From: jsg@openbsd.org Date: Wed, 24 Sep 2025 00:51:28 +0000 (+0000) Subject: upstream: spelling; ok dtucker@ X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=d8588478850463f8945aa18d0358b2b227f8b57a;p=thirdparty%2Fopenssh-portable.git upstream: spelling; ok dtucker@ OpenBSD-Commit-ID: 93870117b0153859dd8baa80b97e44d4558c786b --- diff --git a/misc.c b/misc.c index 922f04606..70da3348f 100644 --- a/misc.c +++ b/misc.c @@ -1,4 +1,4 @@ -/* $OpenBSD: misc.c,v 1.206 2025/09/04 00:31:49 djm Exp $ */ +/* $OpenBSD: misc.c,v 1.207 2025/09/24 00:51:28 jsg Exp $ */ /* * Copyright (c) 2000 Markus Friedl. All rights reserved. * Copyright (c) 2005-2020 Damien Miller. All rights reserved. @@ -490,7 +490,7 @@ strdelim(char **s) } /* - * Return next token in configuration line; splts on whitespace only. + * Return next token in configuration line; splits on whitespace only. */ char * strdelimw(char **s) diff --git a/scp.c b/scp.c index 0d3e1d4c1..c19f57c69 100644 --- a/scp.c +++ b/scp.c @@ -1,4 +1,4 @@ -/* $OpenBSD: scp.c,v 1.266 2025/09/15 05:17:37 djm Exp $ */ +/* $OpenBSD: scp.c,v 1.267 2025/09/24 00:51:28 jsg Exp $ */ /* * scp - secure remote copy. This is basically patched BSD rcp which * uses ssh to do the data transfer (instead of using rcmd). @@ -1880,7 +1880,7 @@ bad: run_err("%s: %s", np, strerror(errno)); /* * NB. do not use run_err() unless immediately followed by * exit() below as it may send a spurious reply that might - * desyncronise us from the peer. Use note_err() instead. + * desynchronise us from the peer. Use note_err() instead. */ statbytes = 0; if (showprogress) diff --git a/ssh-pkcs11.c b/ssh-pkcs11.c index 5167f89b8..809910e97 100644 --- a/ssh-pkcs11.c +++ b/ssh-pkcs11.c @@ -1,4 +1,4 @@ -/* $OpenBSD: ssh-pkcs11.c,v 1.69 2025/07/30 04:27:42 djm Exp $ */ +/* $OpenBSD: ssh-pkcs11.c,v 1.70 2025/09/24 00:51:28 jsg Exp $ */ /* * Copyright (c) 2010 Markus Friedl. All rights reserved. * Copyright (c) 2014 Pedro Martelletto. All rights reserved. @@ -1067,7 +1067,7 @@ pkcs11_fetch_rsa_pubkey(struct pkcs11_provider *p, CK_ULONG slotidx, key->type = KEY_RSA; key->flags |= SSHKEY_FLAG_EXT; if (EVP_PKEY_bits(key->pkey) < SSH_RSA_MINIMUM_MODULUS_SIZE) { - error_f("RSA key too small %d < minumum %d", + error_f("RSA key too small %d < minimum %d", EVP_PKEY_bits(key->pkey), SSH_RSA_MINIMUM_MODULUS_SIZE); goto fail; } @@ -1306,7 +1306,7 @@ pkcs11_fetch_x509_pubkey(struct pkcs11_provider *p, CK_ULONG slotidx, key->type = KEY_RSA; key->flags |= SSHKEY_FLAG_EXT; if (EVP_PKEY_bits(key->pkey) < SSH_RSA_MINIMUM_MODULUS_SIZE) { - error_f("RSA key too small %d < minumum %d", + error_f("RSA key too small %d < minimum %d", EVP_PKEY_bits(key->pkey), SSH_RSA_MINIMUM_MODULUS_SIZE); goto out;