mirror of
https://git.libssh.org/projects/libssh.git
synced 2026-02-07 18:50:27 +09:00
Fix various spelling issues reported by codespell
Signed-off-by: Jakub Jelen <jjelen@redhat.com> Reviewed-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
This commit is contained in:
@@ -176,7 +176,7 @@ extern LIBSSH_THREAD int ssh_log_level;
|
||||
"Host time4\n" \
|
||||
"\tRekeyLimit default 9600\n"
|
||||
|
||||
/* Multiple IdentityFile settings all are aplied */
|
||||
/* Multiple IdentityFile settings all are applied */
|
||||
#define LIBSSH_TESTCONFIG_STRING13 \
|
||||
"IdentityFile id_rsa_one\n" \
|
||||
"IdentityFile id_ecdsa_two\n"
|
||||
@@ -974,13 +974,13 @@ static void torture_config_proxyjump(void **state,
|
||||
_parse_config(session, file, string, SSH_OK);
|
||||
assert_true(session->opts.ProxyCommand == NULL);
|
||||
|
||||
/* If also ProxyCommand is specifed, the first is applied */
|
||||
/* If also ProxyCommand is specified, the first is applied */
|
||||
torture_reset_config(session);
|
||||
ssh_options_set(session, SSH_OPTIONS_HOST, "only-command");
|
||||
_parse_config(session, file, string, SSH_OK);
|
||||
assert_string_equal(session->opts.ProxyCommand, PROXYCMD);
|
||||
|
||||
/* If also ProxyCommand is specifed, the first is applied */
|
||||
/* If also ProxyCommand is specified, the first is applied */
|
||||
torture_reset_config(session);
|
||||
ssh_options_set(session, SSH_OPTIONS_HOST, "only-jump");
|
||||
_parse_config(session, file, string, SSH_OK);
|
||||
@@ -1381,7 +1381,7 @@ static void torture_config_nonewlineoneline_string(void **state)
|
||||
|
||||
/* ssh_config_get_cmd() does three things:
|
||||
* * Strips leading whitespace
|
||||
* * Terminate the characted on the end of next quotes-enclosed string
|
||||
* * Terminate the character on the end of next quotes-enclosed string
|
||||
* * Terminate on the end of line
|
||||
*/
|
||||
static void torture_config_parser_get_cmd(void **state)
|
||||
|
||||
@@ -430,7 +430,7 @@ static void torture_knownhosts_get_algorithms_names(void **state)
|
||||
}
|
||||
|
||||
#ifndef HAVE_DSA
|
||||
/* Do not remove this test if we completly remove DSA support! */
|
||||
/* Do not remove this test if we completely remove DSA support! */
|
||||
static void torture_knownhosts_get_algorithms_names_unsupported(void **state)
|
||||
{
|
||||
const char *knownhosts_file = *state;
|
||||
|
||||
@@ -230,7 +230,7 @@ static void torture_options_set_pubkey_accepted_types(void **state) {
|
||||
/* simulate the SHA2 extension was negotiated */
|
||||
session->extensions = SSH_EXT_SIG_RSA_SHA256;
|
||||
|
||||
/* previous configuration did not list the SHA2 extension algoritms, so
|
||||
/* previous configuration did not list the SHA2 extension algorithms, so
|
||||
* it should not be used */
|
||||
type = ssh_key_type_to_hash(session, SSH_KEYTYPE_RSA);
|
||||
assert_int_equal(type, SSH_DIGEST_SHA1);
|
||||
|
||||
@@ -20,7 +20,7 @@
|
||||
*/
|
||||
|
||||
/*
|
||||
* This test checks if the messages accepted by the packet filter were intented
|
||||
* This test checks if the messages accepted by the packet filter were intended
|
||||
* to be accepted.
|
||||
*
|
||||
* The process consists in 2 steps:
|
||||
|
||||
@@ -690,7 +690,7 @@ static void torture_pki_rsa_key_size(void **state)
|
||||
rc = ssh_pki_signature_verify(session, sign, pubkey, INPUT, sizeof(INPUT));
|
||||
assert_ssh_return_code(session, rc);
|
||||
|
||||
/* Set the minumum RSA key size to 4k */
|
||||
/* Set the minimum RSA key size to 4k */
|
||||
rc = ssh_options_set(session, SSH_OPTIONS_RSA_MIN_SIZE, &length);
|
||||
assert_ssh_return_code(session, rc);
|
||||
|
||||
|
||||
@@ -120,7 +120,7 @@ static void test_ssh_accept_interrupt(void **state)
|
||||
server = ssh_new();
|
||||
assert_non_null(server);
|
||||
|
||||
/* Send interupt in 1 second */
|
||||
/* Send interrupt in 1 second */
|
||||
rc = pthread_create(&interrupt_pthread, NULL, int_thread, NULL);
|
||||
assert_return_code(rc, errno);
|
||||
|
||||
|
||||
Reference in New Issue
Block a user