-/* $OpenBSD: mta_session.c,v 1.151 2024/01/20 09:01:03 claudio Exp $ */
+/* $OpenBSD: mta_session.c,v 1.152 2024/09/03 18:27:04 op Exp $ */
/*
* Copyright (c) 2008 Pierre-Yves Ritschard <pyr@openbsd.org>
else if (s->relay->secret) {
log_debug("debug: mta: %p: not using AUTH on non-TLS "
"session", s);
- mta_error(s, "Refuse to AUTH over unsecure channel");
+ mta_error(s, "Refuse to AUTH over insecure channel");
mta_connect(s);
} else {
mta_enter_state(s, MTA_READY);
-/* $OpenBSD: scheduler_ramqueue.c,v 1.48 2023/05/31 16:51:46 op Exp $ */
+/* $OpenBSD: scheduler_ramqueue.c,v 1.49 2024/09/03 18:27:04 op Exp $ */
/*
* Copyright (c) 2012 Gilles Chehade <gilles@poolp.org>
while (tree_poproot(&update->messages, &id, (void*)&message)) {
if ((tomessage = tree_get(&rq->messages, id)) == NULL) {
- /* message does not exist. re-use structure */
+ /* message does not exist. reuse structure */
tree_xset(&rq->messages, id, message);
continue;
}
-/* $OpenBSD: smtpd.c,v 1.351 2024/05/07 12:10:06 op Exp $ */
+/* $OpenBSD: smtpd.c,v 1.352 2024/09/03 18:27:04 op Exp $ */
/*
* Copyright (c) 2008 Gilles Chehade <gilles@poolp.org>
}
if (!secure_file(fd, pathname, directory, uid, 1)) {
- log_warnx("warn: smtpd: %s: unsecure file", pathname);
+ log_warnx("warn: smtpd: %s: insecure file", pathname);
close(fd);
return -1;
}