[openssh-commits] [openssh] 07/08: upstream: more typos spotted by Karsten Weiss using codespell
git+noreply at mindrot.org
git+noreply at mindrot.org
Tue Apr 10 10:19:44 AEST 2018
This is an automated email from the git hooks/post-receive script.
djm pushed a commit to branch master
in repository openssh.
commit 907da2f88519b34189fd03fac96de0c52d448233
Author: djm at openbsd.org <djm at openbsd.org>
Date: Tue Apr 10 00:14:10 2018 +0000
upstream: more typos spotted by Karsten Weiss using codespell
OpenBSD-Regress-ID: d906a2aea0663810a658b7d0bc61a1d2907d4d69
---
regress/cert-file.sh | 6 +++---
regress/rekey.sh | 12 ++++++------
2 files changed, 9 insertions(+), 9 deletions(-)
diff --git a/regress/cert-file.sh b/regress/cert-file.sh
index 8fd62c77..1157a358 100644
--- a/regress/cert-file.sh
+++ b/regress/cert-file.sh
@@ -1,4 +1,4 @@
-# $OpenBSD: cert-file.sh,v 1.6 2017/04/30 23:34:55 djm Exp $
+# $OpenBSD: cert-file.sh,v 1.7 2018/04/10 00:14:10 djm Exp $
# Placed in the Public Domain.
tid="ssh with certificates"
@@ -52,7 +52,7 @@ echo "cert-authority $(cat $OBJ/user_ca_key1.pub)" > $OBJ/authorized_keys_$USER
cat $OBJ/ssh_proxy | grep -v IdentityFile > $OBJ/no_identity_config
# XXX: verify that certificate used was what we expect. Needs exposure of
-# keys via enviornment variable or similar.
+# keys via environment variable or similar.
# Key with no .pub should work - finding the equivalent *-cert.pub.
verbose "identity cert with no plain public file"
@@ -138,7 +138,7 @@ fi
# try ssh with the agent and certificates
opts="-F $OBJ/ssh_proxy"
-# with no certificates, shoud fail
+# with no certificates, should fail
${SSH} $opts somehost exit 52
if [ $? -eq 52 ]; then
fail "ssh connect with agent in succeeded with no cert"
diff --git a/regress/rekey.sh b/regress/rekey.sh
index ae145bc8..fd6a02cc 100644
--- a/regress/rekey.sh
+++ b/regress/rekey.sh
@@ -1,4 +1,4 @@
-# $OpenBSD: rekey.sh,v 1.17 2016/01/29 05:18:15 dtucker Exp $
+# $OpenBSD: rekey.sh,v 1.18 2018/04/10 00:14:10 djm Exp $
# Placed in the Public Domain.
tid="rekey"
@@ -30,7 +30,7 @@ ssh_data_rekeying()
n=`expr $n - 1`
trace "$n rekeying(s)"
if [ $n -lt 1 ]; then
- fail "no rekeying occured ($@)"
+ fail "no rekeying occurred ($@)"
fi
}
@@ -80,7 +80,7 @@ for s in 5 10; do
n=`expr $n - 1`
trace "$n rekeying(s)"
if [ $n -lt 1 ]; then
- fail "no rekeying occured"
+ fail "no rekeying occurred"
fi
done
@@ -96,7 +96,7 @@ for s in 5 10; do
n=`expr $n - 1`
trace "$n rekeying(s)"
if [ $n -lt 1 ]; then
- fail "no rekeying occured"
+ fail "no rekeying occurred"
fi
done
@@ -115,7 +115,7 @@ for s in 16 1k 128k 256k; do
n=`expr $n - 1`
trace "$n rekeying(s)"
if [ $n -lt 1 ]; then
- fail "no rekeying occured"
+ fail "no rekeying occurred"
fi
done
@@ -132,7 +132,7 @@ for s in 5 10; do
n=`expr $n - 1`
trace "$n rekeying(s)"
if [ $n -lt 1 ]; then
- fail "no rekeying occured"
+ fail "no rekeying occurred"
fi
done
--
To stop receiving notification emails like this one, please contact
djm at mindrot.org.
More information about the openssh-commits
mailing list