diff options
author | Markus Friedl <markus@cvs.openbsd.org> | 2000-12-27 12:34:51 +0000 |
---|---|---|
committer | Markus Friedl <markus@cvs.openbsd.org> | 2000-12-27 12:34:51 +0000 |
commit | 832a6c5fd40ae348ac47756605e74d2e83d1b891 (patch) | |
tree | b93543be6165593bbb74fb60f80ad079b6aa2d44 /usr.bin | |
parent | 138ff6783f1d8745ac932c76c2f3e7bffeed398f (diff) |
typo
Diffstat (limited to 'usr.bin')
-rw-r--r-- | usr.bin/ssh/auth1.c | 8 | ||||
-rw-r--r-- | usr.bin/ssh/sshconnect2.c | 4 | ||||
-rw-r--r-- | usr.bin/ssh/sshd.c | 4 |
3 files changed, 8 insertions, 8 deletions
diff --git a/usr.bin/ssh/auth1.c b/usr.bin/ssh/auth1.c index c98c2651b01..a8521baa44d 100644 --- a/usr.bin/ssh/auth1.c +++ b/usr.bin/ssh/auth1.c @@ -10,7 +10,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: auth1.c,v 1.8 2000/12/19 23:17:55 markus Exp $"); +RCSID("$OpenBSD: auth1.c,v 1.9 2000/12/27 12:34:49 markus Exp $"); #include "xmalloc.h" #include "rsa.h" @@ -58,7 +58,7 @@ get_authname(int type) /* * read packets and try to authenticate local user 'luser'. - * return if authentication is successfull. not that pw == NULL + * return if authentication is successful. not that pw == NULL * if the user does not exists or is not allowed to login. * each auth method has to 'fake' authentication for nonexisting * users. @@ -404,11 +404,11 @@ do_authentication() } else { /* Loop until the user has been authenticated or the connection is closed, do_authloop() returns only if - authentication is successfull */ + authentication is successful */ do_authloop(pw, user); } if (pw == NULL) - fatal("internal error, authentication successfull for user '%.100s'", user); + fatal("internal error, authentication successful for user '%.100s'", user); /* The user has been authenticated and accepted. */ packet_start(SSH_SMSG_SUCCESS); diff --git a/usr.bin/ssh/sshconnect2.c b/usr.bin/ssh/sshconnect2.c index aee547fbee6..34d72818f3d 100644 --- a/usr.bin/ssh/sshconnect2.c +++ b/usr.bin/ssh/sshconnect2.c @@ -23,7 +23,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: sshconnect2.c,v 1.33 2000/12/20 19:37:22 markus Exp $"); +RCSID("$OpenBSD: sshconnect2.c,v 1.34 2000/12/27 12:34:50 markus Exp $"); #include <openssl/bn.h> #include <openssl/rsa.h> @@ -548,7 +548,7 @@ ssh_userauth2(const char *server_user, char *host) if (authctxt.agent != NULL) ssh_close_authentication_connection(authctxt.agent); - debug("ssh-userauth2 successfull: method %s", authctxt.method->name); + debug("ssh-userauth2 successful: method %s", authctxt.method->name); } void input_userauth_error(int type, int plen, void *ctxt) diff --git a/usr.bin/ssh/sshd.c b/usr.bin/ssh/sshd.c index 8d1ee0834f8..f8439db5271 100644 --- a/usr.bin/ssh/sshd.c +++ b/usr.bin/ssh/sshd.c @@ -40,7 +40,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: sshd.c,v 1.142 2000/12/20 19:37:22 markus Exp $"); +RCSID("$OpenBSD: sshd.c,v 1.143 2000/12/27 12:34:50 markus Exp $"); #include "xmalloc.h" #include "rsa.h" @@ -929,7 +929,7 @@ main(int ac, char **av) /* * the read end of the pipe is ready * if the child has closed the pipe - * after successfull authentication + * after successful authentication * or if the child has died */ close(startup_pipes[i]); |