acme, sha3, ssh: fix the typos

Change-Id: I2287ab3492c105791b03f40d45b5dff5a56aa32a
GitHub-Last-Rev: 02cdf82d8b1604fc47b656172b102a48a70e6f05
GitHub-Pull-Request: golang/crypto#183
Reviewed-on: https://go-review.googlesource.com/c/crypto/+/319269
Trust: Alberto Donizetti <alb.donizetti@gmail.com>
Reviewed-by: Brad Fitzpatrick <bradfitz@golang.org>
diff --git a/acme/autocert/renewal_test.go b/acme/autocert/renewal_test.go
index 94bbc60..e5f48ff 100644
--- a/acme/autocert/renewal_test.go
+++ b/acme/autocert/renewal_test.go
@@ -59,7 +59,7 @@
 		t.Fatal(err)
 	}
 
-	// veriy the renewal happened
+	// verify the renewal happened
 	defer func() {
 		testDidRenewLoop = func(next time.Duration, err error) {}
 	}()
diff --git a/sha3/sha3.go b/sha3/sha3.go
index ba269a0..fa182be 100644
--- a/sha3/sha3.go
+++ b/sha3/sha3.go
@@ -86,7 +86,7 @@
 		d.buf = d.storage.asBytes()[:0]
 		keccakF1600(&d.a)
 	case spongeSqueezing:
-		// If we're squeezing, we need to apply the permutatin before
+		// If we're squeezing, we need to apply the permutation before
 		// copying more output.
 		keccakF1600(&d.a)
 		d.buf = d.storage.asBytes()[:d.rate]
diff --git a/ssh/agent/keyring.go b/ssh/agent/keyring.go
index c9d9794..c6eb56d 100644
--- a/ssh/agent/keyring.go
+++ b/ssh/agent/keyring.go
@@ -113,7 +113,7 @@
 
 // expireKeysLocked removes expired keys from the keyring. If a key was added
 // with a lifetimesecs contraint and seconds >= lifetimesecs seconds have
-// ellapsed, it is removed. The caller *must* be holding the keyring mutex.
+// elapsed, it is removed. The caller *must* be holding the keyring mutex.
 func (r *keyring) expireKeysLocked() {
 	for _, k := range r.keys {
 		if k.expire != nil && time.Now().After(*k.expire) {