]> git.ipfire.org Git - thirdparty/openssl.git/commitdiff
28-seclevel.cnf.in: fix typo in algo name
authorEtienne Millon <me@emillon.org>
Mon, 4 Jan 2021 10:33:55 +0000 (11:33 +0100)
committerTomas Mraz <tmraz@fedoraproject.org>
Tue, 5 Jan 2021 15:44:09 +0000 (16:44 +0100)
CLA: trivial

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
(Merged from https://github.com/openssl/openssl/pull/13768)

test/ssl-tests/28-seclevel.cnf.in

index ebb082c0af0e1e533be3b3950bdf21ed774dfeb4..b7b96e87b7c2908b945540cbf62902583412de67 100644 (file)
@@ -34,7 +34,7 @@ our @tests_ec = (
         test   => { "ExpectedResult" => "Success" },
     },
     {
-        # The Ed488 signature algorithm will not be enabled.
+        # The Ed448 signature algorithm will not be enabled.
         # Because of the config order, the certificate is first loaded, and
         # then the security level is chaged. If you try this with s_server
         # the order will be reversed and it will instead fail to load the key.
@@ -47,7 +47,7 @@ our @tests_ec = (
         test   => { "ExpectedResult" => "ServerFail" },
     },
     {
-        # The client will not sent the Ed488 signature algorithm, so the server
+        # The client will not sent the Ed448 signature algorithm, so the server
         # doesn't have a useable signature algorithm for the certificate.
         name => "SECLEVEL 5 client with ED448 key",
         server => { "CipherString" => "DEFAULT:\@SECLEVEL=4",