diff options
author | Damien Miller <djm@cvs.openbsd.org> | 2018-04-10 00:14:11 +0000 |
---|---|---|
committer | Damien Miller <djm@cvs.openbsd.org> | 2018-04-10 00:14:11 +0000 |
commit | 18ca8345983fdb1e53e595316472690d2ee434c6 (patch) | |
tree | 198ccfbe62bc65e3b6eee2fb76d022a8d8b9b79e | |
parent | 41821af9b43e6b923e17c40bee2b60800140eb20 (diff) |
more typos spotted by Karsten Weiss using codespell
-rw-r--r-- | regress/usr.bin/ssh/cert-file.sh | 6 | ||||
-rw-r--r-- | regress/usr.bin/ssh/rekey.sh | 12 |
2 files changed, 9 insertions, 9 deletions
diff --git a/regress/usr.bin/ssh/cert-file.sh b/regress/usr.bin/ssh/cert-file.sh index 8fd62c7730d..1157a3582e5 100644 --- a/regress/usr.bin/ssh/cert-file.sh +++ b/regress/usr.bin/ssh/cert-file.sh @@ -1,4 +1,4 @@ -# $OpenBSD: cert-file.sh,v 1.6 2017/04/30 23:34:55 djm Exp $ +# $OpenBSD: cert-file.sh,v 1.7 2018/04/10 00:14:10 djm Exp $ # Placed in the Public Domain. tid="ssh with certificates" @@ -52,7 +52,7 @@ echo "cert-authority $(cat $OBJ/user_ca_key1.pub)" > $OBJ/authorized_keys_$USER cat $OBJ/ssh_proxy | grep -v IdentityFile > $OBJ/no_identity_config # XXX: verify that certificate used was what we expect. Needs exposure of -# keys via enviornment variable or similar. +# keys via environment variable or similar. # Key with no .pub should work - finding the equivalent *-cert.pub. verbose "identity cert with no plain public file" @@ -138,7 +138,7 @@ fi # try ssh with the agent and certificates opts="-F $OBJ/ssh_proxy" -# with no certificates, shoud fail +# with no certificates, should fail ${SSH} $opts somehost exit 52 if [ $? -eq 52 ]; then fail "ssh connect with agent in succeeded with no cert" diff --git a/regress/usr.bin/ssh/rekey.sh b/regress/usr.bin/ssh/rekey.sh index ae145bc8b92..fd6a02cc7a6 100644 --- a/regress/usr.bin/ssh/rekey.sh +++ b/regress/usr.bin/ssh/rekey.sh @@ -1,4 +1,4 @@ -# $OpenBSD: rekey.sh,v 1.17 2016/01/29 05:18:15 dtucker Exp $ +# $OpenBSD: rekey.sh,v 1.18 2018/04/10 00:14:10 djm Exp $ # Placed in the Public Domain. tid="rekey" @@ -30,7 +30,7 @@ ssh_data_rekeying() n=`expr $n - 1` trace "$n rekeying(s)" if [ $n -lt 1 ]; then - fail "no rekeying occured ($@)" + fail "no rekeying occurred ($@)" fi } @@ -80,7 +80,7 @@ for s in 5 10; do n=`expr $n - 1` trace "$n rekeying(s)" if [ $n -lt 1 ]; then - fail "no rekeying occured" + fail "no rekeying occurred" fi done @@ -96,7 +96,7 @@ for s in 5 10; do n=`expr $n - 1` trace "$n rekeying(s)" if [ $n -lt 1 ]; then - fail "no rekeying occured" + fail "no rekeying occurred" fi done @@ -115,7 +115,7 @@ for s in 16 1k 128k 256k; do n=`expr $n - 1` trace "$n rekeying(s)" if [ $n -lt 1 ]; then - fail "no rekeying occured" + fail "no rekeying occurred" fi done @@ -132,7 +132,7 @@ for s in 5 10; do n=`expr $n - 1` trace "$n rekeying(s)" if [ $n -lt 1 ]; then - fail "no rekeying occured" + fail "no rekeying occurred" fi done |