyAlgoRSASHA512},
+ sigAlgo: KeyAlgoRSASHA256,
+ algorithms: []string{KeyAlgoRSASHA256, KeyAlgoRSA, KeyAlgoRSASHA512},
},
{
- sigAlgo: KeyAlgoRSASHA512,
- algoritms: []string{KeyAlgoRSASHA512, KeyAlgoRSASHA256},
+ sigAlgo: KeyAlgoRSASHA512,
+ algorithms: []string{KeyAlgoRSASHA512, KeyAlgoRSASHA256},
},
}
@@ -393,7 +393,7 @@
for _, c := range cases {
t.Run(c.sigAlgo, func(t *testing.T) {
- signer, err := NewSignerWithAlgorithms(testSigners["rsa"].(AlgorithmSigner), c.algoritms)
+ signer, err := NewSignerWithAlgorithms(testSigners["rsa"].(AlgorithmSigner), c.algorithms)
if err != nil {
t.Fatalf("NewSignerWithAlgorithms error: %v", err)
}
diff --git a/ssh/example_test.go b/ssh/example_test.go
index 3920832..97b3b6a 100644
--- a/ssh/example_test.go
+++ b/ssh/example_test.go
@@ -384,7 +384,7 @@
}
mas, err := ssh.NewSignerWithAlgorithms(signer.(ssh.AlgorithmSigner), []string{ssh.KeyAlgoRSASHA256})
if err != nil {
- log.Fatal("unable to create signer with algoritms: ", err)
+ log.Fatal("unable to create signer with algorithms: ", err)
}
certificate := ssh.Certificate{
Key: publicKey,