Skip to content
This repository was archived by the owner on Apr 1, 2025. It is now read-only.
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion tls/handshake_server.go
Original file line number Diff line number Diff line change
Expand Up @@ -230,7 +230,7 @@ Curves:
// The client is doing a fallback connection.
if hs.clientHello.vers < c.config.MaxVersion {
c.sendAlert(alertInappropriateFallback)
return false, errors.New("tls: client using inppropriate protocol fallback")
return false, errors.New("tls: client using inappropriate protocol fallback")
}
break
}
Expand Down
4 changes: 2 additions & 2 deletions tls/handshake_server_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -641,7 +641,7 @@ func TestHandshakeServerSNIGetCertificateError(t *testing.T) {
runServerTestTLS12(t, test)
}

// TestCipherSuiteCertPreferance ensures that we select an RSA ciphersuite with
// TestCipherSuiteCertPreference ensures that we select an RSA ciphersuite with
// an RSA certificate and an ECDSA ciphersuite with an ECDSA certificate.
func TestCipherSuiteCertPreferenceECDSA(t *testing.T) {
config := *testConfig
Expand Down Expand Up @@ -720,7 +720,7 @@ func TestFallbackSCSV(t *testing.T) {
name: "FallbackSCSV",
// OpenSSL 1.0.1j is needed for the -fallback_scsv option.
command: []string{"openssl", "s_client", "-fallback_scsv"},
expectHandshakeErrorIncluding: "inppropriate protocol fallback",
expectHandshakeErrorIncluding: "inappropriate protocol fallback",
}
runServerTestTLS11(t, test)
}
Expand Down