From a14ca28dd9d9b51e58d96ffb5d8b6575c5cd2f86 Mon Sep 17 00:00:00 2001 From: djm Date: Fri, 31 May 2024 08:49:35 +0000 Subject: [PATCH] typos --- usr.bin/ssh/auth2-methods.c | 6 +++--- usr.bin/ssh/packet.c | 4 ++-- 2 files changed, 5 insertions(+), 5 deletions(-) diff --git a/usr.bin/ssh/auth2-methods.c b/usr.bin/ssh/auth2-methods.c index 4043b095868..6ceff6e1296 100644 --- a/usr.bin/ssh/auth2-methods.c +++ b/usr.bin/ssh/auth2-methods.c @@ -29,13 +29,13 @@ extern ServerOptions options; /* - * Configuration of enabled authentication methods. Separate to the rest of + * Configuration of enabled authentication methods. Separate from the rest of * auth2-*.c because we want to query it during server configuration validity * checking in the sshd listener process without pulling all the auth code in * too. */ -/* "none" is allowed only one time and it cleared by userauth_none() later */ +/* "none" is allowed only one time and it is cleared by userauth_none() later */ int none_enabled = 1; struct authmethod_cfg methodcfg_none = { "none", @@ -83,7 +83,7 @@ static struct authmethod_cfg *authmethod_cfgs[] = { }; /* - * Check a comma-separated list of methods for validity. Is need_enable is + * Check a comma-separated list of methods for validity. If need_enable is * non-zero, then also require that the methods are enabled. * Returns 0 on success or -1 if the methods list is invalid. */ diff --git a/usr.bin/ssh/packet.c b/usr.bin/ssh/packet.c index 33e821c23a6..70c98dd0f03 100644 --- a/usr.bin/ssh/packet.c +++ b/usr.bin/ssh/packet.c @@ -1,4 +1,4 @@ -/* $OpenBSD: packet.c,v 1.314 2024/05/17 00:30:24 djm Exp $ */ +/* $OpenBSD: packet.c,v 1.315 2024/05/31 08:49:35 djm Exp $ */ /* * Author: Tatu Ylonen * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland @@ -519,7 +519,7 @@ ssh_remote_ipaddr(struct ssh *ssh) * be freed. NB. this will usually trigger a DNS query. Return value is on * heap and no caching is performed. * This function does additional checks on the hostname to mitigate some - * attacks on based on conflation of hostnames and addresses and will + * attacks based on conflation of hostnames and addresses and will * fall back to returning an address on error. */ -- 2.20.1