[openssh-commits] [openssh] 01/10: upstream: spelling; ok dtucker@
git+noreply at mindrot.org
git+noreply at mindrot.org
Thu Sep 25 17:02:32 AEST 2025
This is an automated email from the git hooks/post-receive script.
djm pushed a commit to branch master
in repository openssh.
commit d8588478850463f8945aa18d0358b2b227f8b57a
Author: jsg at openbsd.org <jsg at openbsd.org>
AuthorDate: Wed Sep 24 00:51:28 2025 +0000
upstream: spelling; ok dtucker@
OpenBSD-Commit-ID: 93870117b0153859dd8baa80b97e44d4558c786b
---
misc.c | 4 ++--
scp.c | 4 ++--
ssh-pkcs11.c | 6 +++---
3 files changed, 7 insertions(+), 7 deletions(-)
diff --git a/misc.c b/misc.c
index 922f04606..70da3348f 100644
--- a/misc.c
+++ b/misc.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: misc.c,v 1.206 2025/09/04 00:31:49 djm Exp $ */
+/* $OpenBSD: misc.c,v 1.207 2025/09/24 00:51:28 jsg Exp $ */
/*
* Copyright (c) 2000 Markus Friedl. All rights reserved.
* Copyright (c) 2005-2020 Damien Miller. All rights reserved.
@@ -490,7 +490,7 @@ strdelim(char **s)
}
/*
- * Return next token in configuration line; splts on whitespace only.
+ * Return next token in configuration line; splits on whitespace only.
*/
char *
strdelimw(char **s)
diff --git a/scp.c b/scp.c
index 0d3e1d4c1..c19f57c69 100644
--- a/scp.c
+++ b/scp.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: scp.c,v 1.266 2025/09/15 05:17:37 djm Exp $ */
+/* $OpenBSD: scp.c,v 1.267 2025/09/24 00:51:28 jsg Exp $ */
/*
* scp - secure remote copy. This is basically patched BSD rcp which
* uses ssh to do the data transfer (instead of using rcmd).
@@ -1880,7 +1880,7 @@ bad: run_err("%s: %s", np, strerror(errno));
/*
* NB. do not use run_err() unless immediately followed by
* exit() below as it may send a spurious reply that might
- * desyncronise us from the peer. Use note_err() instead.
+ * desynchronise us from the peer. Use note_err() instead.
*/
statbytes = 0;
if (showprogress)
diff --git a/ssh-pkcs11.c b/ssh-pkcs11.c
index 5167f89b8..809910e97 100644
--- a/ssh-pkcs11.c
+++ b/ssh-pkcs11.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: ssh-pkcs11.c,v 1.69 2025/07/30 04:27:42 djm Exp $ */
+/* $OpenBSD: ssh-pkcs11.c,v 1.70 2025/09/24 00:51:28 jsg Exp $ */
/*
* Copyright (c) 2010 Markus Friedl. All rights reserved.
* Copyright (c) 2014 Pedro Martelletto. All rights reserved.
@@ -1067,7 +1067,7 @@ pkcs11_fetch_rsa_pubkey(struct pkcs11_provider *p, CK_ULONG slotidx,
key->type = KEY_RSA;
key->flags |= SSHKEY_FLAG_EXT;
if (EVP_PKEY_bits(key->pkey) < SSH_RSA_MINIMUM_MODULUS_SIZE) {
- error_f("RSA key too small %d < minumum %d",
+ error_f("RSA key too small %d < minimum %d",
EVP_PKEY_bits(key->pkey), SSH_RSA_MINIMUM_MODULUS_SIZE);
goto fail;
}
@@ -1306,7 +1306,7 @@ pkcs11_fetch_x509_pubkey(struct pkcs11_provider *p, CK_ULONG slotidx,
key->type = KEY_RSA;
key->flags |= SSHKEY_FLAG_EXT;
if (EVP_PKEY_bits(key->pkey) < SSH_RSA_MINIMUM_MODULUS_SIZE) {
- error_f("RSA key too small %d < minumum %d",
+ error_f("RSA key too small %d < minimum %d",
EVP_PKEY_bits(key->pkey),
SSH_RSA_MINIMUM_MODULUS_SIZE);
goto out;
--
To stop receiving notification emails like this one, please contact
djm at mindrot.org.
More information about the openssh-commits
mailing list