summaryrefslogtreecommitdiff
path: root/cpp/test
diff options
context:
space:
mode:
Diffstat (limited to 'cpp/test')
-rw-r--r--cpp/test/Ice/udp/AllTests.cpp2
-rwxr-xr-xcpp/test/IceSSL/certs/makecerts.py2
-rw-r--r--cpp/test/IceSSL/configuration/AllTests.cpp4
3 files changed, 4 insertions, 4 deletions
diff --git a/cpp/test/Ice/udp/AllTests.cpp b/cpp/test/Ice/udp/AllTests.cpp
index fbb4e7ea083..450d6e6c9f5 100644
--- a/cpp/test/Ice/udp/AllTests.cpp
+++ b/cpp/test/Ice/udp/AllTests.cpp
@@ -200,7 +200,7 @@ allTests(const CommunicatorPtr& communicator)
//
// Sending the replies back on the multicast UDP connection doesn't work for most
- // platform (it works for OS X Leopard but not Snow Leopard, doesn't work on SLES,
+ // platform (it works for macOS Leopard but not Snow Leopard, doesn't work on SLES,
// Windows...). For Windows, see UdpTransceiver constructor for the details. So
// we don't run this test.
//
diff --git a/cpp/test/IceSSL/certs/makecerts.py b/cpp/test/IceSSL/certs/makecerts.py
index 424213a7307..aa60ddb3bdb 100755
--- a/cpp/test/IceSSL/certs/makecerts.py
+++ b/cpp/test/IceSSL/certs/makecerts.py
@@ -168,7 +168,7 @@ for (ca, alias, path, args) in savecerts:
cert.save(path + ".p12", **args)
#
-# Create DH parameters to use with OS X Secure Transport.
+# Create DH parameters to use with macOS Secure Transport.
#
if clean or not os.path.exists("dh_params512.der"):
ca1.run("openssl", "dhparam", 512, outform="DER", out="dh_params512.der")
diff --git a/cpp/test/IceSSL/configuration/AllTests.cpp b/cpp/test/IceSSL/configuration/AllTests.cpp
index b619416eff5..0fcfcb8deca 100644
--- a/cpp/test/IceSSL/configuration/AllTests.cpp
+++ b/cpp/test/IceSSL/configuration/AllTests.cpp
@@ -2164,7 +2164,7 @@ allTests(const CommunicatorPtr& communicator, const string& testDir, bool p12)
// }
# else
//
- // In OS X we don't support IceSSL.Protocols as secure transport doesn't allow to set the enabled protocols
+ // In macOS we don't support IceSSL.Protocols as secure transport doesn't allow to set the enabled protocols
// instead we use IceSSL.ProtocolVersionMax IceSSL.ProtocolVersionMin to set the maximun and minimum
// enabled protocol versions. See the test bellow.
//
@@ -2608,7 +2608,7 @@ allTests(const CommunicatorPtr& communicator, const string& testDir, bool p12)
{
# ifndef ICE_USE_SECURE_TRANSPORT
//
- // OS X 10.10 bug the handshake fails attempting client auth
+ // macOS 10.10 bug the handshake fails attempting client auth
// with anon cipher.
//
cerr << ex << endl;