diff options
author | Tilo Eckert <tilo.eckert@flam.de> | 2018-11-27 16:39:50 +0100 |
---|---|---|
committer | Andreas Schneider <asn@cryptomilk.org> | 2018-11-30 16:29:17 +0100 |
commit | 95f83c2391fa52c8603f2d5471f8c0a178b08cfa (patch) | |
tree | 4385eefc34b56adf97f25d6ed96abe8f5604b8d7 | |
parent | 130256c3487d03f5bf07f86c1b809ab67588e121 (diff) | |
download | libssh-95f83c2391fa52c8603f2d5471f8c0a178b08cfa.tar.gz libssh-95f83c2391fa52c8603f2d5471f8c0a178b08cfa.tar.xz libssh-95f83c2391fa52c8603f2d5471f8c0a178b08cfa.zip |
src: Fix multiple typos
Signed-off-by: Tilo Eckert <tilo.eckert@flam.de>
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
-rw-r--r-- | src/config.c | 2 | ||||
-rw-r--r-- | src/libcrypto.c | 2 | ||||
-rw-r--r-- | tests/unittests/torture_pki.c | 4 |
3 files changed, 4 insertions, 4 deletions
diff --git a/src/config.c b/src/config.c index a2c1cc45..7461d7d9 100644 --- a/src/config.c +++ b/src/config.c @@ -510,7 +510,7 @@ static int ssh_config_parse_line(ssh_session session, const char *line, } ssh_set_error(session, SSH_FATAL, - "line %d: ERROR - Match all can not be combined with " + "line %d: ERROR - Match all cannot be combined with " "other Match attributes", count); SAFE_FREE(x); return -1; diff --git a/src/libcrypto.c b/src/libcrypto.c index 9c482aa0..d1f93978 100644 --- a/src/libcrypto.c +++ b/src/libcrypto.c @@ -519,7 +519,7 @@ static void evp_cipher_init(struct ssh_cipher_struct *cipher) { break; /* ciphers not using EVP */ case SSH_AEAD_CHACHA20_POLY1305: - SSH_LOG(SSH_LOG_WARNING, "The ChaCha cipher can not be handled here"); + SSH_LOG(SSH_LOG_WARNING, "The ChaCha cipher cannot be handled here"); break; case SSH_NO_CIPHER: SSH_LOG(SSH_LOG_WARNING, "No valid ciphertype found"); diff --git a/tests/unittests/torture_pki.c b/tests/unittests/torture_pki.c index f98a3d3b..8269bbb8 100644 --- a/tests/unittests/torture_pki.c +++ b/tests/unittests/torture_pki.c @@ -210,7 +210,7 @@ static void torture_pki_verify_mismatch(void **state) assert_true(rc == SSH_OK); assert_true(verify_key != NULL); - /* Should gradefully fail, but not crash */ + /* Should gracefully fail, but not crash */ rc = pki_signature_verify(session, sign, verify_key, @@ -240,7 +240,7 @@ static void torture_pki_verify_mismatch(void **state) assert_string_equal(new_sig->type_c, key->type_c); assert_string_equal(new_sig->type_c, signature_types[sig_type]); - /* The verificaiton should not work */ + /* The verification should not work */ rc = pki_signature_verify(session, new_sig, verify_key, |