diff --git a/doc/api/errors.md b/doc/api/errors.md index d2a74b230db60d..63bcdea224c4a8 100644 --- a/doc/api/errors.md +++ b/doc/api/errors.md @@ -2856,9 +2856,9 @@ event is emitted before continuing. Attempting to set a TLS protocol `minVersion` or `maxVersion` conflicts with an attempt to set the `secureProtocol` explicitly. Use one mechanism or the other. - + -### `ERR_TLS_PSK_SET_IDENTIY_HINT_FAILED` +### `ERR_TLS_PSK_SET_IDENTITY_HINT_FAILED` Failed to set PSK identity hint. Hint may be too long. diff --git a/doc/api/tls.md b/doc/api/tls.md index ccde27ab2c79d7..6b496fd34652df 100644 --- a/doc/api/tls.md +++ b/doc/api/tls.md @@ -2145,7 +2145,7 @@ changes: * `pskIdentityHint` {string} optional hint to send to a client to help with selecting the identity during TLS-PSK negotiation. Will be ignored in TLS 1.3. Upon failing to set pskIdentityHint `'tlsClientError'` will be - emitted with `'ERR_TLS_PSK_SET_IDENTIY_HINT_FAILED'` code. + emitted with `'ERR_TLS_PSK_SET_IDENTITY_HINT_FAILED'` code. * ...: Any [`tls.createSecureContext()`][] option can be provided. For servers, the identity options (`pfx`, `key`/`cert`, or `pskCallback`) are usually required. diff --git a/src/crypto/crypto_tls.cc b/src/crypto/crypto_tls.cc index 5e1a1f2fbf01c9..a03f4a1f46a586 100644 --- a/src/crypto/crypto_tls.cc +++ b/src/crypto/crypto_tls.cc @@ -1392,7 +1392,7 @@ void TLSWrap::SetPskIdentityHint(const FunctionCallbackInfo& args) { Utf8Value hint(isolate, args[0].As()); if (!SSL_use_psk_identity_hint(p->ssl_.get(), *hint)) { - Local err = node::ERR_TLS_PSK_SET_IDENTIY_HINT_FAILED(isolate); + Local err = node::ERR_TLS_PSK_SET_IDENTITY_HINT_FAILED(isolate); p->MakeCallback(env->onerror_string(), 1, &err); } } diff --git a/src/node_errors.h b/src/node_errors.h index 681e07f2d21711..13d00860fc1d96 100644 --- a/src/node_errors.h +++ b/src/node_errors.h @@ -97,7 +97,7 @@ void OOMErrorHandler(const char* location, const v8::OOMDetails& details); V(ERR_SCRIPT_EXECUTION_TIMEOUT, Error) \ V(ERR_STRING_TOO_LONG, Error) \ V(ERR_TLS_INVALID_PROTOCOL_METHOD, TypeError) \ - V(ERR_TLS_PSK_SET_IDENTIY_HINT_FAILED, Error) \ + V(ERR_TLS_PSK_SET_IDENTITY_HINT_FAILED, Error) \ V(ERR_VM_MODULE_CACHED_DATA_REJECTED, Error) \ V(ERR_VM_MODULE_LINK_FAILURE, Error) \ V(ERR_WASI_NOT_STARTED, Error) \ @@ -195,7 +195,7 @@ ERRORS_WITH_CODE(V) "--experimental-print-required-tla.") \ V(ERR_SCRIPT_EXECUTION_INTERRUPTED, \ "Script execution was interrupted by `SIGINT`") \ - V(ERR_TLS_PSK_SET_IDENTIY_HINT_FAILED, "Failed to set PSK identity hint") \ + V(ERR_TLS_PSK_SET_IDENTITY_HINT_FAILED, "Failed to set PSK identity hint") \ V(ERR_WASI_NOT_STARTED, "wasi.start() has not been called") \ V(ERR_WORKER_INIT_FAILED, "Worker initialization failure") \ V(ERR_PROTO_ACCESS, \ diff --git a/test/parallel/test-tls-psk-errors.js b/test/parallel/test-tls-psk-errors.js index 4864a66f555d7d..98627c0b235a5a 100644 --- a/test/parallel/test-tls-psk-errors.js +++ b/test/parallel/test-tls-psk-errors.js @@ -17,7 +17,7 @@ const tls = require('tls'); }); server.on('tlsClientError', (err) => { assert.ok(err instanceof Error); - assert.strictEqual(err.code, 'ERR_TLS_PSK_SET_IDENTIY_HINT_FAILED'); + assert.strictEqual(err.code, 'ERR_TLS_PSK_SET_IDENTITY_HINT_FAILED'); server.close(); }); server.listen(0, () => {