mirror of
https://git.libssh.org/projects/libssh.git
synced 2026-02-07 18:50:27 +09:00
Fix various spelling issues reported by codespell
Signed-off-by: Jakub Jelen <jjelen@redhat.com> Reviewed-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
This commit is contained in:
@@ -130,7 +130,7 @@ static void torture_client_config_system(void **state)
|
||||
* configuration files retains OpenSSH semantics (the per-user overrides
|
||||
* the system-wide values).
|
||||
* The function ssh_options_parse_config() has hardcoded path to the
|
||||
* system-wide configuraion file so we try to emmulate the behavior by parsing
|
||||
* system-wide configuration file so we try to emulate the behavior by parsing
|
||||
* the files separately in the same order.
|
||||
*/
|
||||
static void torture_client_config_emulate(void **state)
|
||||
|
||||
@@ -189,7 +189,7 @@ static void torture_connect_uninitialized(UNUSED_PARAM(void **state))
|
||||
ssh_session session;
|
||||
struct passwd *pwd;
|
||||
|
||||
/* Make sure the library is unitialized */
|
||||
/* Make sure the library is uninitialized */
|
||||
while (is_ssh_initialized()) {
|
||||
rc = ssh_finalize();
|
||||
assert_return_code(rc, errno);
|
||||
|
||||
@@ -172,7 +172,7 @@ static void torture_rekey_send(void **state)
|
||||
bytes / c->in_cipher->blocksize);
|
||||
assert_int_equal(c->out_cipher->max_blocks,
|
||||
bytes / c->out_cipher->blocksize);
|
||||
/* We should have less encrypted packets than transfered (first are not encrypted) */
|
||||
/* We should have less encrypted packets than transferred (first are not encrypted) */
|
||||
assert_true(c->out_cipher->packets < s->ssh.session->send_seq);
|
||||
assert_true(c->in_cipher->packets < s->ssh.session->recv_seq);
|
||||
/* Copy the initial secret hash = session_id so we know we changed keys later */
|
||||
@@ -276,7 +276,7 @@ static void torture_rekey_recv(void **state)
|
||||
c = s->ssh.session->current_crypto;
|
||||
assert_int_equal(c->in_cipher->max_blocks, bytes / c->in_cipher->blocksize);
|
||||
assert_int_equal(c->out_cipher->max_blocks, bytes / c->out_cipher->blocksize);
|
||||
/* We should have less encrypted packets than transfered (first are not encrypted) */
|
||||
/* We should have less encrypted packets than transferred (first are not encrypted) */
|
||||
assert_true(c->out_cipher->packets < s->ssh.session->send_seq);
|
||||
assert_true(c->in_cipher->packets < s->ssh.session->recv_seq);
|
||||
/* Copy the initial secret hash = session_id so we know we changed keys later */
|
||||
@@ -471,7 +471,7 @@ static void torture_rekey_different_kex(void **state)
|
||||
bytes / c->in_cipher->blocksize);
|
||||
assert_int_equal(c->out_cipher->max_blocks,
|
||||
bytes / c->out_cipher->blocksize);
|
||||
/* We should have less encrypted packets than transfered (first are not encrypted) */
|
||||
/* We should have less encrypted packets than transferred (first are not encrypted) */
|
||||
assert_true(c->out_cipher->packets < s->ssh.session->send_seq);
|
||||
assert_true(c->in_cipher->packets < s->ssh.session->recv_seq);
|
||||
/* Copy the initial secret hash = session_id so we know we changed keys later */
|
||||
@@ -497,7 +497,7 @@ static void torture_rekey_different_kex(void **state)
|
||||
rc = ssh_options_set(s->ssh.session, SSH_OPTIONS_KEY_EXCHANGE, kex2);
|
||||
assert_ssh_return_code(s->ssh.session, rc);
|
||||
|
||||
/* send ignore packets of up to 1KB to trigger rekey. Send litle bit more
|
||||
/* send ignore packets of up to 1KB to trigger rekey. Send little bit more
|
||||
* to make sure the rekey it completes with all different ciphers (paddings */
|
||||
memset(data, 0, sizeof(data));
|
||||
memset(data, 'A', 128);
|
||||
@@ -575,7 +575,7 @@ static void torture_rekey_server_different_kex(void **state)
|
||||
rc = ssh_options_set(s->ssh.session, SSH_OPTIONS_KEY_EXCHANGE, kex2);
|
||||
assert_ssh_return_code(s->ssh.session, rc);
|
||||
|
||||
/* send ignore packets of up to 1KB to trigger rekey. Send litle bit more
|
||||
/* send ignore packets of up to 1KB to trigger rekey. Send little bit more
|
||||
* to make sure the rekey it completes with all different ciphers (paddings */
|
||||
memset(data, 0, sizeof(data));
|
||||
memset(data, 'A', 128);
|
||||
|
||||
Reference in New Issue
Block a user