-/* $OpenBSD: clientloop.c,v 1.409 2024/10/13 22:20:06 djm Exp $ */
+/* $OpenBSD: clientloop.c,v 1.410 2024/12/03 22:30:03 jsg Exp $ */
/*
* Author: Tatu Ylonen <ylo@cs.hut.fi>
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
/* Don't arm output fd for poll until the timing interval has elapsed... */
if (timespeccmp(&now, &next_interval, <))
- /* ...unless there's x11 communicattion happening */
+ /* ...unless there's x11 communication happening */
return x11_channel_used_recently(ssh);
/* Calculate number of intervals missed since the last check */
-/* $OpenBSD: monitor.c,v 1.245 2024/09/22 12:56:21 jsg Exp $ */
+/* $OpenBSD: monitor.c,v 1.247 2024/12/03 22:30:03 jsg Exp $ */
/*
* Copyright 2002 Niels Provos <provos@citi.umich.edu>
* Copyright 2002 Markus Friedl <markus@openbsd.org>
(confdata = sshbuf_new()) == NULL)
fatal_f("sshbuf_new failed");
- /* XXX unneccessary? */
+ /* XXX unnecessary? */
/* pack includes into a string */
TAILQ_FOREACH(item, &includes, entry) {
if ((r = sshbuf_put_cstring(inc, item->selector)) != 0 ||
-/* $OpenBSD$ */
+/* $OpenBSD: sshd-auth.c,v 1.2 2024/12/03 22:30:03 jsg Exp $ */
/*
* SSH2 implementation:
* Privilege Separation:
}
}
if (!have_key)
- fatal("internal error: recieved no hostkeys");
+ fatal("internal error: received no hostkeys");
/* Ensure that umask disallows at least group and world write */
new_umask = umask(0077) | 0022;
echo >&2 Debugging ${SSHD} auth ${SSHD_AUTH} session ${SSHD_SESSION}
# Append SshdSessionPath and SshdAuthPath pointing to the build directory.
-# If you explicity specify these in the command line, the first-match
+# If you explicitly specify these in the command line, the first-match
# keyword semantics will override these.
exec "${SSHD}" $@ \
-oSshdAuthPath="${SSHD_AUTH}" -oSshdSessionPath="${SSHD_SESSION}"