Skip to content

Commit cb88517

Browse files
jonathangraydjmdjm
authored andcommitted
upstream: spelling ok dtucker@
OpenBSD-Commit-ID: bfc7ba74c22c928de2e257328b3f1274a3dfdf19
1 parent 6b977f8 commit cb88517

11 files changed

+26
-26
lines changed

PROTOCOL.agent

+4-4
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ The message format is:
2121
bool is_forwarding
2222

2323
Where 'hostkey' is the encoded server host public key, 'session
24-
identfier' is the exchange hash derived from the initial key
24+
identifier' is the exchange hash derived from the initial key
2525
exchange, 'signature' is the server's signature of the session
2626
identifier using the private hostkey, as sent in the final
2727
SSH2_MSG_KEXDH_REPLY/SSH2_MSG_KEXECDH_REPLY message of the initial key
@@ -62,12 +62,12 @@ An a keyspec consists of:
6262
When receiving this message, the agent will ensure that the
6363
'from_username' field is empty, and that 'to_hostname' and 'to_hostkeys'
6464
have been supplied (empty 'from_hostname' and 'from_hostkeys' are valid
65-
and signify the inital hop from the host running ssh-agent). The agent
65+
and signify the initial hop from the host running ssh-agent). The agent
6666
will then record the constraint against the key.
6767

6868
Subsequent operations on this key including add/remove/request
6969
identities and, in particular, signature requests will check the key
70-
constraints agains the [email protected] bindings recorded for
70+
constraints against the [email protected] bindings recorded for
7171
the agent connection over which they were received.
7272

7373
3. SSH_AGENT_CONSTRAIN_MAXSIGN key constraint
@@ -81,4 +81,4 @@ the constraint is:
8181

8282
This option is only valid for XMSS keys.
8383

84-
$OpenBSD: PROTOCOL.agent,v 1.15 2021/12/19 22:15:21 djm Exp $
84+
$OpenBSD: PROTOCOL.agent,v 1.16 2022/01/01 01:55:30 jsg Exp $

PROTOCOL.mux

+3-3
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ Most messages from the client to the server contain a "request id"
1515
field. This field is returned in replies as "client request id" to
1616
facilitate matching of responses to requests.
1717

18-
Many muliplexing (mux) client requests yield immediate responses from
18+
Many multiplexing (mux) client requests yield immediate responses from
1919
the mux process; requesting a forwarding, performing an alive check or
2020
requesting the master terminate itself fall in to this category.
2121

@@ -216,7 +216,7 @@ MUX_S_FAILURE.
216216

217217
9. Requesting proxy mode
218218

219-
A client may request that the the control connection be placed in proxy
219+
A client may request that the control connection be placed in proxy
220220
mode:
221221

222222
uint32 MUX_C_PROXY
@@ -295,4 +295,4 @@ XXX session inspection via master
295295
XXX signals via mux request
296296
XXX list active connections via mux
297297

298-
$OpenBSD: PROTOCOL.mux,v 1.12 2020/03/13 03:17:07 djm Exp $
298+
$OpenBSD: PROTOCOL.mux,v 1.13 2022/01/01 01:55:30 jsg Exp $

authfile.c

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/* $OpenBSD: authfile.c,v 1.141 2020/06/18 23:33:38 djm Exp $ */
1+
/* $OpenBSD: authfile.c,v 1.142 2022/01/01 01:55:30 jsg Exp $ */
22
/*
33
* Copyright (c) 2000, 2013 Markus Friedl. All rights reserved.
44
*
@@ -368,7 +368,7 @@ sshkey_load_private_cert(int type, const char *filename, const char *passphrase,
368368
* Returns success if the specified "key" is listed in the file "filename",
369369
* SSH_ERR_KEY_NOT_FOUND: if the key is not listed or another error.
370370
* If "strict_type" is set then the key type must match exactly,
371-
* otherwise a comparison that ignores certficiate data is performed.
371+
* otherwise a comparison that ignores certificate data is performed.
372372
* If "check_ca" is set and "key" is a certificate, then its CA key is
373373
* also checked and sshkey_in_file() will return success if either is found.
374374
*/

channels.c

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/* $OpenBSD: channels.c,v 1.408 2021/09/14 11:04:21 mbuhl Exp $ */
1+
/* $OpenBSD: channels.c,v 1.409 2022/01/01 01:55:30 jsg Exp $ */
22
/*
33
* Author: Tatu Ylonen <[email protected]>
44
* Copyright (c) 1995 Tatu Ylonen <[email protected]>, Espoo, Finland
@@ -543,7 +543,7 @@ permission_set_get_array(struct ssh *ssh, int who, int where,
543543
}
544544
}
545545

546-
/* Adds an entry to the spcified forwarding list */
546+
/* Adds an entry to the specified forwarding list */
547547
static int
548548
permission_set_add(struct ssh *ssh, int who, int where,
549549
const char *host_to_connect, int port_to_connect,

clientloop.c

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/* $OpenBSD: clientloop.c,v 1.372 2021/12/19 22:08:48 djm Exp $ */
1+
/* $OpenBSD: clientloop.c,v 1.373 2022/01/01 01:55:30 jsg Exp $ */
22
/*
33
* Author: Tatu Ylonen <[email protected]>
44
* Copyright (c) 1995 Tatu Ylonen <[email protected]>, Espoo, Finland
@@ -1231,7 +1231,7 @@ client_loop(struct ssh *ssh, int have_pty, int escape_char_arg,
12311231
fatal_f("pledge(): %s", strerror(errno));
12321232

12331233
} else if (options.update_hostkeys) {
1234-
debug("pledge: fileystem");
1234+
debug("pledge: filesystem");
12351235
if (pledge("stdio rpath wpath cpath unix inet dns proc tty",
12361236
NULL) == -1)
12371237
fatal_f("pledge(): %s", strerror(errno));

packet.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/* $OpenBSD: packet.c,v 1.303 2021/11/25 23:02:24 djm Exp $ */
1+
/* $OpenBSD: packet.c,v 1.304 2022/01/01 01:55:30 jsg Exp $ */
22
/*
33
* Author: Tatu Ylonen <[email protected]>
44
* Copyright (c) 1995 Tatu Ylonen <[email protected]>, Espoo, Finland

sftp-client.c

+3-3
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/* $OpenBSD: sftp-client.c,v 1.157 2021/11/06 10:13:39 dtucker Exp $ */
1+
/* $OpenBSD: sftp-client.c,v 1.158 2022/01/01 01:55:30 jsg Exp $ */
22
/*
33
* Copyright (c) 2001-2004 Damien Miller <[email protected]>
44
*
@@ -341,7 +341,7 @@ get_handle(struct sftp_conn *conn, u_int expected_id, size_t *len,
341341
return handle;
342342
}
343343

344-
/* XXX returing &static is error-prone. Refactor to fill *Attrib argument */
344+
/* XXX returning &static is error-prone. Refactor to fill *Attrib argument */
345345
static Attrib *
346346
get_decode_stat(struct sftp_conn *conn, u_int expected_id, int quiet)
347347
{
@@ -381,7 +381,7 @@ get_decode_stat(struct sftp_conn *conn, u_int expected_id, int quiet)
381381
sshbuf_free(msg);
382382
return NULL;
383383
}
384-
debug3("Recevied stat reply T:%u I:%u F:0x%04x M:%05o",
384+
debug3("Received stat reply T:%u I:%u F:0x%04x M:%05o",
385385
type, id, a.flags, a.perm);
386386
sshbuf_free(msg);
387387

sftp-client.h

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/* $OpenBSD: sftp-client.h,v 1.34 2021/08/09 23:47:44 djm Exp $ */
1+
/* $OpenBSD: sftp-client.h,v 1.35 2022/01/01 01:55:30 jsg Exp $ */
22

33
/*
44
* Copyright (c) 2001-2004 Damien Miller <[email protected]>
@@ -183,7 +183,7 @@ int crossload_dir(struct sftp_conn *from, struct sftp_conn *to,
183183
char *path_append(const char *, const char *);
184184

185185
/* Make absolute path if relative path and CWD is given. Does not modify
186-
* original if the the path is already absolute. */
186+
* original if the path is already absolute. */
187187
char *make_absolute(char *, const char *);
188188

189189
/* Check if remote path is directory */

sftp-server.c

+3-3
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/* $OpenBSD: sftp-server.c,v 1.134 2021/11/18 03:06:03 djm Exp $ */
1+
/* $OpenBSD: sftp-server.c,v 1.135 2022/01/01 01:55:30 jsg Exp $ */
22
/*
33
* Copyright (c) 2000-2004 Markus Friedl. All rights reserved.
44
*
@@ -667,7 +667,7 @@ send_statvfs(u_int32_t id, struct statvfs *st)
667667

668668
/*
669669
* Prepare SSH2_FXP_VERSION extension advertisement for a single extension.
670-
* The extension is checked for permission prior to advertisment.
670+
* The extension is checked for permission prior to advertisement.
671671
*/
672672
static int
673673
compose_extension(struct sshbuf *msg, const char *name, const char *ver)
@@ -704,7 +704,7 @@ process_init(void)
704704
(r = sshbuf_put_u32(msg, SSH2_FILEXFER_VERSION)) != 0)
705705
fatal_fr(r, "compose");
706706

707-
/* extension advertisments */
707+
/* extension advertisements */
708708
compose_extension(msg, "[email protected]", "1");
709709
compose_extension(msg, "[email protected]", "2");
710710
compose_extension(msg, "[email protected]", "2");

ssh-agent.c

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/* $OpenBSD: ssh-agent.c,v 1.283 2021/12/19 22:13:55 djm Exp $ */
1+
/* $OpenBSD: ssh-agent.c,v 1.284 2022/01/01 01:55:30 jsg Exp $ */
22
/*
33
* Author: Tatu Ylonen <[email protected]>
44
* Copyright (c) 1995 Tatu Ylonen <[email protected]>, Espoo, Finland
@@ -450,7 +450,7 @@ identity_permitted(Identity *id, SocketEntry *e, char *user,
450450
* request (i.e. no 'user' supplied), then only permit the key if
451451
* there is a permission that would allow it to be used at another
452452
* destination. This hides keys that are allowed to be used to
453-
* authenicate *to* a host but not permitted for *use* beyond it.
453+
* authenticate *to* a host but not permitted for *use* beyond it.
454454
*/
455455
hks = &e->session_ids[e->nsession_ids - 1];
456456
if (hks->forwarded && user == NULL &&

umac.h

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/* $OpenBSD: umac.h,v 1.4 2019/06/07 14:18:48 dtucker Exp $ */
1+
/* $OpenBSD: umac.h,v 1.5 2022/01/01 01:55:30 jsg Exp $ */
22
/* -----------------------------------------------------------------------
33
*
44
* umac.h -- C Implementation UMAC Message Authentication
@@ -59,7 +59,7 @@ struct umac_ctx *umac_new(const u_char key[]);
5959

6060
#if 0
6161
int umac_reset(struct umac_ctx *ctx);
62-
/* Reset a umac_ctx to begin authenicating a new message */
62+
/* Reset a umac_ctx to begin authenticating a new message */
6363
#endif
6464

6565
int umac_update(struct umac_ctx *ctx, const u_char *input, long len);

0 commit comments

Comments
 (0)