From 24dbf57f478147474fead3a4683be67a72612e42 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:18:49 -0400 Subject: [PATCH 01/70] spelling: additionally --- ssh_api.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/ssh_api.h b/ssh_api.h index 642acd5b2eb..403de1bff9e 100644 --- a/ssh_api.h +++ b/ssh_api.h @@ -81,7 +81,7 @@ int ssh_set_verify_host_key_callback(struct ssh *ssh, * ssh_packet_next() sets typep if there is no new packet available. * in this case the caller must fill the input byte-stream by passing * the data received over network to ssh_input_append(). - * additinally, the caller needs to send the resulting output + * additionally, the caller needs to send the resulting output * byte-stream back over the network. otherwise the key exchange * would not proceed. the output byte-stream is accessed through * ssh_output_ptr(). From 8ec3a2f451df77424483891f8367673c8af90334 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:19:00 -0400 Subject: [PATCH 02/70] spelling: allowable --- umac.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/umac.c b/umac.c index 9f2187c9af9..23cce9ce5eb 100644 --- a/umac.c +++ b/umac.c @@ -53,7 +53,7 @@ /* ---------------------------------------------------------------------- */ #ifndef UMAC_OUTPUT_LEN -#define UMAC_OUTPUT_LEN 8 /* Alowable: 4, 8, 12, 16 */ +#define UMAC_OUTPUT_LEN 8 /* Allowable: 4, 8, 12, 16 */ #endif #if UMAC_OUTPUT_LEN != 4 && UMAC_OUTPUT_LEN != 8 && \ From ff6833f4ddbf90f167ad1c33e9d864886dd28fe8 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:19:37 -0400 Subject: [PATCH 03/70] spelling: ambiguous --- sftp.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/sftp.c b/sftp.c index 67110f738f7..290fc7d67f9 100644 --- a/sftp.c +++ b/sftp.c @@ -1838,7 +1838,7 @@ complete_cmd_parse(EditLine *el, char *cmd, int lastarg, char quote, return 0; } - /* Complete ambigious command */ + /* Complete ambiguous command */ tmp = complete_ambiguous(cmd, list, count); if (count > 1) complete_display(list, 0); From 7763f34ddcddbea7f88c55478b0fb450321a3746 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:20:21 -0400 Subject: [PATCH 04/70] spelling: ancillary --- auth.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/auth.h b/auth.h index cbbc9623f5c..63a75defc62 100644 --- a/auth.h +++ b/auth.h @@ -87,7 +87,7 @@ struct Authctxt { struct sshkey **prev_keys; u_int nprev_keys; - /* Last used key and ancilliary information from active auth method */ + /* Last used key and ancillary information from active auth method */ struct sshkey *auth_method_key; char *auth_method_info; From ebc8eb5e5b15ce055d9246b90b8c1e53ae803d8b Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:20:32 -0400 Subject: [PATCH 05/70] spelling: argument --- configure.ac | 2 +- ssh.c | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/configure.ac b/configure.ac index 49c5caa26d9..5c34e515694 100644 --- a/configure.ac +++ b/configure.ac @@ -448,7 +448,7 @@ case "$host" in # Some versions of VAC won't allow macro redefinitions at # -qlanglevel=ansi, and autoconf 2.60 sometimes insists on using that # particularly with older versions of vac or xlc. - # It also throws errors about null macro argments, but these are + # It also throws errors about null macro arguments, but these are # not fatal. AC_MSG_CHECKING([if compiler allows macro redefinitions]) AC_COMPILE_IFELSE( diff --git a/ssh.c b/ssh.c index 6137fd7daf3..5ebd59e5f48 100644 --- a/ssh.c +++ b/ssh.c @@ -1091,7 +1091,7 @@ main(int ac, char **av) /* Optional additional jump hosts ",..." */ options.jump_extra == NULL ? "" : " -J ", options.jump_extra == NULL ? "" : options.jump_extra, - /* Optional "-F" argumment if -F specified */ + /* Optional "-F" argument if -F specified */ config == NULL ? "" : " -F ", config == NULL ? "" : config, /* Optional "-v" arguments if -v set */ From f0bd996a784800e6456be416e3ac5c4f727787f8 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:21:48 -0400 Subject: [PATCH 06/70] spelling: authenticated --- umac.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/umac.c b/umac.c index 23cce9ce5eb..065d7bca0ca 100644 --- a/umac.c +++ b/umac.c @@ -65,7 +65,7 @@ /* #define AES_IMPLEMENTAION 1 1 = OpenSSL, 2 = Barreto, 3 = Gladman */ /* #define SSE2 0 Is SSE2 is available? */ /* #define RUN_TESTS 0 Run basic correctness/speed tests */ -/* #define UMAC_AE_SUPPORT 0 Enable auhthenticated encrytion */ +/* #define UMAC_AE_SUPPORT 0 Enable authenticated encrytion */ /* ---------------------------------------------------------------------- */ /* -- Global Includes --------------------------------------------------- */ From 5e67794d3e0f43dc54c2ee03ec28b56e188ab9e5 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:22:09 -0400 Subject: [PATCH 07/70] spelling: authenticating --- umac.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/umac.h b/umac.h index 7fb770f8a52..45deea5e9e2 100644 --- a/umac.h +++ b/umac.h @@ -59,7 +59,7 @@ struct umac_ctx *umac_new(const u_char key[]); #if 0 int umac_reset(struct umac_ctx *ctx); -/* Reset a umac_ctx to begin authenicating a new message */ +/* Reset a umac_ctx to begin authenticating a new message */ #endif int umac_update(struct umac_ctx *ctx, const u_char *input, long len); From 3bbd90396a3705266fc4296fac62aa8aaf2ce174 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:22:00 -0400 Subject: [PATCH 08/70] spelling: authentication --- openbsd-compat/port-aix.c | 2 +- pkcs11.h | 2 +- sshd.c | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/openbsd-compat/port-aix.c b/openbsd-compat/port-aix.c index c2970c4db8c..f10f5dffb26 100644 --- a/openbsd-compat/port-aix.c +++ b/openbsd-compat/port-aix.c @@ -117,7 +117,7 @@ aix_remove_embedded_newlines(char *p) * * Since authenticate() doesn't check AUTH1, and sshd can't sanely support * AUTH1 itself, in such a case authenticate() will allow access without - * authentation, which is almost certainly not what the admin intends. + * authentication, which is almost certainly not what the admin intends. * * (The native tools, eg login, will process the AUTH1 list in addition to * the SYSTEM list by using ckuserID(), however ckuserID() and AUTH1 methods diff --git a/pkcs11.h b/pkcs11.h index b01d58f9483..c3d3756511d 100644 --- a/pkcs11.h +++ b/pkcs11.h @@ -774,7 +774,7 @@ _CK_DECLARE_FUNCTION (C_SetOperationState, unsigned char *operation_state, unsigned long operation_state_len, ck_object_handle_t encryption_key, - ck_object_handle_t authentiation_key)); + ck_object_handle_t authentication_key)); _CK_DECLARE_FUNCTION (C_Login, (ck_session_handle_t session, ck_user_type_t user_type, unsigned char *pin, unsigned long pin_len)); diff --git a/sshd.c b/sshd.c index 1d19ce679cc..37b7bbb20fc 100644 --- a/sshd.c +++ b/sshd.c @@ -1311,7 +1311,7 @@ server_accept_loop(int *sock_in, int *sock_out, int *newsock, int *config_s) * return an error if any are found). Basically we are worried about * source routing; it can be used to pretend you are somebody * (ip-address) you are not. That itself may be "almost acceptable" - * under certain circumstances, but rhosts autentication is useless + * under certain circumstances, but rhosts authentication is useless * if source routing is accepted. Notice also that if we just dropped * source routing here, the other side could use IP spoofing to do * rest of the interaction and could still bypass security. So we From 091fb1fb2997d976a915ca2aa302f539e83a0677 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:23:45 -0400 Subject: [PATCH 09/70] spelling: bookkeeping --- umac.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/umac.c b/umac.c index 065d7bca0ca..e4f0983c4fc 100644 --- a/umac.c +++ b/umac.c @@ -319,7 +319,7 @@ static void pdf_gen_xor(pdf_ctx *pc, const UINT8 nonce[8], UINT8 buf[8]) typedef struct { UINT8 nh_key [L1_KEY_LEN + L1_KEY_SHIFT * (STREAMS - 1)]; /* NH Key */ UINT8 data [HASH_BUF_BYTES]; /* Incoming data buffer */ - int next_data_empty; /* Bookeeping variable for data buffer. */ + int next_data_empty; /* Bookkeeping variable for data buffer. */ int bytes_hashed; /* Bytes (out of L1_KEY_LEN) incorperated. */ UINT64 state[STREAMS]; /* on-line state */ } nh_ctx; From ccb314fd6a4c567c69a398c9a23740e12dbb101b Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:24:07 -0400 Subject: [PATCH 10/70] spelling: brain damage --- openbsd-compat/getopt_long.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/openbsd-compat/getopt_long.c b/openbsd-compat/getopt_long.c index e2894743057..ad1fa8e4949 100644 --- a/openbsd-compat/getopt_long.c +++ b/openbsd-compat/getopt_long.c @@ -303,7 +303,7 @@ getopt_internal(int nargc, char * const *nargv, const char *options, /* * XXX Some GNU programs (like cvs) set optind to 0 instead of - * XXX using optreset. Work around this braindamage. + * XXX using optreset. Work around this brain damage. */ if (optind == 0) optind = optreset = 1; From 930fbf99853d83f2930977c68470a43fc680e223 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:24:29 -0400 Subject: [PATCH 11/70] spelling: certain --- configure.ac | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/configure.ac b/configure.ac index 5c34e515694..d0eab3bd992 100644 --- a/configure.ac +++ b/configure.ac @@ -3756,7 +3756,7 @@ fi AC_CHECK_TYPES([struct timespec]) -# We need int64_t or else certian parts of the compile will fail. +# We need int64_t or else certain parts of the compile will fail. if test "x$ac_cv_have_int64_t" = "xno" && \ test "x$ac_cv_sizeof_long_int" != "x8" && \ test "x$ac_cv_sizeof_long_long_int" = "x0" ; then From d6f6b4ca2f6db9fba61dcf9decfa22db2c95473c Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:24:22 -0400 Subject: [PATCH 12/70] spelling: certificate --- authfile.c | 2 +- regress/krl.sh | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/authfile.c b/authfile.c index d09b700d21d..ab0a9df4adf 100644 --- a/authfile.c +++ b/authfile.c @@ -432,7 +432,7 @@ sshkey_load_private_cert(int type, const char *filename, const char *passphrase, * Returns success if the specified "key" is listed in the file "filename", * SSH_ERR_KEY_NOT_FOUND: if the key is not listed or another error. * If "strict_type" is set then the key type must match exactly, - * otherwise a comparison that ignores certficiate data is performed. + * otherwise a comparison that ignores certificate data is performed. * If "check_ca" is set and "key" is a certificate, then its CA key is * also checked and sshkey_in_file() will return success if either is found. */ diff --git a/regress/krl.sh b/regress/krl.sh index 1077358ff9f..f90089d1af0 100644 --- a/regress/krl.sh +++ b/regress/krl.sh @@ -44,7 +44,7 @@ serial: 10000-20000 serial: 30000-40000 EOF -# A specification that revokes some certificated by key ID. +# A specification that revokes some certificate by key ID. touch $OBJ/revoked-keyid for n in 1 2 3 4 10 15 30 50 `jot 500 300` 999 1000 1001 1002; do test "x$n" = "x499" && continue From 873e5a500702cfed82aa89f11797adbda86d00a8 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:25:38 -0400 Subject: [PATCH 13/70] spelling: chosen --- README.platform | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.platform b/README.platform index c7be95fb6c5..9210e07c8c6 100644 --- a/README.platform +++ b/README.platform @@ -80,7 +80,7 @@ added to /etc/security/audit_event: 32800:AUE_openssh:OpenSSH login:lo The BSM audit event range available for third party TCB applications is -32768 - 65535. Event number 32800 has been choosen for AUE_openssh. +32768 - 65535. Event number 32800 has been chosen for AUE_openssh. There is no official registry of 3rd party event numbers, so if this number is already in use on your system, you may change it at build time by configure'ing --with-cflags=-DAUE_openssh=32801 then rebuilding. From 99f1afb445fc5883df360ca3f30d4621eec1ea2d Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:25:54 -0400 Subject: [PATCH 14/70] spelling: ciphers --- configure.ac | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/configure.ac b/configure.ac index d0eab3bd992..1862fddda38 100644 --- a/configure.ac +++ b/configure.ac @@ -2674,7 +2674,7 @@ if test "x$openssl" = "xyes" ; then ], [ AC_MSG_RESULT([no]) - unsupported_algorithms="$unsupported_cipers \ + unsupported_algorithms="$unsupported_ciphers \ aes128-gcm@openssh.com \ aes256-gcm@openssh.com" ] From e603e52453c68194dec25ef0c6f081b6aabab039 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:26:08 -0400 Subject: [PATCH 15/70] spelling: compatible --- Makefile.in | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Makefile.in b/Makefile.in index ac3907b1e4b..7fc22787d8c 100644 --- a/Makefile.in +++ b/Makefile.in @@ -1,6 +1,6 @@ # $Id: Makefile.in,v 1.365 2014/08/30 06:23:07 djm Exp $ -# uncomment if you run a non bourne compatable shell. Ie. csh +# uncomment if you run a non bourne compatible shell. Ie. csh #SHELL = @SH@ AUTORECONF=autoreconf From eeff8cdee63fb3f407c6ebaf1f10080ff530c7e0 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:26:18 -0400 Subject: [PATCH 16/70] spelling: compliant --- openbsd-compat/bsd-nextstep.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/openbsd-compat/bsd-nextstep.h b/openbsd-compat/bsd-nextstep.h index 610f9e381f3..4a45b15af0e 100644 --- a/openbsd-compat/bsd-nextstep.h +++ b/openbsd-compat/bsd-nextstep.h @@ -36,7 +36,7 @@ /* NeXT's readdir() is BSD (struct direct) not POSIX (struct dirent) */ #define dirent direct -/* Swap out NeXT's BSD wait() for a more POSIX complient one */ +/* Swap out NeXT's BSD wait() for a more POSIX compliant one */ pid_t posix_wait(int *); #define wait(a) posix_wait(a) From 8b04e231f06b2c617e327520dfc4dcb4cd91999b Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:26:33 -0400 Subject: [PATCH 17/70] spelling: compression --- packet.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/packet.c b/packet.c index ff69b660176..453125bdfef 100644 --- a/packet.c +++ b/packet.c @@ -585,7 +585,7 @@ ssh_packet_close_internal(struct ssh *ssh, int do_close) state->newkeys[mode] = NULL; ssh_clear_newkeys(ssh, mode); /* next keys */ } - /* comression state is in shared mem, so we can only release it once */ + /* compression state is in shared mem, so we can only release it once */ if (do_close && state->compression_buffer) { sshbuf_free(state->compression_buffer); if (state->compression_out_started) { From ffdb5f292c42cceca9422c95ffe19b22f9d0c93e Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:26:45 -0400 Subject: [PATCH 18/70] spelling: constitute --- PROTOCOL.chacha20poly1305 | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/PROTOCOL.chacha20poly1305 b/PROTOCOL.chacha20poly1305 index 4857d38533d..ad2440d7953 100644 --- a/PROTOCOL.chacha20poly1305 +++ b/PROTOCOL.chacha20poly1305 @@ -34,7 +34,7 @@ Detailed Construction The chacha20-poly1305@openssh.com cipher requires 512 bits of key material as output from the SSH key exchange. This forms two 256 bit keys (K_1 and K_2), used by two separate instances of chacha20. -The first 256 bits consitute K_2 and the second 256 bits become +The first 256 bits constitute K_2 and the second 256 bits become K_1. The instance keyed by K_1 is a stream cipher that is used only From 7452f1568650fc1a23074d9cc050fac8b9c659ef Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:26:56 -0400 Subject: [PATCH 19/70] spelling: constructed --- monitor_wrap.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/monitor_wrap.c b/monitor_wrap.c index 25f3e9678b7..900db7d70d9 100644 --- a/monitor_wrap.c +++ b/monitor_wrap.c @@ -103,7 +103,7 @@ mm_log_handler(LogLevel level, const char *msg, void *ctx) buffer_init(&log_msg); /* * Placeholder for packet length. Will be filled in with the actual - * packet length once the packet has been constucted. This saves + * packet length once the packet has been constructed. This saves * fragile math. */ buffer_put_int(&log_msg, 0); From d3681e4ccae42aa2ad6166fbf1ae1ecb03de93a4 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:27:03 -0400 Subject: [PATCH 20/70] spelling: critical --- PROTOCOL.certkeys | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/PROTOCOL.certkeys b/PROTOCOL.certkeys index 42aa8c2a173..3fdcf4dd577 100644 --- a/PROTOCOL.certkeys +++ b/PROTOCOL.certkeys @@ -174,7 +174,7 @@ certificate. Each represents a time in seconds since 1970-01-01 valid after <= current time < valid before -criticial options is a set of zero or more key options encoded as +critical options is a set of zero or more key options encoded as below. All such options are "critical" in the sense that an implementation must refuse to authorise a key that has an unrecognised option. From 2084ce77bbd9347e6c80139296f08823d3c542b2 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:27:10 -0400 Subject: [PATCH 21/70] spelling: currently --- channels.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/channels.c b/channels.c index 028d5db200c..9a222a3cc9c 100644 --- a/channels.c +++ b/channels.c @@ -2224,7 +2224,7 @@ channel_output_poll(void) * channel. E.g. client_request_forwarded_tcpip() needs to figure * out whether the request is addressed to the local client or a * specific downstream client based on the listen-address/port. - * 6) Agent and X11-Forwarding have a similar problem and are currenly + * 6) Agent and X11-Forwarding have a similar problem and are currently * not supported as the matching session/channel cannot be identified * easily. */ From 328122ea414bc12d695e9988d165140b4c3a199e Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:27:24 -0400 Subject: [PATCH 22/70] spelling: dependent --- sshd.8 | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/sshd.8 b/sshd.8 index a4201146bc2..0d39824c185 100644 --- a/sshd.8 +++ b/sshd.8 @@ -276,7 +276,7 @@ locked, listed in .Cm DenyUsers or its group is listed in .Cm DenyGroups -\&. The definition of a locked account is system dependant. Some platforms +\&. The definition of a locked account is system dependent. Some platforms have their own account database (eg AIX) and some modify the passwd field ( .Ql \&*LK\&* on Solaris and UnixWare, From 3420ac1a376f86c4de1554c4a15ab8494f064f06 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:27:34 -0400 Subject: [PATCH 23/70] spelling: deprecated --- sshbuf.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/sshbuf.h b/sshbuf.h index 1ac4b8c0ac1..48a6488ea3e 100644 --- a/sshbuf.h +++ b/sshbuf.h @@ -53,7 +53,7 @@ struct sshbuf { #ifndef SSHBUF_NO_DEPREACTED /* * NB. Please do not use sshbuf_init() in new code. Please use sshbuf_new() - * instead. sshbuf_init() is deprectated and will go away soon (it is + * instead. sshbuf_init() is deprecated and will go away soon (it is * only included to allow compat with buffer_* in OpenSSH) */ void sshbuf_init(struct sshbuf *buf); From 53ea8fa83d2b9654c7323c9e3684bd2ad5f7e070 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:27:50 -0400 Subject: [PATCH 24/70] spelling: diagnostic --- sftp.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/sftp.c b/sftp.c index 290fc7d67f9..fb01d593e1e 100644 --- a/sftp.c +++ b/sftp.c @@ -83,7 +83,7 @@ int batchmode = 0; /* PID of ssh transport process */ static pid_t sshpid = -1; -/* Suppress diagnositic messages */ +/* Suppress diagnostic messages */ int quiet = 0; /* This is set to 0 if the progressmeter is not desired. */ From e4d045d5fb7a65cdbef3bc3338194641d6ac7743 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:27:57 -0400 Subject: [PATCH 25/70] spelling: disappeared --- openbsd-compat/port-uw.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/openbsd-compat/port-uw.c b/openbsd-compat/port-uw.c index db24dbb9441..2d2c46d5881 100644 --- a/openbsd-compat/port-uw.c +++ b/openbsd-compat/port-uw.c @@ -97,7 +97,7 @@ nischeck(char *namep) if ((fd = fopen (password_file, "r")) == NULL) { /* - * If the passwd file has dissapeared we are in a bad state. + * If the passwd file has disappeared we are in a bad state. * However, returning 0 will send us back through the * authentication scheme that has checked the ia database for * passwords earlier. From 2214decab8d616a266f1d6b5739b19f946de42b9 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:28:05 -0400 Subject: [PATCH 26/70] spelling: doesn't --- openbsd-compat/fmt_scaled.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/openbsd-compat/fmt_scaled.c b/openbsd-compat/fmt_scaled.c index 7c5193e26d9..f68f2412300 100644 --- a/openbsd-compat/fmt_scaled.c +++ b/openbsd-compat/fmt_scaled.c @@ -188,7 +188,7 @@ scan_scaled(char *scaled, long long *result) /* scale whole part */ whole *= scale_fact; - /* truncate fpart so it does't overflow. + /* truncate fpart so it doesn't overflow. * then scale fractional part. */ while (fpart >= LLONG_MAX / scale_fact) { From b5487d92144631e653e799bfd5fe0b0b18639d82 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:28:32 -0400 Subject: [PATCH 27/70] spelling: encryption --- PROTOCOL.chacha20poly1305 | 2 +- umac.c | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/PROTOCOL.chacha20poly1305 b/PROTOCOL.chacha20poly1305 index ad2440d7953..b18dc8a35f4 100644 --- a/PROTOCOL.chacha20poly1305 +++ b/PROTOCOL.chacha20poly1305 @@ -16,7 +16,7 @@ that computes a 128 bit integrity tag given a message and a single-use The chacha20-poly1305@openssh.com combines these two primitives into an authenticated encryption mode. The construction used is based on that proposed for TLS by Adam Langley in [3], but differs in the layout of -data passed to the MAC and in the addition of encyption of the packet +data passed to the MAC and in the addition of encryption of the packet lengths. Negotiation diff --git a/umac.c b/umac.c index e4f0983c4fc..b9f14ff74b4 100644 --- a/umac.c +++ b/umac.c @@ -65,7 +65,7 @@ /* #define AES_IMPLEMENTAION 1 1 = OpenSSL, 2 = Barreto, 3 = Gladman */ /* #define SSE2 0 Is SSE2 is available? */ /* #define RUN_TESTS 0 Run basic correctness/speed tests */ -/* #define UMAC_AE_SUPPORT 0 Enable authenticated encrytion */ +/* #define UMAC_AE_SUPPORT 0 Enable authenticated encryption */ /* ---------------------------------------------------------------------- */ /* -- Global Includes --------------------------------------------------- */ From b521a35aa0fd97d25fe5caf3422994cb1e9bd476 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:28:44 -0400 Subject: [PATCH 28/70] spelling: entire --- auth2-pubkey.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/auth2-pubkey.c b/auth2-pubkey.c index 1c59b5bb02b..c6b148e51e2 100644 --- a/auth2-pubkey.c +++ b/auth2-pubkey.c @@ -757,7 +757,7 @@ check_authkeys_file(FILE *f, char *file, struct sshkey *key, struct passwd *pw) char *cp, *key_options = NULL, *fp = NULL; const char *reason = NULL; - /* Always consume entrire file */ + /* Always consume entire file */ if (found_key) continue; if (found != NULL) From 2ec48fe99c6193584ea3069e707ae575142e521b Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:28:59 -0400 Subject: [PATCH 29/70] spelling: environment --- auth-pam.c | 4 ++-- regress/cert-file.sh | 2 +- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/auth-pam.c b/auth-pam.c index de29c04c9c8..a427fac48a2 100644 --- a/auth-pam.c +++ b/auth-pam.c @@ -251,7 +251,7 @@ static char ** pam_getenvlist(pam_handle_t *pamh) { /* - * XXX - If necessary, we can still support envrionment passing + * XXX - If necessary, we can still support environment passing * for platforms without pam_getenvlist by searching for known * env vars (e.g. KRB5CCNAME) from the PAM environment. */ @@ -933,7 +933,7 @@ expose_authinfo(const char *caller) /* * Expose authentication information to PAM. - * The enviornment variable is versioned. Please increment the + * The environment variable is versioned. Please increment the * version suffix if the format of session_info changes. */ if (sshpam_authctxt->session_info == NULL) diff --git a/regress/cert-file.sh b/regress/cert-file.sh index 8fd62c7730d..64ebdb4c78a 100644 --- a/regress/cert-file.sh +++ b/regress/cert-file.sh @@ -52,7 +52,7 @@ echo "cert-authority $(cat $OBJ/user_ca_key1.pub)" > $OBJ/authorized_keys_$USER cat $OBJ/ssh_proxy | grep -v IdentityFile > $OBJ/no_identity_config # XXX: verify that certificate used was what we expect. Needs exposure of -# keys via enviornment variable or similar. +# keys via environment variable or similar. # Key with no .pub should work - finding the equivalent *-cert.pub. verbose "identity cert with no plain public file" From 6eec7005a09776a8e060407019d6d4bc24aad443 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:29:13 -0400 Subject: [PATCH 30/70] spelling: equivalent --- openbsd-compat/sha2.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/openbsd-compat/sha2.c b/openbsd-compat/sha2.c index a22099bbe97..b55ea30ac74 100644 --- a/openbsd-compat/sha2.c +++ b/openbsd-compat/sha2.c @@ -72,7 +72,7 @@ * Please make sure that your system defines BYTE_ORDER. If your * architecture is little-endian, make sure it also defines * LITTLE_ENDIAN and that the two (BYTE_ORDER and LITTLE_ENDIAN) are - * equivilent. + * equivalent. * * If your system does not define the above, then you can do so by * hand like this: From 8da0b8a3fc3b35524a446728ee4b37a791207633 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:29:25 -0400 Subject: [PATCH 31/70] spelling: example --- regress/addrmatch.sh | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/regress/addrmatch.sh b/regress/addrmatch.sh index 1584bd4053d..7860ceba0ce 100644 --- a/regress/addrmatch.sh +++ b/regress/addrmatch.sh @@ -43,7 +43,7 @@ run_trial user 19.0.0.1 somehost 1.2.3.4 5678 match4 "localport" if test "$TEST_SSH_IPV6" != "no"; then run_trial user ::1 somehost.example.com ::2 1234 match2 "bare IP6 address" -run_trial user ::2 somehost.exaple.com ::2 1234 nomatch "deny IPv6" +run_trial user ::2 somehost.example.com ::2 1234 nomatch "deny IPv6" run_trial user ::3 somehost ::2 1234 nomatch "IP6 negated" run_trial user ::4 somehost ::2 1234 nomatch "IP6 no match" run_trial user 2000::1 somehost ::2 1234 match2 "IP6 network" From 0843fd1ca66b93fd42a654fe6fce4a7a0f7ae664 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:29:33 -0400 Subject: [PATCH 32/70] spelling: existence --- contrib/cygwin/ssh-host-config | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/contrib/cygwin/ssh-host-config b/contrib/cygwin/ssh-host-config index db6aaa08a03..261020af33e 100644 --- a/contrib/cygwin/ssh-host-config +++ b/contrib/cygwin/ssh-host-config @@ -22,7 +22,7 @@ CSIH_SCRIPT=/usr/share/csih/cygwin-service-installation-helper.sh -# List of apps used. This is checkad for existance in csih_sanity_check +# List of apps used. This is checkad for existence in csih_sanity_check # Don't use *any* transient commands before sourcing the csih helper script, # otherwise the sanity checks are short-circuited. declare -a csih_required_commands=( From 27124d67d381891a9fb307a6c2572dea33481860 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:29:57 -0400 Subject: [PATCH 33/70] spelling: explicit --- openbsd-compat/bsd-cygwin_util.h | 2 +- servconf.c | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/openbsd-compat/bsd-cygwin_util.h b/openbsd-compat/bsd-cygwin_util.h index 9cef694b9a7..202c055dbae 100644 --- a/openbsd-compat/bsd-cygwin_util.h +++ b/openbsd-compat/bsd-cygwin_util.h @@ -41,7 +41,7 @@ typedef void *HANDLE; #define UNLEN 256 /* Cygwin functions for which declarations are only available when including - windows headers, so we have to define them here explicitely. */ + windows headers, so we have to define them here explicitly. */ extern HANDLE cygwin_logon_user (const struct passwd *, const char *); extern void cygwin_set_impersonation_token (const HANDLE); diff --git a/servconf.c b/servconf.c index ed1fc71cff6..6b7b98bbbb4 100644 --- a/servconf.c +++ b/servconf.c @@ -1958,7 +1958,7 @@ int server_match_spec_complete(struct connection_info *ci) * * If the preauth flag is set, we do not bother copying the string or * array values that are not used pre-authentication, because any that we - * do use must be explictly sent in mm_getpwnamallow(). + * do use must be explicitly sent in mm_getpwnamallow(). */ void copy_set_server_options(ServerOptions *dst, ServerOptions *src, int preauth) From 6c5aae69c59de18a01403319ee2cdaad4c7f0fcb Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:30:09 -0400 Subject: [PATCH 34/70] spelling: incorporated --- umac.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/umac.c b/umac.c index b9f14ff74b4..11f28e01e11 100644 --- a/umac.c +++ b/umac.c @@ -320,7 +320,7 @@ typedef struct { UINT8 nh_key [L1_KEY_LEN + L1_KEY_SHIFT * (STREAMS - 1)]; /* NH Key */ UINT8 data [HASH_BUF_BYTES]; /* Incoming data buffer */ int next_data_empty; /* Bookkeeping variable for data buffer. */ - int bytes_hashed; /* Bytes (out of L1_KEY_LEN) incorperated. */ + int bytes_hashed; /* Bytes (out of L1_KEY_LEN) incorporated. */ UINT64 state[STREAMS]; /* on-line state */ } nh_ctx; From 038774237a977a4d0ae8601afda72c22e8da02d7 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:30:19 -0400 Subject: [PATCH 35/70] spelling: justify --- openbsd-compat/bsd-snprintf.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/openbsd-compat/bsd-snprintf.c b/openbsd-compat/bsd-snprintf.c index d95b6a40158..2e7845eaeff 100644 --- a/openbsd-compat/bsd-snprintf.c +++ b/openbsd-compat/bsd-snprintf.c @@ -588,7 +588,7 @@ fmtint(char *buffer, size_t *currlen, size_t maxlen, spadlen = 0; } if (flags & DP_F_MINUS) - spadlen = -spadlen; /* Left Justifty */ + spadlen = -spadlen; /* Left Justify */ #ifdef DEBUG_SNPRINTF printf("zpad: %d, spad: %d, min: %d, max: %d, place: %d\n", @@ -802,7 +802,7 @@ fmtfp (char *buffer, size_t *currlen, size_t maxlen, if (padlen < 0) padlen = 0; if (flags & DP_F_MINUS) - padlen = -padlen; /* Left Justifty */ + padlen = -padlen; /* Left Justify */ if ((flags & DP_F_ZERO) && (padlen > 0)) { if (signvalue) { From d8eaef247c7bc7fbf136c5654a98ca93039b2ac0 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:30:26 -0400 Subject: [PATCH 36/70] spelling: library --- ssh-pkcs11.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/ssh-pkcs11.c b/ssh-pkcs11.c index b37491c5d68..bcc1a1e3291 100644 --- a/ssh-pkcs11.c +++ b/ssh-pkcs11.c @@ -83,7 +83,7 @@ pkcs11_init(int interactive) } /* - * finalize a provider shared libarary, it's no longer usable. + * finalize a provider shared library, it's no longer usable. * however, there might still be keys referencing this provider, * so the actuall freeing of memory is handled by pkcs11_provider_unref(). * this is called when a provider gets unregistered. @@ -582,7 +582,7 @@ pkcs11_add_provider(char *provider_id, char *pin, struct sshkey ***keyp) __func__, provider_id); goto fail; } - /* open shared pkcs11-libarary */ + /* open shared pkcs11-library */ if ((handle = dlopen(provider_id, RTLD_NOW)) == NULL) { error("dlopen %s failed: %s", provider_id, dlerror()); goto fail; From cc0dbba987a598292f95030ea55ee86061b5f117 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:30:55 -0400 Subject: [PATCH 37/70] spelling: linux --- contrib/README | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/contrib/README b/contrib/README index 60e19ba9faa..79e5bb85763 100644 --- a/contrib/README +++ b/contrib/README @@ -54,7 +54,7 @@ aix: Files to build an AIX native (installp or SMIT installable) package. caldera: - RPM spec file and scripts for building Caldera OpenLinuix packages + RPM spec file and scripts for building Caldera OpenLinux packages cygwin: Support files for Cygwin From c2cfdcc68f4ea01f292c5f616be52816b7c12d45 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:31:11 -0400 Subject: [PATCH 38/70] spelling: management --- configure.ac | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/configure.ac b/configure.ac index 1862fddda38..577e407d2a9 100644 --- a/configure.ac +++ b/configure.ac @@ -685,7 +685,7 @@ main() { if (NSVersionOfRunTimeLibrary("System") >= (60 << 16)) PATH="$PATH:/usr/etc" AC_DEFINE([WITH_IRIX_ARRAY], [1], [Define if you have/want arrays - (cluster-wide session managment, not C arrays)]) + (cluster-wide session management, not C arrays)]) AC_DEFINE([WITH_IRIX_PROJECT], [1], [Define if you want IRIX project management]) AC_DEFINE([WITH_IRIX_AUDIT], [1], From 6c6dc04cd49e0e5052e516492df3445985c2c701 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:31:01 -0400 Subject: [PATCH 39/70] spelling: matching --- hostfile.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hostfile.c b/hostfile.c index 12f174ff97b..63bc7349246 100644 --- a/hostfile.c +++ b/hostfile.c @@ -378,7 +378,7 @@ check_hostkeys_by_key_or_type(struct hostkeys *hostkeys, *found = hostkeys->entries + i; break; } - /* A non-maching key exists */ + /* A non-matching key exists */ end_return = HOST_CHANGED; if (found != NULL) *found = hostkeys->entries + i; From 5eda89b703f922cfb683a8f8a499a6ec8bb3f4ed Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:31:20 -0400 Subject: [PATCH 40/70] spelling: maximum --- packet.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/packet.c b/packet.c index 453125bdfef..990cb5f277c 100644 --- a/packet.c +++ b/packet.c @@ -953,7 +953,7 @@ ssh_packet_need_rekeying(struct ssh *ssh, u_int outbound_packet_len) state->p_read.packets > MAX_PACKETS) return 1; - /* Rekey after (cipher-specific) maxiumum blocks */ + /* Rekey after (cipher-specific) maximum blocks */ out_blocks = ROUNDUP(outbound_packet_len, state->newkeys[MODE_OUT]->enc.block_size); return (state->max_blocks_out && From 1014fb683aaae4a96c0c106d80428530ae95bd0d Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:31:33 -0400 Subject: [PATCH 41/70] spelling: mekmitasdigoat --- regress/sftp-chroot.sh | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/regress/sftp-chroot.sh b/regress/sftp-chroot.sh index 4ea2fce8570..dc0a8bfadec 100644 --- a/regress/sftp-chroot.sh +++ b/regress/sftp-chroot.sh @@ -17,7 +17,7 @@ if ! $OBJ/check-perm -m chroot "$CHROOT" ; then exit 0 fi -$SUDO sh -c "echo mekmitastdigoat > $PRIVDATA" || \ +$SUDO sh -c "echo mekmitasdigoat > $PRIVDATA" || \ fatal "create $PRIVDATA failed" start_sshd -oChrootDirectory=$CHROOT -oForceCommand="internal-sftp -d /" From f94e59c22dc7862edc5f9d00974df811344c9017 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:31:40 -0400 Subject: [PATCH 42/70] spelling: member --- uidswap.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/uidswap.c b/uidswap.c index 8bf6b244e5c..59431d28db3 100644 --- a/uidswap.c +++ b/uidswap.c @@ -223,7 +223,7 @@ permanently_set_uid(struct passwd *pw) #ifdef __APPLE__ /* * OS X requires initgroups after setgid to opt back into - * memberd support for >16 supplemental groups. + * member support for >16 supplemental groups. */ if (initgroups(pw->pw_name, pw->pw_gid) < 0) fatal("initgroups %.100s %u: %.100s", From 9d86e6a301d79a757a2b6c04f107ef14ae73e7b0 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:32:29 -0400 Subject: [PATCH 43/70] spelling: minimum --- dh.h | 2 +- sshbuf.h | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/dh.h b/dh.h index bcd485cf966..fba93afc5d5 100644 --- a/dh.h +++ b/dh.h @@ -48,7 +48,7 @@ u_int dh_estimate(int); /* * Max value from RFC4419. - * Miniumum increased in light of DH precomputation attacks. + * Minimum increased in light of DH precomputation attacks. */ #define DH_GRP_MIN 2048 #define DH_GRP_MAX 8192 diff --git a/sshbuf.h b/sshbuf.h index 48a6488ea3e..ac031669f7e 100644 --- a/sshbuf.h +++ b/sshbuf.h @@ -325,7 +325,7 @@ u_int sshbuf_refcount(const struct sshbuf *buf); # define SSHBUF_SIZE_INIT 256 /* Initial allocation */ # define SSHBUF_SIZE_INC 256 /* Preferred increment length */ -# define SSHBUF_PACK_MIN 8192 /* Minimim packable offset */ +# define SSHBUF_PACK_MIN 8192 /* Minimum packable offset */ /* # define SSHBUF_ABORT abort */ /* # define SSHBUF_DEBUG */ From 5a3a41955876546cb2ed78d57faeae0bd545f88e Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:32:57 -0400 Subject: [PATCH 44/70] spelling: modified --- openbsd-compat/bcrypt_pbkdf.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/openbsd-compat/bcrypt_pbkdf.c b/openbsd-compat/bcrypt_pbkdf.c index 0a07f9a0f8f..78523456387 100644 --- a/openbsd-compat/bcrypt_pbkdf.c +++ b/openbsd-compat/bcrypt_pbkdf.c @@ -46,7 +46,7 @@ * function with the following modifications: * 1. The input password and salt are preprocessed with SHA512. * 2. The output length is expanded to 256 bits. - * 3. Subsequently the magic string to be encrypted is lengthened and modifed + * 3. Subsequently the magic string to be encrypted is lengthened and modified * to "OxychromaticBlowfishSwatDynamite" * 4. The hash function is defined to perform 64 rounds of initial state * expansion. (More rounds are performed by iterating the hash.) From ea50bf08b5c8641a57d2ee56ab85be715464f670 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:33:04 -0400 Subject: [PATCH 45/70] spelling: multiple --- umac.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/umac.c b/umac.c index 11f28e01e11..9f1fdaf4c1c 100644 --- a/umac.c +++ b/umac.c @@ -289,7 +289,7 @@ static void pdf_gen_xor(pdf_ctx *pc, const UINT8 nonce[8], UINT8 buf[8]) * versions, one expects the entire message being hashed to be passed * in a single buffer and returns the hash result immediately. The second * allows the message to be passed in a sequence of buffers. In the - * muliple-buffer interface, the client calls the routine nh_update() as + * multiple-buffer interface, the client calls the routine nh_update() as * many times as necessary. When there is no more data to be fed to the * hash, the client calls nh_final() which calculates the hash output. * Before beginning another hash calculation the nh_reset() routine From 2692ebe6f0db64a6ff41503093ede87f3b92f8e9 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:33:14 -0400 Subject: [PATCH 46/70] spelling: necessarily --- umac.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/umac.c b/umac.c index 9f1fdaf4c1c..a691463a1d2 100644 --- a/umac.c +++ b/umac.c @@ -851,7 +851,7 @@ static void poly_hash(uhash_ctx_t hc, UINT32 data_in[]) /* The final step in UHASH is an inner-product hash. The poly hash - * produces a result not neccesarily WORD_LEN bytes long. The inner- + * produces a result not necessarily WORD_LEN bytes long. The inner- * product hash breaks the polyhash output into 16-bit chunks and * multiplies each with a 36 bit key. */ From 233a80bea8bbb3c4a2c7db9f3533259d10146559 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:33:24 -0400 Subject: [PATCH 47/70] spelling: optimized --- umac.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/umac.c b/umac.c index a691463a1d2..3ab76248271 100644 --- a/umac.c +++ b/umac.c @@ -1176,7 +1176,7 @@ static int uhash(uhash_ctx_t ahc, u_char *msg, long len, u_char *res) /* The UMAC interface has two interfaces, an all-at-once interface where * the entire message to be authenticated is passed to UMAC in one buffer, * and a sequential interface where the message is presented a little at a - * time. The all-at-once is more optimaized than the sequential version and + * time. The all-at-once is more optimized than the sequential version and * should be preferred when the sequential interface is not required. */ struct umac_ctx { From 1d6b93f2b24acaa8c09884e7f5262f4b5ad2ae3e Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:33:36 -0400 Subject: [PATCH 48/70] spelling: output --- umac.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/umac.h b/umac.h index 45deea5e9e2..739393211d8 100644 --- a/umac.h +++ b/umac.h @@ -107,7 +107,7 @@ int uhash_update(uhash_ctx_t ctx, long len); int uhash_final(uhash_ctx_t ctx, - u_char ouput[]); + u_char output[]); int uhash(uhash_ctx_t ctx, u_char *input, From 24459622e2c7a7f47e33a8db3e46e4ae82f56c0c Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:33:49 -0400 Subject: [PATCH 49/70] spelling: potential --- openbsd-compat/bsd-waitpid.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/openbsd-compat/bsd-waitpid.h b/openbsd-compat/bsd-waitpid.h index 5ce3ee4b530..b551268ab06 100644 --- a/openbsd-compat/bsd-waitpid.h +++ b/openbsd-compat/bsd-waitpid.h @@ -27,7 +27,7 @@ #define _BSD_WAITPID_H #ifndef HAVE_WAITPID -/* Clean out any potental issues */ +/* Clean out any potential issues */ #undef WIFEXITED #undef WIFSTOPPED #undef WIFSIGNALED From b17c09d3ae4d776bd707db4013480eb446cbf7e9 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:34:06 -0400 Subject: [PATCH 50/70] spelling: preceding --- PROTOCOL.krl | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/PROTOCOL.krl b/PROTOCOL.krl index b9695107bac..0ec088240d5 100644 --- a/PROTOCOL.krl +++ b/PROTOCOL.krl @@ -145,7 +145,7 @@ This section may appear multiple times. 5. KRL signature sections The KRL_SECTION_SIGNATURE section serves a different purpose to the -preceeding ones: to provide cryptographic authentication of a KRL that +preceding ones: to provide cryptographic authentication of a KRL that is retrieved over a channel that does not provide integrity protection. Its format is slightly different to the previously-described sections: in order to simplify the signature generation, it includes as a "body" From f97f3278dc66d27b48f91bfb8282ca8d2e8b3ebf Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:34:17 -0400 Subject: [PATCH 51/70] spelling: processed --- channels.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/channels.c b/channels.c index 9a222a3cc9c..637cecb1de3 100644 --- a/channels.c +++ b/channels.c @@ -2213,7 +2213,7 @@ channel_output_poll(void) * SSH_CHANNEL_MUX_PROXY channel and replace the mux clients ID * with the newly allocated channel ID. * 2) Upstream messages are received by matching SSH_CHANNEL_MUX_PROXY - * channels and procesed by channel_proxy_upstream(). The local channel ID + * channels and processed by channel_proxy_upstream(). The local channel ID * is then translated back to the original mux client ID. * 3) In both cases we need to keep track of matching SSH2_MSG_CHANNEL_CLOSE * messages so we can clean up SSH_CHANNEL_MUX_PROXY channels. From 541ebf46f5ef690db7ca42fa2b4a38a5ce177989 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:34:27 -0400 Subject: [PATCH 52/70] spelling: receive --- monitor_wrap.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/monitor_wrap.c b/monitor_wrap.c index 900db7d70d9..fcc0ec345dc 100644 --- a/monitor_wrap.c +++ b/monitor_wrap.c @@ -643,7 +643,7 @@ mm_sshpam_query(void *ctx, char **name, char **info, sshpam_set_maxtries_reached(buffer_get_int(&m)); *num = buffer_get_int(&m); if (*num > PAM_MAX_NUM_MSG) - fatal("%s: recieved %u PAM messages, expected <= %u", + fatal("%s: received %u PAM messages, expected <= %u", __func__, *num, PAM_MAX_NUM_MSG); *prompts = xcalloc((*num + 1), sizeof(char *)); *echo_on = xcalloc((*num + 1), sizeof(u_int)); From b136836bcba082aad8259e759dff32640a47b5f8 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:34:46 -0400 Subject: [PATCH 53/70] spelling: reorganize --- contrib/redhat/openssh.spec | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/contrib/redhat/openssh.spec b/contrib/redhat/openssh.spec index 7de45457a74..189357258c7 100644 --- a/contrib/redhat/openssh.spec +++ b/contrib/redhat/openssh.spec @@ -426,7 +426,7 @@ fi - Add new ssh-keysign program and remove setuid from ssh client * Fri May 10 2002 Damien Miller -- Merge in spec changes from RedHat, reorgansie a little +- Merge in spec changes from RedHat, reorganize a little - Add Privsep user, group and directory * Thu Mar 7 2002 Nalin Dahyabhai 3.1p1-2 From c925941640fe82a1bd45ff03b2f2b458206cd9a2 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:35:03 -0400 Subject: [PATCH 54/70] spelling: requires --- contrib/redhat/openssh.spec | 2 +- monitor.c | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/contrib/redhat/openssh.spec b/contrib/redhat/openssh.spec index 189357258c7..c326a2dfc0a 100644 --- a/contrib/redhat/openssh.spec +++ b/contrib/redhat/openssh.spec @@ -717,7 +717,7 @@ fi * Mon Oct 2 2000 Nalin Dahyabhai - Update x11-askpass to 1.0.2. (#17835) -- Add BuildRequiress for /bin/login and /usr/bin/rsh so that configure will +- Add BuildRequires for /bin/login and /usr/bin/rsh so that configure will always find them in the right place. (#17909) - Set the default path to be the same as the one supplied by /bin/login, but add /usr/X11R6/bin. (#17909) diff --git a/monitor.c b/monitor.c index 8a7897bde18..4e15974e353 100644 --- a/monitor.c +++ b/monitor.c @@ -1630,7 +1630,7 @@ monitor_apply_keystate(struct monitor *pmonitor) } } -/* This function requries careful sanity checking */ +/* This function requires careful sanity checking */ void mm_get_keystate(struct monitor *pmonitor) From 1128219fec4f7c657abc38286742404a3ff1e35b Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:35:48 -0400 Subject: [PATCH 55/70] spelling: rescue --- contrib/redhat/openssh.spec | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/contrib/redhat/openssh.spec b/contrib/redhat/openssh.spec index c326a2dfc0a..dfa240f2ad3 100644 --- a/contrib/redhat/openssh.spec +++ b/contrib/redhat/openssh.spec @@ -59,7 +59,7 @@ %define rescue 0 %{?build_rescue:%define rescue 1} -# Turn off some stuff for resuce builds +# Turn off some stuff for rescue builds %if %{rescue} %define kerberos5 0 %endif From 6056e3206839213e6f77c810c0200793d6df1663 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:34:57 -0400 Subject: [PATCH 56/70] spelling: response --- contrib/redhat/openssh.spec | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/contrib/redhat/openssh.spec b/contrib/redhat/openssh.spec index dfa240f2ad3..1aa68598c48 100644 --- a/contrib/redhat/openssh.spec +++ b/contrib/redhat/openssh.spec @@ -571,7 +571,7 @@ fi races in condrestart * Mon Apr 2 2001 Nalin Dahyabhai -- mention that challengereponse supports PAM, so disabling password doesn't +- mention that challengeresponse supports PAM, so disabling password doesn't limit users to pubkey and rsa auth (#34378) - bypass the daemon() function in the init script and call initlog directly, because daemon() won't start a daemon it detects is already running (like From 21266bc37602fdffebcd07eb81bc2f860f856b42 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:35:27 -0400 Subject: [PATCH 57/70] spelling: responsibility --- umac.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/umac.c b/umac.c index 3ab76248271..191529f7bce 100644 --- a/umac.c +++ b/umac.c @@ -297,7 +297,7 @@ static void pdf_gen_xor(pdf_ctx *pc, const UINT8 nonce[8], UINT8 buf[8]) * the sequence of calls nh_update() and nh_final(); however it is * optimized and should be prefered whenever the multiple-buffer interface * is not necessary. When using either interface, it is the client's - * responsability to pass no more than L1_KEY_LEN bytes per hash result. + * responsibility to pass no more than L1_KEY_LEN bytes per hash result. * * The routine nh_init() initializes the nh_ctx data structure and * must be called once, before any other PDF routine. From f105e959baaf5fe5c0ba8b68af420c8d6af45608 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:35:59 -0400 Subject: [PATCH 58/70] spelling: separate --- TODO | 4 ++-- contrib/suse/openssh.spec | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/TODO b/TODO index f22c7e224b8..771162b3021 100644 --- a/TODO +++ b/TODO @@ -57,10 +57,10 @@ Clean up configure/makefiles: - Replace the whole u_intXX_t evilness in acconfig.h with something better??? - Do it in configure.ac -- Consider splitting the u_intXX_t test for sys/bitype.h into seperate test +- Consider splitting the u_intXX_t test for sys/bitype.h into separate test to allow people to (right/wrongfully) link against Bind directly. -- Consider splitting configure.ac into seperate files which do logically +- Consider splitting configure.ac into separate files which do logically similar tests. E.g move all the type detection stuff into one file, entropy related stuff into another. diff --git a/contrib/suse/openssh.spec b/contrib/suse/openssh.spec index e62be39d0aa..0a33830d1d6 100644 --- a/contrib/suse/openssh.spec +++ b/contrib/suse/openssh.spec @@ -56,7 +56,7 @@ arbitrary TCP/IP ports can also be forwarded over the secure channel. OpenSSH is OpenBSD's rework of the last free version of SSH, bringing it up to date in terms of security and features, as well as removing all -patented algorithms to seperate libraries (OpenSSL). +patented algorithms to separate libraries (OpenSSL). This package includes all files necessary for both the OpenSSH client and server. @@ -70,7 +70,7 @@ arbitrary TCP/IP ports can also be forwarded over the secure channel. OpenSSH is OpenBSD's rework of the last free version of SSH, bringing it up to date in terms of security and features, as well as removing all -patented algorithms to seperate libraries (OpenSSL). +patented algorithms to separate libraries (OpenSSL). This package contains an X Window System passphrase dialog for OpenSSH. From 90a4fbfec3a7fc24d8cd7b7a5fb5d2a3c30bdb91 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:36:06 -0400 Subject: [PATCH 59/70] spelling: should --- regress/cert-file.sh | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/regress/cert-file.sh b/regress/cert-file.sh index 64ebdb4c78a..8de19343433 100644 --- a/regress/cert-file.sh +++ b/regress/cert-file.sh @@ -138,7 +138,7 @@ fi # try ssh with the agent and certificates opts="-F $OBJ/ssh_proxy" -# with no certificates, shoud fail +# with no certificates, should fail ${SSH} $opts somehost exit 52 if [ $? -eq 52 ]; then fail "ssh connect with agent in succeeded with no cert" From 97c2f79345e06c07ac4f32bc797ee146450ce061 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:36:11 -0400 Subject: [PATCH 60/70] spelling: similar --- scp.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/scp.c b/scp.c index a533eb09741..77953645c33 100644 --- a/scp.c +++ b/scp.c @@ -300,7 +300,7 @@ do_cmd(char *host, char *remuser, char *cmd, int *fdin, int *fdout) } /* - * This functions executes a command simlar to do_cmd(), but expects the + * This functions executes a command similar to do_cmd(), but expects the * input and output descriptors to be setup by a previous call to do_cmd(). * This way the input and output of two commands can be connected. */ From 895ff2330d61839af4884dcce647169909d45400 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:36:19 -0400 Subject: [PATCH 61/70] spelling: strange --- configure.ac | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/configure.ac b/configure.ac index 577e407d2a9..7e20679f6ac 100644 --- a/configure.ac +++ b/configure.ac @@ -4330,7 +4330,7 @@ dnl # Otherwise we run a program to get the dir from system headers. dnl # We first look for _PATH_MAILDIR then MAILDIR then _PATH_MAIL dnl # If we find _PATH_MAILDIR we do nothing because that is what dnl # session.c expects anyway. Otherwise we set to the value found -dnl # stripping any trailing slash. If for some strage reason our program +dnl # stripping any trailing slash. If for some strange reason our program dnl # does not find what it needs, we default to /var/spool/mail. # Check for mail directory AC_ARG_WITH([maildir], From 464f014fe9fd8d506c8044ef040734d4b50b7564 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:36:28 -0400 Subject: [PATCH 62/70] spelling: successfus --- openbsd-compat/explicit_bzero.c | 2 +- servconf.c | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/openbsd-compat/explicit_bzero.c b/openbsd-compat/explicit_bzero.c index 53a00347272..6ef9825a9ad 100644 --- a/openbsd-compat/explicit_bzero.c +++ b/openbsd-compat/explicit_bzero.c @@ -41,7 +41,7 @@ explicit_bzero(void *p, size_t n) /* * clang -fsanitize=memory needs to intercept memset-like functions * to correctly detect memory initialisation. Make sure one is called - * directly since our indirection trick above sucessfully confuses it. + * directly since our indirection trick above successfully confuses it. */ #if defined(__has_feature) # if __has_feature(memory_sanitizer) diff --git a/servconf.c b/servconf.c index 6b7b98bbbb4..4629b26761c 100644 --- a/servconf.c +++ b/servconf.c @@ -1774,7 +1774,7 @@ process_server_config_line(ServerOptions *options, char *line, case sAuthenticationMethods: if (options->num_auth_methods == 0) { value = 0; /* seen "any" pseudo-method */ - value2 = 0; /* sucessfully parsed any method */ + value2 = 0; /* successfully parsed any method */ while ((arg = strdelim(&cp)) && *arg != '\0') { if (options->num_auth_methods >= MAX_AUTH_METHODS) From 50338b16492d56f660350c62c5ccf8abe14021cd Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:36:54 -0400 Subject: [PATCH 63/70] spelling: sufficient --- contrib/cygwin/ssh-host-config | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/contrib/cygwin/ssh-host-config b/contrib/cygwin/ssh-host-config index 261020af33e..ab73fd79845 100644 --- a/contrib/cygwin/ssh-host-config +++ b/contrib/cygwin/ssh-host-config @@ -368,7 +368,7 @@ check_service_files_ownership() { then csih_warning "Couldn't change owner of important files to ${run_service_as}!" csih_warning "This may cause the sshd service to fail! Please make sure that" - csih_warning "you have suufficient permissions to change the ownership of files" + csih_warning "you have sufficient permissions to change the ownership of files" csih_warning "and try to run the ssh-host-config script again." fi return $ret From 736157684509797f89625864f0375b3b320cb0fa Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:36:41 -0400 Subject: [PATCH 64/70] spelling: suppress --- clientloop.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/clientloop.c b/clientloop.c index 248c9541fe2..74f913bcb2e 100644 --- a/clientloop.c +++ b/clientloop.c @@ -683,7 +683,7 @@ client_status_confirm(int type, Channel *c, void *ctx) options.request_tty == REQUEST_TTY_YES)) cr->action = CONFIRM_CLOSE; - /* XXX supress on mux _client_ quietmode */ + /* XXX suppress on mux _client_ quietmode */ tochan = options.log_level >= SYSLOG_LEVEL_ERROR && c->ctl_chan != -1 && c->extended_usage == CHAN_EXTENDED_WRITE; From 3e542357ffc8682944fb8f6d0e423e6c25f1524b Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:37:25 -0400 Subject: [PATCH 65/70] spelling: terminated --- regress/forwarding.sh | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/regress/forwarding.sh b/regress/forwarding.sh index 39fccba7385..713563ec616 100644 --- a/regress/forwarding.sh +++ b/regress/forwarding.sh @@ -58,7 +58,7 @@ for d in L R; do -oExitOnForwardFailure=yes somehost true r=$? if [ $r != 255 ]; then - fail "connection not termintated, but should ($r)" + fail "connection not terminated, but should ($r)" fi fi done From 6cebb0d09c7ca63a04642e01d4b3130803a4601b Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:37:37 -0400 Subject: [PATCH 66/70] spelling: unexpectedly --- regress/cert-userkey.sh | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/regress/cert-userkey.sh b/regress/cert-userkey.sh index 6a23fe300bf..796b7a2d426 100644 --- a/regress/cert-userkey.sh +++ b/regress/cert-userkey.sh @@ -218,7 +218,7 @@ basic_tests() { ${SSH} -i $OBJ/cert_user_key_${ktype} \ -F $OBJ/ssh_proxy somehost true >/dev/null 2>&1 if [ $? -eq 0 ]; then - fail "ssh cert connect succeeded unexpecedly" + fail "ssh cert connect succeeded unexpectedly" fi verbose "$tid: ${_prefix} revoked via KRL" rm $OBJ/cert_user_key_revoked @@ -227,7 +227,7 @@ basic_tests() { ${SSH} -i $OBJ/cert_user_key_${ktype} \ -F $OBJ/ssh_proxy somehost true >/dev/null 2>&1 if [ $? -eq 0 ]; then - fail "ssh cert connect succeeded unexpecedly" + fail "ssh cert connect succeeded unexpectedly" fi verbose "$tid: ${_prefix} empty KRL" ${SSHKEYGEN} -kqf $OBJ/cert_user_key_revoked @@ -249,7 +249,7 @@ basic_tests() { ${SSH} -i $OBJ/cert_user_key_${ktype} -F $OBJ/ssh_proxy \ somehost true >/dev/null 2>&1 if [ $? -eq 0 ]; then - fail "ssh cert connect succeeded unexpecedly" + fail "ssh cert connect succeeded unexpectedly" fi done From 9302edc13f10061b507b07c590acc98ff6f93f02 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:37:47 -0400 Subject: [PATCH 67/70] spelling: variable --- ssh.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/ssh.c b/ssh.c index 5ebd59e5f48..0af1a73b3ab 100644 --- a/ssh.c +++ b/ssh.c @@ -1392,7 +1392,7 @@ main(int ac, char **av) /* load options.identity_files */ load_public_identity_files(); - /* optionally set the SSH_AUTHSOCKET_ENV_NAME varibale */ + /* optionally set the SSH_AUTHSOCKET_ENV_NAME variable */ if (options.identity_agent && strcmp(options.identity_agent, SSH_AUTHSOCKET_ENV_NAME) != 0) { if (strcmp(options.identity_agent, "none") == 0) { From 914630d1e42925e9c9e1a64935ad0f04f39c63ca Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:37:57 -0400 Subject: [PATCH 68/70] spelling: verbatim --- readconf.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/readconf.c b/readconf.c index b11c628f9c8..97f73f4820e 100644 --- a/readconf.c +++ b/readconf.c @@ -2307,7 +2307,7 @@ parse_jump(const char *s, Options *o, int active) return ret; } -/* XXX the following is a near-vebatim copy from servconf.c; refactor */ +/* XXX the following is a near-verbatim copy from servconf.c; refactor */ static const char * fmt_multistate_int(int val, const struct multistate *m) { From 293df4931e2e4d452ec302d0b8847195b74ab88d Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:38:07 -0400 Subject: [PATCH 69/70] spelling: wherewithal --- loginrec.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/loginrec.c b/loginrec.c index 788553e9204..183a451b6de 100644 --- a/loginrec.c +++ b/loginrec.c @@ -988,7 +988,7 @@ utmp_write_entry(struct logininfo *li) /* not much point if we don't want utmpx entries */ #ifdef USE_UTMPX -/* if we have the wherewithall, use pututxline etc. */ +/* if we have the wherewithal, use pututxline etc. */ # if !defined(DISABLE_PUTUTXLINE) && defined(HAVE_SETUTXENT) && \ defined(HAVE_PUTUTXLINE) # define UTMPX_USE_LIBRARY From c091b3c3624969d4f769000a66fd6a9971e9b4c8 Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Thu, 10 Aug 2017 20:38:21 -0400 Subject: [PATCH 70/70] spelling: whether --- configure.ac | 2 +- ssh-agent.c | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/configure.ac b/configure.ac index 7e20679f6ac..8526d911d03 100644 --- a/configure.ac +++ b/configure.ac @@ -2874,7 +2874,7 @@ LIBS="$saved_LIBS" ### Configure cryptographic random number support -# Check wheter OpenSSL seeds itself +# Check whether OpenSSL seeds itself if test "x$openssl" = "xyes" ; then AC_MSG_CHECKING([whether OpenSSL's PRNG is internally seeded]) AC_RUN_IFELSE( diff --git a/ssh-agent.c b/ssh-agent.c index 0c6c3659217..5aa98a1fead 100644 --- a/ssh-agent.c +++ b/ssh-agent.c @@ -681,7 +681,7 @@ process_message(u_int socknum) debug("%s: socket %u (fd=%d) type %d", __func__, socknum, e->fd, type); - /* check wheter agent is locked */ + /* check whether agent is locked */ if (locked && type != SSH_AGENTC_UNLOCK) { sshbuf_reset(e->request); switch (type) {