[PATCH] Fix typos, OpenBSD + Portable

Darren Tucker dtucker at zip.com.au
Wed Jun 11 22:43:02 EST 2003


Hi.
	Whenever I notice a typo someplace, I fix it in a local "typo tree". 
Attached is 2 patches from that tree, one against OpenBSD and the other
against Portable.

	Is it worth fixing these?

		-Daz.

-- 
Darren Tucker (dtucker at zip.com.au)
GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4  37C9 C982 80C7 8FF4 FA69
    Good judgement comes with experience. Unfortunately, the experience
usually comes from bad judgement.
-------------- next part --------------
Index: TODO
===================================================================
RCS file: /usr/local/src/security/openssh/cvs/openssh_cvs/TODO,v
retrieving revision 1.54
diff -u -r1.54 TODO
--- TODO	18 May 2003 11:44:07 -0000	1.54
+++ TODO	18 May 2003 12:20:44 -0000
@@ -89,7 +89,7 @@
 - PAM 
   + See above PAM notes
 - AIX
-  + usrinfo() does not set TTY, but only required for legicy systems.  Works
+  + usrinfo() does not set TTY, but only required for legacy systems.  Works
     with PrivSep.
 - OSF
   + SIA is broken
Index: openbsd-compat/bsd-cray.c
===================================================================
RCS file: /usr/local/src/security/openssh/cvs/openssh_cvs/openbsd-compat/bsd-cray.c,v
retrieving revision 1.12
diff -u -r1.12 bsd-cray.c
--- openbsd-compat/bsd-cray.c	3 Jun 2003 02:45:27 -0000	1.12
+++ openbsd-compat/bsd-cray.c	11 Jun 2003 05:14:44 -0000
@@ -459,7 +459,7 @@
 	ia_success(&ssent, &sret);
 
 	/*
-	 * Query for account, iff > 1 valid acid & askacid permbit
+	 * Query for account, if > 1 valid acid & askacid permbit
 	 */
 	if (((ue.ue_permbits & PERMBITS_ACCTID) ||
 	    (ue.ue_acids[0] >= 0) && (ue.ue_acids[1] >= 0)) &&
Index: openbsd-compat/fake-rfc2553.c
===================================================================
RCS file: /usr/local/src/security/openssh/cvs/openssh_cvs/openbsd-compat/fake-rfc2553.c,v
retrieving revision 1.2
diff -u -r1.2 fake-rfc2553.c
--- openbsd-compat/fake-rfc2553.c	5 Jun 2003 09:37:30 -0000	1.2
+++ openbsd-compat/fake-rfc2553.c	11 Jun 2003 05:13:45 -0000
@@ -2,7 +2,7 @@
  * Pseudo-implementation of RFC2553 name / address resolution functions
  *
  * But these functions are not implemented correctly. The minimum subset
- * is implemented for ssh use only. For exapmle, this routine assumes
+ * is implemented for ssh use only. For example, this routine assumes
  * that ai_family is AF_INET. Don't use it for another purpose.
  */
 
Index: openbsd-compat/fake-rfc2553.h
===================================================================
RCS file: /usr/local/src/security/openssh/cvs/openssh_cvs/openbsd-compat/fake-rfc2553.h,v
retrieving revision 1.2
diff -u -r1.2 fake-rfc2553.h
--- openbsd-compat/fake-rfc2553.h	5 Jun 2003 12:20:11 -0000	1.2
+++ openbsd-compat/fake-rfc2553.h	11 Jun 2003 05:13:54 -0000
@@ -2,7 +2,7 @@
  * Pseudo-implementation of RFC2553 name / address resolution functions
  *
  * But these functions are not implemented correctly. The minimum subset
- * is implemented for ssh use only. For exapmle, this routine assumes
+ * is implemented for ssh use only. For example, this routine assumes
  * that ai_family is AF_INET. Don't use it for another purpose.
  */
 
-------------- next part --------------
? tmpfile
? scard/Ssh.bin
? scp/scp
? scp/scp.cat1
? sftp/sftp
? sftp/sftp.cat1
? sftp-server/sftp-server
? sftp-server/sftp-server.cat8
? ssh/ssh
? ssh/ssh.cat1
? ssh/ssh_config.cat5
? ssh-add/ssh-add
? ssh-add/ssh-add.cat1
? ssh-agent/ssh-agent
? ssh-agent/ssh-agent.cat1
? ssh-keygen/ssh-keygen
? ssh-keygen/ssh-keygen.cat1
? ssh-keyscan/ssh-keyscan
? ssh-keyscan/ssh-keyscan.cat1
? ssh-keysign/ssh-keysign
? ssh-keysign/ssh-keysign.cat8
? sshd/sshd
? sshd/sshd.cat8
? sshd/sshd_config.cat5
Index: auth.c
===================================================================
RCS file: /cvs/src/usr.bin/ssh/auth.c,v
retrieving revision 1.48
diff -u -r1.48 auth.c
--- auth.c	2003/06/02 09:17:34	1.48
+++ auth.c	2003/06/11 12:29:19
@@ -111,7 +111,7 @@
 			if (match_user(pw->pw_name, hostname, ipaddr,
 			    options.allow_users[i]))
 				break;
-		/* i < options.num_allow_users iff we break for loop */
+		/* i < options.num_allow_users if we break for loop */
 		if (i >= options.num_allow_users) {
 			logit("User %.100s not allowed because not listed in AllowUsers",
 			    pw->pw_name);
Index: monitor.c
===================================================================
RCS file: /cvs/src/usr.bin/ssh/monitor.c,v
retrieving revision 1.42
diff -u -r1.42 monitor.c
--- monitor.c	2003/06/02 09:17:34	1.42
+++ monitor.c	2003/06/11 12:29:20
@@ -93,7 +93,7 @@
 	u_int olen;
 } child_state;
 
-/* Functions on the montior that answer unprivileged requests */
+/* Functions on the monitor that answer unprivileged requests */
 
 int mm_answer_moduli(int, Buffer *);
 int mm_answer_sign(int, Buffer *);
Index: sftp-client.c
===================================================================
RCS file: /cvs/src/usr.bin/ssh/sftp-client.c,v
retrieving revision 1.43
diff -u -r1.43 sftp-client.c
--- sftp-client.c	2003/04/08 20:21:29	1.43
+++ sftp-client.c	2003/06/11 12:29:21
@@ -904,7 +904,7 @@
 				if (len < buflen)
 					buflen = MAX(MIN_READ_SIZE, len);
 			}
-			if (max_req > 0) { /* max_req = 0 iff EOF received */
+			if (max_req > 0) { /* max_req = 0 if EOF received */
 				if (size > 0 && offset > size) {
 					/* Only one request at a time
 					 * after the expected EOF */
Index: sshlogin.c
===================================================================
RCS file: /cvs/src/usr.bin/ssh/sshlogin.c,v
retrieving revision 1.6
diff -u -r1.6 sshlogin.c
--- sshlogin.c	2003/04/08 20:21:29	1.6
+++ sshlogin.c	2003/06/11 12:29:21
@@ -79,8 +79,8 @@
 }
 
 /*
- * Records that the user has logged in.  I these parts of operating systems
- * were more standardized.
+ * Records that the user has logged in.  I wish these parts of operating
+ * systems were more standardized.
  */
 void
 record_login(pid_t pid, const char *ttyname, const char *user, uid_t uid,
Index: sshpty.c
===================================================================
RCS file: /cvs/src/usr.bin/ssh/sshpty.c,v
retrieving revision 1.9
diff -u -r1.9 sshpty.c
--- sshpty.c	2003/05/24 09:30:40	1.9
+++ sshpty.c	2003/06/11 12:29:21
@@ -181,7 +181,7 @@
 		error("chmod %.100s 0666 failed: %.100s", ttyname, strerror(errno));
 }
 
-/* Makes the tty the processes controlling tty and sets it to sane modes. */
+/* Makes the tty the process's controlling tty and sets it to sane modes. */
 
 void
 pty_make_controlling_tty(int *ttyfd, const char *ttyname)


More information about the openssh-unix-dev mailing list