summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authormarkus <markus@openbsd.org>2000-12-27 12:34:49 +0000
committermarkus <markus@openbsd.org>2000-12-27 12:34:49 +0000
commit52e62b704854a4702d0d37b67f045336c7777341 (patch)
tree791d7eacc831cb2f6d708604a97159de29a3919a
parentnew option: HostKeyAlias: allows the user to record the host key (diff)
downloadwireguard-openbsd-52e62b704854a4702d0d37b67f045336c7777341.tar.xz
wireguard-openbsd-52e62b704854a4702d0d37b67f045336c7777341.zip
typo
-rw-r--r--usr.bin/ssh/auth1.c8
-rw-r--r--usr.bin/ssh/sshconnect2.c4
-rw-r--r--usr.bin/ssh/sshd.c4
3 files changed, 8 insertions, 8 deletions
diff --git a/usr.bin/ssh/auth1.c b/usr.bin/ssh/auth1.c
index c98c2651b01..a8521baa44d 100644
--- a/usr.bin/ssh/auth1.c
+++ b/usr.bin/ssh/auth1.c
@@ -10,7 +10,7 @@
*/
#include "includes.h"
-RCSID("$OpenBSD: auth1.c,v 1.8 2000/12/19 23:17:55 markus Exp $");
+RCSID("$OpenBSD: auth1.c,v 1.9 2000/12/27 12:34:49 markus Exp $");
#include "xmalloc.h"
#include "rsa.h"
@@ -58,7 +58,7 @@ get_authname(int type)
/*
* read packets and try to authenticate local user 'luser'.
- * return if authentication is successfull. not that pw == NULL
+ * return if authentication is successful. not that pw == NULL
* if the user does not exists or is not allowed to login.
* each auth method has to 'fake' authentication for nonexisting
* users.
@@ -404,11 +404,11 @@ do_authentication()
} else {
/* Loop until the user has been authenticated or the
connection is closed, do_authloop() returns only if
- authentication is successfull */
+ authentication is successful */
do_authloop(pw, user);
}
if (pw == NULL)
- fatal("internal error, authentication successfull for user '%.100s'", user);
+ fatal("internal error, authentication successful for user '%.100s'", user);
/* The user has been authenticated and accepted. */
packet_start(SSH_SMSG_SUCCESS);
diff --git a/usr.bin/ssh/sshconnect2.c b/usr.bin/ssh/sshconnect2.c
index aee547fbee6..34d72818f3d 100644
--- a/usr.bin/ssh/sshconnect2.c
+++ b/usr.bin/ssh/sshconnect2.c
@@ -23,7 +23,7 @@
*/
#include "includes.h"
-RCSID("$OpenBSD: sshconnect2.c,v 1.33 2000/12/20 19:37:22 markus Exp $");
+RCSID("$OpenBSD: sshconnect2.c,v 1.34 2000/12/27 12:34:50 markus Exp $");
#include <openssl/bn.h>
#include <openssl/rsa.h>
@@ -548,7 +548,7 @@ ssh_userauth2(const char *server_user, char *host)
if (authctxt.agent != NULL)
ssh_close_authentication_connection(authctxt.agent);
- debug("ssh-userauth2 successfull: method %s", authctxt.method->name);
+ debug("ssh-userauth2 successful: method %s", authctxt.method->name);
}
void
input_userauth_error(int type, int plen, void *ctxt)
diff --git a/usr.bin/ssh/sshd.c b/usr.bin/ssh/sshd.c
index 8d1ee0834f8..f8439db5271 100644
--- a/usr.bin/ssh/sshd.c
+++ b/usr.bin/ssh/sshd.c
@@ -40,7 +40,7 @@
*/
#include "includes.h"
-RCSID("$OpenBSD: sshd.c,v 1.142 2000/12/20 19:37:22 markus Exp $");
+RCSID("$OpenBSD: sshd.c,v 1.143 2000/12/27 12:34:50 markus Exp $");
#include "xmalloc.h"
#include "rsa.h"
@@ -929,7 +929,7 @@ main(int ac, char **av)
/*
* the read end of the pipe is ready
* if the child has closed the pipe
- * after successfull authentication
+ * after successful authentication
* or if the child has died
*/
close(startup_pipes[i]);