diff --git a/doc/api/errors.md b/doc/api/errors.md
index 558bc46088adef..78456d0d28e0f0 100644
--- a/doc/api/errors.md
+++ b/doc/api/errors.md
@@ -2803,9 +2803,9 @@ event is emitted before continuing.
Attempting to set a TLS protocol `minVersion` or `maxVersion` conflicts with an
attempt to set the `secureProtocol` explicitly. Use one mechanism or the other.
-
+
-### `ERR_TLS_PSK_SET_IDENTIY_HINT_FAILED`
+### `ERR_TLS_PSK_SET_IDENTITY_HINT_FAILED`
Failed to set PSK identity hint. Hint may be too long.
diff --git a/doc/api/tls.md b/doc/api/tls.md
index 5f0ea0157b14cb..80328ee692a90e 100644
--- a/doc/api/tls.md
+++ b/doc/api/tls.md
@@ -2210,7 +2210,7 @@ changes:
* `pskIdentityHint` {string} optional hint to send to a client to help
with selecting the identity during TLS-PSK negotiation. Will be ignored
in TLS 1.3. Upon failing to set pskIdentityHint `'tlsClientError'` will be
- emitted with `'ERR_TLS_PSK_SET_IDENTIY_HINT_FAILED'` code.
+ emitted with `'ERR_TLS_PSK_SET_IDENTITY_HINT_FAILED'` code.
* ...: Any [`tls.createSecureContext()`][] option can be provided. For
servers, the identity options (`pfx`, `key`/`cert`, or `pskCallback`)
are usually required.
diff --git a/src/crypto/crypto_tls.cc b/src/crypto/crypto_tls.cc
index 4013c1d8e2ff68..714efca9d8a0bb 100644
--- a/src/crypto/crypto_tls.cc
+++ b/src/crypto/crypto_tls.cc
@@ -1413,7 +1413,7 @@ void TLSWrap::SetPskIdentityHint(const FunctionCallbackInfo& args) {
Utf8Value hint(isolate, args[0].As());
if (!SSL_use_psk_identity_hint(p->ssl_.get(), *hint)) {
- Local err = node::ERR_TLS_PSK_SET_IDENTIY_HINT_FAILED(isolate);
+ Local err = node::ERR_TLS_PSK_SET_IDENTITY_HINT_FAILED(isolate);
p->MakeCallback(env->onerror_string(), 1, &err);
}
}
diff --git a/src/node_errors.h b/src/node_errors.h
index 171e2a2e09011c..ad86276f72d9ab 100644
--- a/src/node_errors.h
+++ b/src/node_errors.h
@@ -104,7 +104,7 @@ void OOMErrorHandler(const char* location, const v8::OOMDetails& details);
V(ERR_SCRIPT_EXECUTION_TIMEOUT, Error) \
V(ERR_STRING_TOO_LONG, Error) \
V(ERR_TLS_INVALID_PROTOCOL_METHOD, TypeError) \
- V(ERR_TLS_PSK_SET_IDENTIY_HINT_FAILED, Error) \
+ V(ERR_TLS_PSK_SET_IDENTITY_HINT_FAILED, Error) \
V(ERR_VM_MODULE_CACHED_DATA_REJECTED, Error) \
V(ERR_VM_MODULE_LINK_FAILURE, Error) \
V(ERR_WASI_NOT_STARTED, Error) \
@@ -202,7 +202,7 @@ ERRORS_WITH_CODE(V)
"--experimental-print-required-tla.") \
V(ERR_SCRIPT_EXECUTION_INTERRUPTED, \
"Script execution was interrupted by `SIGINT`") \
- V(ERR_TLS_PSK_SET_IDENTIY_HINT_FAILED, "Failed to set PSK identity hint") \
+ V(ERR_TLS_PSK_SET_IDENTITY_HINT_FAILED, "Failed to set PSK identity hint") \
V(ERR_WASI_NOT_STARTED, "wasi.start() has not been called") \
V(ERR_WORKER_INIT_FAILED, "Worker initialization failure") \
V(ERR_PROTO_ACCESS, \
diff --git a/test/parallel/test-tls-psk-errors.js b/test/parallel/test-tls-psk-errors.js
index 4864a66f555d7d..98627c0b235a5a 100644
--- a/test/parallel/test-tls-psk-errors.js
+++ b/test/parallel/test-tls-psk-errors.js
@@ -17,7 +17,7 @@ const tls = require('tls');
});
server.on('tlsClientError', (err) => {
assert.ok(err instanceof Error);
- assert.strictEqual(err.code, 'ERR_TLS_PSK_SET_IDENTIY_HINT_FAILED');
+ assert.strictEqual(err.code, 'ERR_TLS_PSK_SET_IDENTITY_HINT_FAILED');
server.close();
});
server.listen(0, () => {