diff --git a/test/unit/Axolotl.js b/test/unit/Axolotl.js index 3dd0ae4..0c26a7b 100644 --- a/test/unit/Axolotl.js +++ b/test/unit/Axolotl.js @@ -225,7 +225,7 @@ describe("Axolotl", () => { aliceSession = {}; bobSession = {}; - crypto.validSiganture = true; + crypto.validSignature = true; aliceIdentityKeyPair = yield crypto.generateKeyPair(); aliceSignedPreKeyPair = yield crypto.generateKeyPair(); @@ -372,7 +372,7 @@ describe("Axolotl", () => { yield assert.isRejected(decryptMessage(bobAxolotl, aliceSession, ciphertext), InvalidMessageException); })); it("rejects bad signedPreKey signature", co.wrap(function*() { - crypto.validSiganture = false; + crypto.validSignature = false; yield assert.isRejected(createEncryptedMessage(aliceAxolotl, bobSession), InvalidKeyException); })); it("rejects preKeyBundle if neither preKey nor signedPreKey are present", co.wrap(function*() { diff --git a/test/unit/FakeCrypto.js b/test/unit/FakeCrypto.js index ae7760e..e9f9031 100644 --- a/test/unit/FakeCrypto.js +++ b/test/unit/FakeCrypto.js @@ -50,10 +50,10 @@ var fakeCrypto = { resolve(new ArrayBuffer(32)); }); }, - validSiganture: true, + validSignature: true, verifySignature: function() { return new Promise(function(resolve) { - resolve(fakeCrypto.validSiganture); + resolve(fakeCrypto.validSignature); }); }, hmac: function(key, data) {