From: Etienne Millon Date: Mon, 4 Jan 2021 10:33:55 +0000 (+0100) Subject: 28-seclevel.cnf.in: fix typo in algo name X-Git-Tag: openssl-3.0.0-alpha10~7 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=b043c41c0059786eb78492fb64217053272ef37d;p=thirdparty%2Fopenssl.git 28-seclevel.cnf.in: fix typo in algo name CLA: trivial Reviewed-by: Matt Caswell Reviewed-by: Tomas Mraz (Merged from https://github.com/openssl/openssl/pull/13768) --- diff --git a/test/ssl-tests/28-seclevel.cnf.in b/test/ssl-tests/28-seclevel.cnf.in index ebb082c0af0..b7b96e87b7c 100644 --- a/test/ssl-tests/28-seclevel.cnf.in +++ b/test/ssl-tests/28-seclevel.cnf.in @@ -34,7 +34,7 @@ our @tests_ec = ( test => { "ExpectedResult" => "Success" }, }, { - # The Ed488 signature algorithm will not be enabled. + # The Ed448 signature algorithm will not be enabled. # Because of the config order, the certificate is first loaded, and # then the security level is chaged. If you try this with s_server # the order will be reversed and it will instead fail to load the key. @@ -47,7 +47,7 @@ our @tests_ec = ( test => { "ExpectedResult" => "ServerFail" }, }, { - # The client will not sent the Ed488 signature algorithm, so the server + # The client will not sent the Ed448 signature algorithm, so the server # doesn't have a useable signature algorithm for the certificate. name => "SECLEVEL 5 client with ED448 key", server => { "CipherString" => "DEFAULT:\@SECLEVEL=4",