[openssh-commits] [openssh] 01/10: upstream: spelling; ok dtucker@

git+noreply at mindrot.org git+noreply at mindrot.org
Thu Sep 25 17:02:32 AEST 2025


This is an automated email from the git hooks/post-receive script.

djm pushed a commit to branch master
in repository openssh.

commit d8588478850463f8945aa18d0358b2b227f8b57a
Author: jsg at openbsd.org <jsg at openbsd.org>
AuthorDate: Wed Sep 24 00:51:28 2025 +0000

    upstream: spelling; ok dtucker@
    
    OpenBSD-Commit-ID: 93870117b0153859dd8baa80b97e44d4558c786b
---
 misc.c       | 4 ++--
 scp.c        | 4 ++--
 ssh-pkcs11.c | 6 +++---
 3 files changed, 7 insertions(+), 7 deletions(-)

diff --git a/misc.c b/misc.c
index 922f04606..70da3348f 100644
--- a/misc.c
+++ b/misc.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: misc.c,v 1.206 2025/09/04 00:31:49 djm Exp $ */
+/* $OpenBSD: misc.c,v 1.207 2025/09/24 00:51:28 jsg Exp $ */
 /*
  * Copyright (c) 2000 Markus Friedl.  All rights reserved.
  * Copyright (c) 2005-2020 Damien Miller.  All rights reserved.
@@ -490,7 +490,7 @@ strdelim(char **s)
 }
 
 /*
- * Return next token in configuration line; splts on whitespace only.
+ * Return next token in configuration line; splits on whitespace only.
  */
 char *
 strdelimw(char **s)
diff --git a/scp.c b/scp.c
index 0d3e1d4c1..c19f57c69 100644
--- a/scp.c
+++ b/scp.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: scp.c,v 1.266 2025/09/15 05:17:37 djm Exp $ */
+/* $OpenBSD: scp.c,v 1.267 2025/09/24 00:51:28 jsg Exp $ */
 /*
  * scp - secure remote copy.  This is basically patched BSD rcp which
  * uses ssh to do the data transfer (instead of using rcmd).
@@ -1880,7 +1880,7 @@ bad:			run_err("%s: %s", np, strerror(errno));
 		/*
 		 * NB. do not use run_err() unless immediately followed by
 		 * exit() below as it may send a spurious reply that might
-		 * desyncronise us from the peer. Use note_err() instead.
+		 * desynchronise us from the peer. Use note_err() instead.
 		 */
 		statbytes = 0;
 		if (showprogress)
diff --git a/ssh-pkcs11.c b/ssh-pkcs11.c
index 5167f89b8..809910e97 100644
--- a/ssh-pkcs11.c
+++ b/ssh-pkcs11.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: ssh-pkcs11.c,v 1.69 2025/07/30 04:27:42 djm Exp $ */
+/* $OpenBSD: ssh-pkcs11.c,v 1.70 2025/09/24 00:51:28 jsg Exp $ */
 /*
  * Copyright (c) 2010 Markus Friedl.  All rights reserved.
  * Copyright (c) 2014 Pedro Martelletto. All rights reserved.
@@ -1067,7 +1067,7 @@ pkcs11_fetch_rsa_pubkey(struct pkcs11_provider *p, CK_ULONG slotidx,
 	key->type = KEY_RSA;
 	key->flags |= SSHKEY_FLAG_EXT;
 	if (EVP_PKEY_bits(key->pkey) < SSH_RSA_MINIMUM_MODULUS_SIZE) {
-		error_f("RSA key too small %d < minumum %d",
+		error_f("RSA key too small %d < minimum %d",
 		    EVP_PKEY_bits(key->pkey), SSH_RSA_MINIMUM_MODULUS_SIZE);
 		goto fail;
 	}
@@ -1306,7 +1306,7 @@ pkcs11_fetch_x509_pubkey(struct pkcs11_provider *p, CK_ULONG slotidx,
 		key->type = KEY_RSA;
 		key->flags |= SSHKEY_FLAG_EXT;
 		if (EVP_PKEY_bits(key->pkey) < SSH_RSA_MINIMUM_MODULUS_SIZE) {
-			error_f("RSA key too small %d < minumum %d",
+			error_f("RSA key too small %d < minimum %d",
 			    EVP_PKEY_bits(key->pkey),
 			    SSH_RSA_MINIMUM_MODULUS_SIZE);
 			goto out;

-- 
To stop receiving notification emails like this one, please contact
djm at mindrot.org.


More information about the openssh-commits mailing list