aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorAndreas Schneider <asn@cryptomilk.org>2018-10-16 16:35:57 +0200
committerAndreas Schneider <asn@cryptomilk.org>2018-10-16 16:36:20 +0200
commit795389ae1b009d60914a5ed1176ef33d9c267e80 (patch)
tree6f7dd2582b564f9b4b00fd2866f77c34a2505aeb
parent60037f327540f9ff2255cb6cc6bba78ea1f066b9 (diff)
downloadlibssh-795389ae1b009d60914a5ed1176ef33d9c267e80.tar.gz
libssh-795389ae1b009d60914a5ed1176ef33d9c267e80.tar.xz
libssh-795389ae1b009d60914a5ed1176ef33d9c267e80.zip
src: Fix typos
Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
-rw-r--r--src/knownhosts.c2
-rw-r--r--src/pki_crypto.c4
-rw-r--r--src/pki_gcrypt.c2
3 files changed, 4 insertions, 4 deletions
diff --git a/src/knownhosts.c b/src/knownhosts.c
index 8738a4a3..d7c32e1a 100644
--- a/src/knownhosts.c
+++ b/src/knownhosts.c
@@ -621,7 +621,7 @@ int ssh_session_export_known_hosts_entry(ssh_session session,
if (session->current_crypto == NULL) {
ssh_set_error(session, SSH_FATAL,
- "No current crypto context, please connnect first");
+ "No current crypto context, please connect first");
SAFE_FREE(host);
return SSH_ERROR;
}
diff --git a/src/pki_crypto.c b/src/pki_crypto.c
index a90b6d00..c36425d7 100644
--- a/src/pki_crypto.c
+++ b/src/pki_crypto.c
@@ -790,7 +790,7 @@ ssh_string pki_private_key_to_pem(const ssh_key key,
case SSH_KEYTYPE_UNKNOWN:
default:
BIO_free(mem);
- SSH_LOG(SSH_LOG_WARN, "Unkown or invalid private key type %d", key->type);
+ SSH_LOG(SSH_LOG_WARN, "Unknown or invalid private key type %d", key->type);
return NULL;
}
@@ -916,7 +916,7 @@ ssh_key pki_private_key_from_base64(const char *b64_key,
case SSH_KEYTYPE_RSA_CERT01:
case SSH_KEYTYPE_UNKNOWN:
BIO_free(mem);
- SSH_LOG(SSH_LOG_WARN, "Unkown or invalid private key type %d", type);
+ SSH_LOG(SSH_LOG_WARN, "Unknown or invalid private key type %d", type);
return NULL;
}
diff --git a/src/pki_gcrypt.c b/src/pki_gcrypt.c
index 95499f00..2ba79af0 100644
--- a/src/pki_gcrypt.c
+++ b/src/pki_gcrypt.c
@@ -998,7 +998,7 @@ ssh_key pki_private_key_from_base64(const char *b64_key,
case SSH_KEYTYPE_RSA1:
case SSH_KEYTYPE_UNKNOWN:
default:
- SSH_LOG(SSH_LOG_WARN, "Unkown or invalid private key type %d", type);
+ SSH_LOG(SSH_LOG_WARN, "Unknown or invalid private key type %d", type);
return NULL;
}