summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorJonathan Gray <jsg@cvs.openbsd.org>2023-04-12 08:53:55 +0000
committerJonathan Gray <jsg@cvs.openbsd.org>2023-04-12 08:53:55 +0000
commit6e3a33edf3719e339c106ee0aec0356ee66fd056 (patch)
treea48cd4c4e85510c342e565bd99ed7a26b6f75cce
parent22d29ba26a7eb8e81d37b30d1af6245e995c48c7 (diff)
fix double words
ok dtucker@
-rw-r--r--usr.bin/ssh/PROTOCOL.agent4
-rw-r--r--usr.bin/ssh/sftp-server.c4
-rw-r--r--usr.bin/ssh/sftp.c4
-rw-r--r--usr.bin/ssh/ssh-keygen.c4
4 files changed, 8 insertions, 8 deletions
diff --git a/usr.bin/ssh/PROTOCOL.agent b/usr.bin/ssh/PROTOCOL.agent
index dba76b0c014..44e463674f1 100644
--- a/usr.bin/ssh/PROTOCOL.agent
+++ b/usr.bin/ssh/PROTOCOL.agent
@@ -31,7 +31,7 @@ should be bound for user authentication or forwarding.
When an agent received this message, it will verify the signature and
check the consistency of its contents, including refusing to accept
a duplicate session identifier, or any attempt to bind a connection
-previously bound for authentication. It will then then record the
+previously bound for authentication. It will then record the
binding for the life of the connection for use later in testing per-key
destination constraints.
@@ -81,4 +81,4 @@ the constraint is:
This option is only valid for XMSS keys.
-$OpenBSD: PROTOCOL.agent,v 1.18 2022/09/21 22:26:50 dtucker Exp $
+$OpenBSD: PROTOCOL.agent,v 1.19 2023/04/12 08:53:54 jsg Exp $
diff --git a/usr.bin/ssh/sftp-server.c b/usr.bin/ssh/sftp-server.c
index ce966bcb980..51258d9e801 100644
--- a/usr.bin/ssh/sftp-server.c
+++ b/usr.bin/ssh/sftp-server.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: sftp-server.c,v 1.146 2023/03/07 05:37:26 djm Exp $ */
+/* $OpenBSD: sftp-server.c,v 1.147 2023/04/12 08:53:54 jsg Exp $ */
/*
* Copyright (c) 2000-2004 Markus Friedl. All rights reserved.
*
@@ -597,7 +597,7 @@ send_handle(u_int32_t id, int handle)
int hlen;
handle_to_string(handle, &string, &hlen);
- debug("request %u: sent handle handle %d", id, handle);
+ debug("request %u: sent handle %d", id, handle);
send_data_or_handle(SSH2_FXP_HANDLE, id, string, hlen);
free(string);
}
diff --git a/usr.bin/ssh/sftp.c b/usr.bin/ssh/sftp.c
index 569ef5a0f50..e5e679f87d0 100644
--- a/usr.bin/ssh/sftp.c
+++ b/usr.bin/ssh/sftp.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: sftp.c,v 1.233 2023/04/06 03:12:32 djm Exp $ */
+/* $OpenBSD: sftp.c,v 1.234 2023/04/12 08:53:54 jsg Exp $ */
/*
* Copyright (c) 2001-2004 Damien Miller <djm@openbsd.org>
*
@@ -597,7 +597,7 @@ escape_glob(const char *s)
/*
* Arg p must be dynamically allocated. make_absolute will either return it
- * or free it and and allocate a new one. Caller must free returned string.
+ * or free it and allocate a new one. Caller must free returned string.
*/
static char *
make_absolute_pwd_glob(char *p, const char *pwd)
diff --git a/usr.bin/ssh/ssh-keygen.c b/usr.bin/ssh/ssh-keygen.c
index 7900966402c..39d3519c60f 100644
--- a/usr.bin/ssh/ssh-keygen.c
+++ b/usr.bin/ssh/ssh-keygen.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: ssh-keygen.c,v 1.466 2023/03/08 00:05:37 djm Exp $ */
+/* $OpenBSD: ssh-keygen.c,v 1.467 2023/04/12 08:53:54 jsg Exp $ */
/*
* Author: Tatu Ylonen <ylo@cs.hut.fi>
* Copyright (c) 1994 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -1163,7 +1163,7 @@ known_hosts_hash(struct hostkey_foreach_line *l, void *_ctx)
case HKF_STATUS_OK:
case HKF_STATUS_MATCHED:
/*
- * Don't hash hosts already already hashed, with wildcard
+ * Don't hash hosts already hashed, with wildcard
* characters or a CA/revocation marker.
*/
if (was_hashed || has_wild || l->marker != MRK_NONE) {