summaryrefslogtreecommitdiffstats
path: root/sshd.c
diff options
context:
space:
mode:
authorBen Lindstrom <mouring@eviladmin.org>2002-06-06 21:51:58 +0200
committerBen Lindstrom <mouring@eviladmin.org>2002-06-06 21:51:58 +0200
commitf666fec2d553955c26c999cb687877454eeca3ee (patch)
treeb14e2b2dcf90126525cdf77fb70dce4e84dd678f /sshd.c
parent - deraadt@cvs.openbsd.org 2002/05/19 20:54:52 (diff)
downloadopenssh-f666fec2d553955c26c999cb687877454eeca3ee.tar.xz
openssh-f666fec2d553955c26c999cb687877454eeca3ee.zip
- deraadt@cvs.openbsd.org 2002/05/22 23:18:25
[ssh.c sshd.c] spelling; abishoff@arc.nasa.gov
Diffstat (limited to '')
-rw-r--r--sshd.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/sshd.c b/sshd.c
index afb872665..437e0f970 100644
--- a/sshd.c
+++ b/sshd.c
@@ -42,7 +42,7 @@
*/
#include "includes.h"
-RCSID("$OpenBSD: sshd.c,v 1.242 2002/05/15 15:47:49 mouring Exp $");
+RCSID("$OpenBSD: sshd.c,v 1.243 2002/05/22 23:18:25 deraadt Exp $");
#include <openssl/dh.h>
#include <openssl/bn.h>
@@ -378,7 +378,7 @@ sshd_exchange_identification(int sock_in, int sock_out)
fatal_cleanup();
}
- /* Read other side's version identification. */
+ /* Read other sides version identification. */
memset(buf, 0, sizeof(buf));
for (i = 0; i < sizeof(buf) - 1; i++) {
if (atomicio(read, sock_in, &buf[i], 1) != 1) {
@@ -1417,7 +1417,7 @@ main(int ac, char **av)
sshd_exchange_identification(sock_in, sock_out);
/*
* Check that the connection comes from a privileged port.
- * Rhosts-Authentication only makes sense from priviledged
+ * Rhosts-Authentication only makes sense from privileged
* programs. Of course, if the intruder has root access on his local
* machine, he can connect from any port. So do not use these
* authentication methods from machines that you do not trust.
@@ -1727,7 +1727,7 @@ do_ssh1_kex(void)
debug("Received session key; encryption turned on.");
- /* Send an acknowledgement packet. Note that this packet is sent encrypted. */
+ /* Send an acknowledgment packet. Note that this packet is sent encrypted. */
packet_start(SSH_SMSG_SUCCESS);
packet_send();
packet_write_wait();