diff options
-rw-r--r-- | src/knownhosts.c | 2 | ||||
-rw-r--r-- | src/pki_crypto.c | 4 | ||||
-rw-r--r-- | src/pki_gcrypt.c | 2 |
3 files changed, 4 insertions, 4 deletions
diff --git a/src/knownhosts.c b/src/knownhosts.c index 8738a4a3..d7c32e1a 100644 --- a/src/knownhosts.c +++ b/src/knownhosts.c @@ -621,7 +621,7 @@ int ssh_session_export_known_hosts_entry(ssh_session session, if (session->current_crypto == NULL) { ssh_set_error(session, SSH_FATAL, - "No current crypto context, please connnect first"); + "No current crypto context, please connect first"); SAFE_FREE(host); return SSH_ERROR; } diff --git a/src/pki_crypto.c b/src/pki_crypto.c index a90b6d00..c36425d7 100644 --- a/src/pki_crypto.c +++ b/src/pki_crypto.c @@ -790,7 +790,7 @@ ssh_string pki_private_key_to_pem(const ssh_key key, case SSH_KEYTYPE_UNKNOWN: default: BIO_free(mem); - SSH_LOG(SSH_LOG_WARN, "Unkown or invalid private key type %d", key->type); + SSH_LOG(SSH_LOG_WARN, "Unknown or invalid private key type %d", key->type); return NULL; } @@ -916,7 +916,7 @@ ssh_key pki_private_key_from_base64(const char *b64_key, case SSH_KEYTYPE_RSA_CERT01: case SSH_KEYTYPE_UNKNOWN: BIO_free(mem); - SSH_LOG(SSH_LOG_WARN, "Unkown or invalid private key type %d", type); + SSH_LOG(SSH_LOG_WARN, "Unknown or invalid private key type %d", type); return NULL; } diff --git a/src/pki_gcrypt.c b/src/pki_gcrypt.c index 95499f00..2ba79af0 100644 --- a/src/pki_gcrypt.c +++ b/src/pki_gcrypt.c @@ -998,7 +998,7 @@ ssh_key pki_private_key_from_base64(const char *b64_key, case SSH_KEYTYPE_RSA1: case SSH_KEYTYPE_UNKNOWN: default: - SSH_LOG(SSH_LOG_WARN, "Unkown or invalid private key type %d", type); + SSH_LOG(SSH_LOG_WARN, "Unknown or invalid private key type %d", type); return NULL; } |