diff --git a/acme/autocert/renewal_test.go b/acme/autocert/renewal_test.go index d13d19041d..25e29ece6d 100644 --- a/acme/autocert/renewal_test.go +++ b/acme/autocert/renewal_test.go @@ -131,7 +131,7 @@ func TestRenewFromCache(t *testing.T) { t.Fatal(err) } - // veriy the renewal happened + // verify the renewal happened defer func() { testDidRenewLoop = func(next time.Duration, err error) {} }() @@ -244,7 +244,7 @@ func TestRenewFromCacheAlreadyRenewed(t *testing.T) { man.state[exampleCertKey] = s man.stateMu.Unlock() - // veriy the renewal accepted the newer cached cert + // verify the renewal accepted the newer cached cert defer func() { testDidRenewLoop = func(next time.Duration, err error) {} }() diff --git a/sha3/sha3.go b/sha3/sha3.go index ba269a0730..fa182beb40 100644 --- a/sha3/sha3.go +++ b/sha3/sha3.go @@ -86,7 +86,7 @@ func (d *state) permute() { d.buf = d.storage.asBytes()[:0] keccakF1600(&d.a) case spongeSqueezing: - // If we're squeezing, we need to apply the permutatin before + // If we're squeezing, we need to apply the permutation before // copying more output. keccakF1600(&d.a) d.buf = d.storage.asBytes()[:d.rate] diff --git a/ssh/agent/keyring.go b/ssh/agent/keyring.go index c9d9794307..c6eb56dd50 100644 --- a/ssh/agent/keyring.go +++ b/ssh/agent/keyring.go @@ -113,7 +113,7 @@ func (r *keyring) Unlock(passphrase []byte) error { // expireKeysLocked removes expired keys from the keyring. If a key was added // with a lifetimesecs contraint and seconds >= lifetimesecs seconds have -// ellapsed, it is removed. The caller *must* be holding the keyring mutex. +// elapsed, it is removed. The caller *must* be holding the keyring mutex. func (r *keyring) expireKeysLocked() { for _, k := range r.keys { if k.expire != nil && time.Now().After(*k.expire) {