summaryrefslogtreecommitdiff
path: root/usr.bin
diff options
context:
space:
mode:
authorMarkus Friedl <markus@cvs.openbsd.org>2000-12-27 12:34:51 +0000
committerMarkus Friedl <markus@cvs.openbsd.org>2000-12-27 12:34:51 +0000
commit832a6c5fd40ae348ac47756605e74d2e83d1b891 (patch)
treeb93543be6165593bbb74fb60f80ad079b6aa2d44 /usr.bin
parent138ff6783f1d8745ac932c76c2f3e7bffeed398f (diff)
typo
Diffstat (limited to 'usr.bin')
-rw-r--r--usr.bin/ssh/auth1.c8
-rw-r--r--usr.bin/ssh/sshconnect2.c4
-rw-r--r--usr.bin/ssh/sshd.c4
3 files changed, 8 insertions, 8 deletions
diff --git a/usr.bin/ssh/auth1.c b/usr.bin/ssh/auth1.c
index c98c2651b01..a8521baa44d 100644
--- a/usr.bin/ssh/auth1.c
+++ b/usr.bin/ssh/auth1.c
@@ -10,7 +10,7 @@
*/
#include "includes.h"
-RCSID("$OpenBSD: auth1.c,v 1.8 2000/12/19 23:17:55 markus Exp $");
+RCSID("$OpenBSD: auth1.c,v 1.9 2000/12/27 12:34:49 markus Exp $");
#include "xmalloc.h"
#include "rsa.h"
@@ -58,7 +58,7 @@ get_authname(int type)
/*
* read packets and try to authenticate local user 'luser'.
- * return if authentication is successfull. not that pw == NULL
+ * return if authentication is successful. not that pw == NULL
* if the user does not exists or is not allowed to login.
* each auth method has to 'fake' authentication for nonexisting
* users.
@@ -404,11 +404,11 @@ do_authentication()
} else {
/* Loop until the user has been authenticated or the
connection is closed, do_authloop() returns only if
- authentication is successfull */
+ authentication is successful */
do_authloop(pw, user);
}
if (pw == NULL)
- fatal("internal error, authentication successfull for user '%.100s'", user);
+ fatal("internal error, authentication successful for user '%.100s'", user);
/* The user has been authenticated and accepted. */
packet_start(SSH_SMSG_SUCCESS);
diff --git a/usr.bin/ssh/sshconnect2.c b/usr.bin/ssh/sshconnect2.c
index aee547fbee6..34d72818f3d 100644
--- a/usr.bin/ssh/sshconnect2.c
+++ b/usr.bin/ssh/sshconnect2.c
@@ -23,7 +23,7 @@
*/
#include "includes.h"
-RCSID("$OpenBSD: sshconnect2.c,v 1.33 2000/12/20 19:37:22 markus Exp $");
+RCSID("$OpenBSD: sshconnect2.c,v 1.34 2000/12/27 12:34:50 markus Exp $");
#include <openssl/bn.h>
#include <openssl/rsa.h>
@@ -548,7 +548,7 @@ ssh_userauth2(const char *server_user, char *host)
if (authctxt.agent != NULL)
ssh_close_authentication_connection(authctxt.agent);
- debug("ssh-userauth2 successfull: method %s", authctxt.method->name);
+ debug("ssh-userauth2 successful: method %s", authctxt.method->name);
}
void
input_userauth_error(int type, int plen, void *ctxt)
diff --git a/usr.bin/ssh/sshd.c b/usr.bin/ssh/sshd.c
index 8d1ee0834f8..f8439db5271 100644
--- a/usr.bin/ssh/sshd.c
+++ b/usr.bin/ssh/sshd.c
@@ -40,7 +40,7 @@
*/
#include "includes.h"
-RCSID("$OpenBSD: sshd.c,v 1.142 2000/12/20 19:37:22 markus Exp $");
+RCSID("$OpenBSD: sshd.c,v 1.143 2000/12/27 12:34:50 markus Exp $");
#include "xmalloc.h"
#include "rsa.h"
@@ -929,7 +929,7 @@ main(int ac, char **av)
/*
* the read end of the pipe is ready
* if the child has closed the pipe
- * after successfull authentication
+ * after successful authentication
* or if the child has died
*/
close(startup_pipes[i]);