-/* $OpenBSD: misc.c,v 1.206 2025/09/04 00:31:49 djm Exp $ */
+/* $OpenBSD: misc.c,v 1.207 2025/09/24 00:51:28 jsg Exp $ */
/*
* Copyright (c) 2000 Markus Friedl. All rights reserved.
* Copyright (c) 2005-2020 Damien Miller. All rights reserved.
}
/*
- * Return next token in configuration line; splts on whitespace only.
+ * Return next token in configuration line; splits on whitespace only.
*/
char *
strdelimw(char **s)
-/* $OpenBSD: scp.c,v 1.266 2025/09/15 05:17:37 djm Exp $ */
+/* $OpenBSD: scp.c,v 1.267 2025/09/24 00:51:28 jsg Exp $ */
/*
* scp - secure remote copy. This is basically patched BSD rcp which
* uses ssh to do the data transfer (instead of using rcmd).
/*
* NB. do not use run_err() unless immediately followed by
* exit() below as it may send a spurious reply that might
- * desyncronise us from the peer. Use note_err() instead.
+ * desynchronise us from the peer. Use note_err() instead.
*/
statbytes = 0;
if (showprogress)
-/* $OpenBSD: ssh-pkcs11.c,v 1.69 2025/07/30 04:27:42 djm Exp $ */
+/* $OpenBSD: ssh-pkcs11.c,v 1.70 2025/09/24 00:51:28 jsg Exp $ */
/*
* Copyright (c) 2010 Markus Friedl. All rights reserved.
* Copyright (c) 2014 Pedro Martelletto. All rights reserved.
key->type = KEY_RSA;
key->flags |= SSHKEY_FLAG_EXT;
if (EVP_PKEY_bits(key->pkey) < SSH_RSA_MINIMUM_MODULUS_SIZE) {
- error_f("RSA key too small %d < minumum %d",
+ error_f("RSA key too small %d < minimum %d",
EVP_PKEY_bits(key->pkey), SSH_RSA_MINIMUM_MODULUS_SIZE);
goto fail;
}
key->type = KEY_RSA;
key->flags |= SSHKEY_FLAG_EXT;
if (EVP_PKEY_bits(key->pkey) < SSH_RSA_MINIMUM_MODULUS_SIZE) {
- error_f("RSA key too small %d < minumum %d",
+ error_f("RSA key too small %d < minimum %d",
EVP_PKEY_bits(key->pkey),
SSH_RSA_MINIMUM_MODULUS_SIZE);
goto out;