Fix various spelling issues reported by codespell

Signed-off-by: Jakub Jelen <jjelen@redhat.com>
Reviewed-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
This commit is contained in:
Jakub Jelen
2022-10-12 10:45:00 +02:00
parent 22f0f0dd60
commit 97c9ac2f58
59 changed files with 117 additions and 112 deletions

View File

@@ -176,7 +176,7 @@ extern LIBSSH_THREAD int ssh_log_level;
"Host time4\n" \
"\tRekeyLimit default 9600\n"
/* Multiple IdentityFile settings all are aplied */
/* Multiple IdentityFile settings all are applied */
#define LIBSSH_TESTCONFIG_STRING13 \
"IdentityFile id_rsa_one\n" \
"IdentityFile id_ecdsa_two\n"
@@ -974,13 +974,13 @@ static void torture_config_proxyjump(void **state,
_parse_config(session, file, string, SSH_OK);
assert_true(session->opts.ProxyCommand == NULL);
/* If also ProxyCommand is specifed, the first is applied */
/* If also ProxyCommand is specified, the first is applied */
torture_reset_config(session);
ssh_options_set(session, SSH_OPTIONS_HOST, "only-command");
_parse_config(session, file, string, SSH_OK);
assert_string_equal(session->opts.ProxyCommand, PROXYCMD);
/* If also ProxyCommand is specifed, the first is applied */
/* If also ProxyCommand is specified, the first is applied */
torture_reset_config(session);
ssh_options_set(session, SSH_OPTIONS_HOST, "only-jump");
_parse_config(session, file, string, SSH_OK);
@@ -1381,7 +1381,7 @@ static void torture_config_nonewlineoneline_string(void **state)
/* ssh_config_get_cmd() does three things:
* * Strips leading whitespace
* * Terminate the characted on the end of next quotes-enclosed string
* * Terminate the character on the end of next quotes-enclosed string
* * Terminate on the end of line
*/
static void torture_config_parser_get_cmd(void **state)

View File

@@ -430,7 +430,7 @@ static void torture_knownhosts_get_algorithms_names(void **state)
}
#ifndef HAVE_DSA
/* Do not remove this test if we completly remove DSA support! */
/* Do not remove this test if we completely remove DSA support! */
static void torture_knownhosts_get_algorithms_names_unsupported(void **state)
{
const char *knownhosts_file = *state;

View File

@@ -230,7 +230,7 @@ static void torture_options_set_pubkey_accepted_types(void **state) {
/* simulate the SHA2 extension was negotiated */
session->extensions = SSH_EXT_SIG_RSA_SHA256;
/* previous configuration did not list the SHA2 extension algoritms, so
/* previous configuration did not list the SHA2 extension algorithms, so
* it should not be used */
type = ssh_key_type_to_hash(session, SSH_KEYTYPE_RSA);
assert_int_equal(type, SSH_DIGEST_SHA1);

View File

@@ -20,7 +20,7 @@
*/
/*
* This test checks if the messages accepted by the packet filter were intented
* This test checks if the messages accepted by the packet filter were intended
* to be accepted.
*
* The process consists in 2 steps:

View File

@@ -690,7 +690,7 @@ static void torture_pki_rsa_key_size(void **state)
rc = ssh_pki_signature_verify(session, sign, pubkey, INPUT, sizeof(INPUT));
assert_ssh_return_code(session, rc);
/* Set the minumum RSA key size to 4k */
/* Set the minimum RSA key size to 4k */
rc = ssh_options_set(session, SSH_OPTIONS_RSA_MIN_SIZE, &length);
assert_ssh_return_code(session, rc);

View File

@@ -120,7 +120,7 @@ static void test_ssh_accept_interrupt(void **state)
server = ssh_new();
assert_non_null(server);
/* Send interupt in 1 second */
/* Send interrupt in 1 second */
rc = pthread_create(&interrupt_pthread, NULL, int_thread, NULL);
assert_return_code(rc, errno);