1
0
mirror of https://github.com/libssh2/libssh2.git synced 2025-07-04 09:22:28 +03:00

tidy-up: fix typos (#886)

detected by codespell 2.2.4.
This commit is contained in:
Viktor Szakats
2023-03-27 19:26:58 +02:00
committed by GitHub
parent 2f16d8105c
commit 1d9af00609
37 changed files with 62 additions and 62 deletions

View File

@ -20,7 +20,7 @@ This release includes the following enhancements and bugfixes:
o improves portiablity of the make file o improves portiablity of the make file
o improves timeout behavior with 2FA keyboard auth o improves timeout behavior with 2FA keyboard auth
o various improvements to the Wincng backend o various improvements to the Wincng backend
o fixes reading parital packet replies when using an agent o fixes reading partial packet replies when using an agent
o fixes Diffie Hellman key exchange on Windows 1903+ builds o fixes Diffie Hellman key exchange on Windows 1903+ builds
o fixes building tests with older versions of OpenSSL o fixes building tests with older versions of OpenSSL
o fixes possible multiple definition warnings o fixes possible multiple definition warnings

View File

@ -28,7 +28,7 @@ AC_DEFUN([CURL_DETECT_ICC],
]) ])
dnl We create a function for detecting which compiler we use and then set as dnl We create a function for detecting which compiler we use and then set as
dnl pendantic compiler options as possible for that particular compiler. The dnl pedantic compiler options as possible for that particular compiler. The
dnl options are only used for debug-builds. dnl options are only used for debug-builds.
AC_DEFUN([CURL_CC_DEBUG_OPTS], AC_DEFUN([CURL_CC_DEBUG_OPTS],
@ -237,7 +237,7 @@ dnl ioctlsocket test was good
nonblock="ioctlsocket" nonblock="ioctlsocket"
AC_DEFINE(HAVE_IOCTLSOCKET, 1, [use ioctlsocket() for non-blocking sockets]) AC_DEFINE(HAVE_IOCTLSOCKET, 1, [use ioctlsocket() for non-blocking sockets])
],[ ],[
dnl ioctlsocket didnt compile!, go to test 4 dnl ioctlsocket did not compile!, go to test 4
AC_TRY_LINK([ AC_TRY_LINK([
/* headers for IoctlSocket test (Amiga?) */ /* headers for IoctlSocket test (Amiga?) */
@ -251,7 +251,7 @@ dnl ioctlsocket test was good
nonblock="IoctlSocket" nonblock="IoctlSocket"
AC_DEFINE(HAVE_IOCTLSOCKET_CASE, 1, [use Ioctlsocket() for non-blocking sockets]) AC_DEFINE(HAVE_IOCTLSOCKET_CASE, 1, [use Ioctlsocket() for non-blocking sockets])
],[ ],[
dnl Ioctlsocket didnt compile, do test 5! dnl Ioctlsocket did not compile, do test 5!
AC_TRY_COMPILE([ AC_TRY_COMPILE([
/* headers for SO_NONBLOCK test (BeOS) */ /* headers for SO_NONBLOCK test (BeOS) */
#include <socket.h> #include <socket.h>
@ -265,7 +265,7 @@ dnl the SO_NONBLOCK test was good
nonblock="SO_NONBLOCK" nonblock="SO_NONBLOCK"
AC_DEFINE(HAVE_SO_NONBLOCK, 1, [use SO_NONBLOCK for non-blocking sockets]) AC_DEFINE(HAVE_SO_NONBLOCK, 1, [use SO_NONBLOCK for non-blocking sockets])
],[ ],[
dnl test 5 didnt compile! dnl test 5 did not compile!
nonblock="nada" nonblock="nada"
AC_DEFINE(HAVE_DISABLED_NONBLOCKING, 1, [disabled non-blocking sockets]) AC_DEFINE(HAVE_DISABLED_NONBLOCKING, 1, [disabled non-blocking sockets])
]) ])

View File

@ -2,7 +2,7 @@
echo "***" >&2 echo "***" >&2
echo "*** Do not use buildconf. Instead, just use: autoreconf -fi" >&2 echo "*** Do not use buildconf. Instead, just use: autoreconf -fi" >&2
echo "*** Doing it for you now, but buildconf may disapear in the future." >&2 echo "*** Doing it for you now, but buildconf may disappear in the future." >&2
echo "***" >&2 echo "***" >&2
exec ${AUTORECONF:-autoreconf} -fi "${@}" exec ${AUTORECONF:-autoreconf} -fi "${@}"

View File

@ -712,7 +712,7 @@ sub scanfile {
# A rather more interesting, and correct, check would be to not test # A rather more interesting, and correct, check would be to not test
# only locally committed files but inspect all files wrt the year of # only locally committed files but inspect all files wrt the year of
# their last commit. Removing the `git rev-list origin/master..HEAD` # their last commit. Removing the `git rev-list origin/master..HEAD`
# condition below will enfore copyright year checks against the year # condition below will enforce copyright year checks against the year
# the file was last committed (and thus edited to some degree). # the file was last committed (and thus edited to some degree).
my $commityear = undef; my $commityear = undef;
@copyright = sort {$$b{year} cmp $$a{year}} @copyright; @copyright = sort {$$b{year} cmp $$a{year}} @copyright;

View File

@ -112,7 +112,7 @@ esac
if test "$found_crypto" = "none"; then if test "$found_crypto" = "none"; then
crypto_errors="${crypto_errors} crypto_errors="${crypto_errors}
Specify --with-crypto=\$backend and/or the neccessary library search prefix. Specify --with-crypto=\$backend and/or the necessary library search prefix.
Known crypto backends: auto, m4_set_contents([crypto_backends], [, ])" Known crypto backends: auto, m4_set_contents([crypto_backends], [, ])"
AS_MESSAGE([ERROR: ${crypto_errors}]) AS_MESSAGE([ERROR: ${crypto_errors}])

View File

@ -392,7 +392,7 @@ _libssh2_cipher_cast5
CAST5-CBC algorithm identifier initializer. CAST5-CBC algorithm identifier initializer.
#define with constant value of type _libssh2_cipher_type(). #define with constant value of type _libssh2_cipher_type().
4.5) Tripple DES in CBC block mode. 4.5) Triple DES in CBC block mode.
LIBSSH2_3DES LIBSSH2_3DES
#define as 1 if the crypto library supports TripleDES in CBC mode, else 0. #define as 1 if the crypto library supports TripleDES in CBC mode, else 0.
If defined as 0, the rest of this section can be omitted. If defined as 0, the rest of this section can be omitted.
@ -939,5 +939,5 @@ This function is for implementing key hash upgrading as defined in RFC 8332.
Based on the incoming key_method value, this function will return a Based on the incoming key_method value, this function will return a
list of supported algorithms that can upgrade the original key method algorithm list of supported algorithms that can upgrade the original key method algorithm
as a comma seperated list, if there is no upgrade option this function should as a comma separated list, if there is no upgrade option this function should
return NULL. return NULL.

View File

@ -264,7 +264,7 @@ Some ./configure options deserve additional comments:
Enabling this option will allow for "none" as a Enabling this option will allow for "none" as a
negotiable method, however it still requires that the negotiable method, however it still requires that the
method be advertized by the remote end and that no method be advertised by the remote end and that no
more-preferable methods are available. more-preferable methods are available.
* --enable-mac-none * --enable-mac-none
@ -277,7 +277,7 @@ Some ./configure options deserve additional comments:
Enabling this option will allow for "none" as a Enabling this option will allow for "none" as a
negotiable method, however it still requires that the negotiable method, however it still requires that the
method be advertized by the remote end and that no method be advertised by the remote end and that no
more-preferable methods are available. more-preferable methods are available.
* --with-libgcrypt * --with-libgcrypt

View File

@ -82,7 +82,7 @@ The following options are available:
libssh2 by default as well. libssh2 by default as well.
Enabling this option will allow for "none" as a negotiable method, Enabling this option will allow for "none" as a negotiable method,
however it still requires that the method be advertized by the however it still requires that the method be advertised by the
remote end and that no more-preferable methods are available. remote end and that no more-preferable methods are available.
* `ENABLE_MAC_NONE=OFF` * `ENABLE_MAC_NONE=OFF`
@ -93,7 +93,7 @@ The following options are available:
MAC hashes removes a layer of security. MAC hashes removes a layer of security.
Enabling this option will allow for "none" as a negotiable method, Enabling this option will allow for "none" as a negotiable method,
however it still requires that the method be advertized by the however it still requires that the method be advertised by the
remote end and that no more-preferable methods are available. remote end and that no more-preferable methods are available.
* `ENABLE_DEBUG_LOGGING=ON` in Debug, `=OFF` in Release * `ENABLE_DEBUG_LOGGING=ON` in Debug, `=OFF` in Release

View File

@ -41,7 +41,7 @@ At next SONAME bump
libssh2_poll() libssh2_poll()
libssh2_poll_channel_read() libssh2_poll_channel_read()
libssh2_session_startup() (libssh2_session_handshake() is the replacement) libssh2_session_startup() (libssh2_session_handshake() is the replacement)
libssh2_banner_set() (libssh2_session_banner_set() is the repacement) libssh2_banner_set() (libssh2_session_banner_set() is the replacement)
* Rename a few function: * Rename a few function:
@ -60,7 +60,7 @@ At next SONAME bump
* remove the existing libssh2_scp_send_ex() function and rename * remove the existing libssh2_scp_send_ex() function and rename
libssh2_scp_send64 to become the new libssh2_scp_send instead. libssh2_scp_send64 to become the new libssh2_scp_send instead.
* remove the existing libssh2_knownhost_check() functin and rename * remove the existing libssh2_knownhost_check() function and rename
libssh2_knownhost_checkp() to become the new libssh2_knownhost_check instead libssh2_knownhost_checkp() to become the new libssh2_knownhost_check instead
Buffering Improvements Buffering Improvements

View File

@ -151,7 +151,7 @@ int main(int argc, char *argv[])
return -1; return -1;
} }
/* At this point we havn't yet authenticated. The first thing to do /* At this point we have not yet authenticated. The first thing to do
* is check the hostkey's fingerprint against our known hosts Your app * is check the hostkey's fingerprint against our known hosts Your app
* may have it hard coded, may go to a file, may present it to the * may have it hard coded, may go to a file, may present it to the
* user, that's your call * user, that's your call

View File

@ -119,7 +119,7 @@ int main(int argc, char *argv[])
return -1; return -1;
} }
/* At this point we havn't yet authenticated. The first thing to do /* At this point we have not yet authenticated. The first thing to do
* is check the hostkey's fingerprint against our known hosts Your app * is check the hostkey's fingerprint against our known hosts Your app
* may have it hard coded, may go to a file, may present it to the * may have it hard coded, may go to a file, may present it to the
* user, that's your call * user, that's your call

View File

@ -179,7 +179,7 @@ int main(int argc, char *argv[])
return -1; return -1;
} }
/* At this point we havn't yet authenticated. The first thing to do /* At this point we have not yet authenticated. The first thing to do
* is check the hostkey's fingerprint against our known hosts Your app * is check the hostkey's fingerprint against our known hosts Your app
* may have it hard coded, may go to a file, may present it to the * may have it hard coded, may go to a file, may present it to the
* user, that's your call * user, that's your call

View File

@ -138,7 +138,7 @@ int main(int argc, char *argv[])
return -1; return -1;
} }
/* At this point we havn't yet authenticated. The first thing to do /* At this point we have not yet authenticated. The first thing to do
* is check the hostkey's fingerprint against our known hosts Your app * is check the hostkey's fingerprint against our known hosts Your app
* may have it hard coded, may go to a file, may present it to the * may have it hard coded, may go to a file, may present it to the
* user, that's your call * user, that's your call

View File

@ -172,7 +172,7 @@ int main(int argc, char *argv[])
return -1; return -1;
} }
/* At this point we havn't yet authenticated. The first thing to do /* At this point we have not yet authenticated. The first thing to do
* is check the hostkey's fingerprint against our known hosts Your app * is check the hostkey's fingerprint against our known hosts Your app
* may have it hard coded, may go to a file, may present it to the * may have it hard coded, may go to a file, may present it to the
* user, that's your call * user, that's your call

View File

@ -186,7 +186,7 @@ int main(int argc, char *argv[])
return -1; return -1;
} }
/* At this point we havn't yet authenticated. The first thing to do /* At this point we have not yet authenticated. The first thing to do
* is check the hostkey's fingerprint against our known hosts Your app * is check the hostkey's fingerprint against our known hosts Your app
* may have it hard coded, may go to a file, may present it to the * may have it hard coded, may go to a file, may present it to the
* user, that's your call * user, that's your call

View File

@ -150,7 +150,7 @@ int main(int argc, char *argv[])
libssh2_session_set_blocking(session, 0); libssh2_session_set_blocking(session, 0);
/* At this point we havn't yet authenticated. The first thing to do /* At this point we have not yet authenticated. The first thing to do
* is check the hostkey's fingerprint against our known hosts Your app * is check the hostkey's fingerprint against our known hosts Your app
* may have it hard coded, may go to a file, may present it to the * may have it hard coded, may go to a file, may present it to the
* user, that's your call * user, that's your call

View File

@ -137,7 +137,7 @@ int main(int argc, char *argv[])
return -1; return -1;
} }
/* At this point we havn't yet authenticated. The first thing to do /* At this point we have not yet authenticated. The first thing to do
* is check the hostkey's fingerprint against our known hosts Your app * is check the hostkey's fingerprint against our known hosts Your app
* may have it hard coded, may go to a file, may present it to the * may have it hard coded, may go to a file, may present it to the
* user, that's your call * user, that's your call

View File

@ -117,7 +117,7 @@ int main(int argc, char *argv[])
return -1; return -1;
} }
/* At this point we havn't yet authenticated. The first thing to do /* At this point we have not yet authenticated. The first thing to do
* is check the hostkey's fingerprint against our known hosts Your app * is check the hostkey's fingerprint against our known hosts Your app
* may have it hard coded, may go to a file, may present it to the * may have it hard coded, may go to a file, may present it to the
* user, that's your call * user, that's your call

View File

@ -117,7 +117,7 @@ int main(int argc, char *argv[])
return -1; return -1;
} }
/* At this point we havn't yet authenticated. The first thing to do /* At this point we have not yet authenticated. The first thing to do
* is check the hostkey's fingerprint against our known hosts Your app * is check the hostkey's fingerprint against our known hosts Your app
* may have it hard coded, may go to a file, may present it to the * may have it hard coded, may go to a file, may present it to the
* user, that's your call * user, that's your call

View File

@ -185,7 +185,7 @@ int main(int argc, char *argv[])
return -1; return -1;
} }
/* At this point we havn't yet authenticated. The first thing to do /* At this point we have not yet authenticated. The first thing to do
* is check the hostkey's fingerprint against our known hosts Your app * is check the hostkey's fingerprint against our known hosts Your app
* may have it hard coded, may go to a file, may present it to the * may have it hard coded, may go to a file, may present it to the
* user, that's your call * user, that's your call

View File

@ -136,7 +136,7 @@ int main(int argc, char *argv[])
return -1; return -1;
} }
/* At this point we havn't yet authenticated. The first thing to do /* At this point we have not yet authenticated. The first thing to do
* is check the hostkey's fingerprint against our known hosts Your app * is check the hostkey's fingerprint against our known hosts Your app
* may have it hard coded, may go to a file, may present it to the * may have it hard coded, may go to a file, may present it to the
* user, that's your call * user, that's your call

View File

@ -177,7 +177,7 @@ int main(int argc, char *argv[])
return -1; return -1;
} }
/* At this point we havn't yet authenticated. The first thing to do is /* At this point we have not yet authenticated. The first thing to do is
* check the hostkey's fingerprint against our known hosts Your app may * check the hostkey's fingerprint against our known hosts Your app may
* have it hard coded, may go to a file, may present it to the user, * have it hard coded, may go to a file, may present it to the user,
* that's your call * that's your call

View File

@ -177,7 +177,7 @@ int main(int argc, char *argv[])
return -1; return -1;
} }
/* At this point we havn't yet authenticated. The first thing to do is /* At this point we have not yet authenticated. The first thing to do is
* check the hostkey's fingerprint against our known hosts Your app may * check the hostkey's fingerprint against our known hosts Your app may
* have it hard coded, may go to a file, may present it to the user, * have it hard coded, may go to a file, may present it to the user,
* that's your call * that's your call

View File

@ -153,7 +153,7 @@ int main(int argc, char *argv[])
return -1; return -1;
} }
/* At this point we havn't yet authenticated. The first thing to do /* At this point we have not yet authenticated. The first thing to do
* is check the hostkey's fingerprint against our known hosts Your app * is check the hostkey's fingerprint against our known hosts Your app
* may have it hard coded, may go to a file, may present it to the * may have it hard coded, may go to a file, may present it to the
* user, that's your call * user, that's your call

View File

@ -137,7 +137,7 @@ int main(int argc, char *argv[])
return -1; return -1;
} }
/* At this point we havn't yet authenticated. The first thing to do /* At this point we have not yet authenticated. The first thing to do
* is check the hostkey's fingerprint against our known hosts Your app * is check the hostkey's fingerprint against our known hosts Your app
* may have it hard coded, may go to a file, may present it to the * may have it hard coded, may go to a file, may present it to the
* user, that's your call * user, that's your call

View File

@ -158,7 +158,7 @@ int main(int argc, char *argv[])
return -1; return -1;
} }
/* At this point we havn't authenticated. The first thing to do is check /* At this point we have not authenticated. The first thing to do is check
* the hostkey's fingerprint against our known hosts Your app may have it * the hostkey's fingerprint against our known hosts Your app may have it
* hard coded, may go to a file, may present it to the user, that's your * hard coded, may go to a file, may present it to the user, that's your
* call * call

View File

@ -113,7 +113,7 @@ int main(int argc, char *argv[])
return 1; return 1;
} }
/* At this point we havn't authenticated. The first thing to do is check /* At this point we have not authenticated. The first thing to do is check
* the hostkey's fingerprint against our known hosts Your app may have it * the hostkey's fingerprint against our known hosts Your app may have it
* hard coded, may go to a file, may present it to the user, that's your * hard coded, may go to a file, may present it to the user, that's your
* call * call

View File

@ -190,7 +190,7 @@ int main(int argc, char *argv[])
return -1; return -1;
} }
/* At this point we havn't yet authenticated. The first thing to do /* At this point we have not yet authenticated. The first thing to do
* is check the hostkey's fingerprint against our known hosts Your app * is check the hostkey's fingerprint against our known hosts Your app
* may have it hard coded, may go to a file, may present it to the * may have it hard coded, may go to a file, may present it to the
* user, that's your call * user, that's your call

View File

@ -147,7 +147,7 @@ int main(int argc, char *argv[])
return -1; return -1;
} }
/* At this point we havn't yet authenticated. The first thing to do /* At this point we have not yet authenticated. The first thing to do
* is check the hostkey's fingerprint against our known hosts Your app * is check the hostkey's fingerprint against our known hosts Your app
* may have it hard coded, may go to a file, may present it to the * may have it hard coded, may go to a file, may present it to the
* user, that's your call * user, that's your call

View File

@ -148,7 +148,7 @@ static void x11_callback(LIBSSH2_SESSION *session, LIBSSH2_CHANNEL *channel,
rc = connect(sock, (struct sockaddr *) &addr, sizeof(addr)); rc = connect(sock, (struct sockaddr *) &addr, sizeof(addr));
if(rc != -1) { if(rc != -1) {
/* Connection Successfull */ /* Connection Successful */
if(gp_x11_chan == NULL) { if(gp_x11_chan == NULL) {
/* Calloc ensure that gp_X11_chan is full of 0 */ /* Calloc ensure that gp_X11_chan is full of 0 */
gp_x11_chan = (struct chan_X11_list *) gp_x11_chan = (struct chan_X11_list *)

View File

@ -55,7 +55,7 @@
#define LIBSSH2_VERSION_PATCH 1 #define LIBSSH2_VERSION_PATCH 1
/* This is the numeric version of the libssh2 version number, meant for easier /* This is the numeric version of the libssh2 version number, meant for easier
parsing and comparions by programs. The LIBSSH2_VERSION_NUM define will parsing and comparisons by programs. The LIBSSH2_VERSION_NUM define will
always follow this syntax: always follow this syntax:
0xXXYYZZ 0xXXYYZZ

View File

@ -96,9 +96,9 @@ String transcoding support:
values from/to the libssh2 API, three non-standard additional procedures are values from/to the libssh2 API, three non-standard additional procedures are
provided. They use a session pointer and a "string cache" pointer. provided. They use a session pointer and a "string cache" pointer.
Each time a string is transcoded, it is cached in the given cache. It is Each time a string is transcoded, it is cached in the given cache. It is
the responsibility of the caller to release the cache when its associted strings the responsibility of the caller to release the cache when its associated
are no longer needed. These procedures and the string cache type are defined strings are no longer needed. These procedures and the string cache type are
in a new libssh2_ccsid.h header file. defined in a new libssh2_ccsid.h header file.
To create a string cache, use: To create a string cache, use:
#include <libssh2_ccsid.h> #include <libssh2_ccsid.h>

View File

@ -58,7 +58,7 @@
d c @LIBSSH2_VERSION_PATCH@ d c @LIBSSH2_VERSION_PATCH@
* This is the numeric version of the libssh2 version number, meant for * This is the numeric version of the libssh2 version number, meant for
* easier parsing and comparions by programs. The LIBSSH2_VERSION_NUM * easier parsing and comparisons by programs. The LIBSSH2_VERSION_NUM
* define will always follow this syntax: * define will always follow this syntax:
* *
* X'XXYYZZ' * X'XXYYZZ'
@ -511,7 +511,7 @@
* *
* Fills algs with a list of supported cryptographic algorithms. Returns a * Fills algs with a list of supported cryptographic algorithms. Returns a
* non-negative number (number of supported algorithms) on success or a * non-negative number (number of supported algorithms) on success or a
* negative number (an eror code) on failure. * negative number (an error code) on failure.
* *
* NOTE: on success, algs must be deallocated (by calling libssh2_free) * NOTE: on success, algs must be deallocated (by calling libssh2_free)
* when not needed anymore * when not needed anymore
@ -772,7 +772,7 @@
* response_callback is provided with filled by library prompts array, * response_callback is provided with filled by library prompts array,
* but client must allocate and fill individual responses. Responses * but client must allocate and fill individual responses. Responses
* array is already allocated. Responses data will be freed by libssh2 * array is already allocated. Responses data will be freed by libssh2
* after callback return, but before subsequent callback invokation. * after callback return, but before subsequent callback invocation.
d libssh2_userauth_keyboard_interactive_ex... d libssh2_userauth_keyboard_interactive_ex...
d pr extproc('libssh2_userauth_keyboard_i- d pr extproc('libssh2_userauth_keyboard_i-
@ -1519,7 +1519,7 @@
* libssh2_knownhost_get() * libssh2_knownhost_get()
* *
* Traverse the internal list of known hosts. Pass NULL to 'prev' to get * Traverse the internal list of known hosts. Pass NULL to 'prev' to get
* the first one. Or pass a poiner to the previously returned one to * the first one. Or pass a pointer to the previously returned one to
* get the next. * get the next.
* *
* Returns: * Returns:
@ -1580,7 +1580,7 @@
* libssh2_agent_get_identity() * libssh2_agent_get_identity()
* *
* Traverse the internal list of public keys. Pass NULL to 'prev' to get * Traverse the internal list of public keys. Pass NULL to 'prev' to get
* the first one. Or pass a poiner to the previously returned one to * the first one. Or pass a pointer to the previously returned one to
* get the next. * get the next.
* *
* Returns: * Returns:

View File

@ -59,7 +59,7 @@
* Portable OpenSSH by the PowerShell team. Commit * Portable OpenSSH by the PowerShell team. Commit
* 8ab565c53f3619d6a1f5ac229e212cad8a52852c of * 8ab565c53f3619d6a1f5ac229e212cad8a52852c of
* https://github.com/PowerShell/openssh-portable.git was used as the base, * https://github.com/PowerShell/openssh-portable.git was used as the base,
* specificaly the following files: * specifically the following files:
* *
* - contrib\win32\win32compat\fileio.c * - contrib\win32\win32compat\fileio.c
* - Structure of agent_connect_openssh from ssh_get_authentication_socket * - Structure of agent_connect_openssh from ssh_get_authentication_socket

View File

@ -324,7 +324,7 @@ int _libssh2_sk_pub_keyfilememory(LIBSSH2_SESSION *session,
* @related _libssh2_key_sign_algorithm() * @related _libssh2_key_sign_algorithm()
* @param key_method current key method, usually the default key sig method * @param key_method current key method, usually the default key sig method
* @param key_method_len length of the key method buffer * @param key_method_len length of the key method buffer
* @result comma seperated list of supported upgrade options per RFC 8332, if * @result comma separated list of supported upgrade options per RFC 8332, if
* there is no upgrade option return NULL * there is no upgrade option return NULL
*/ */

View File

@ -2193,7 +2193,7 @@ clean_exit:
/* kex_method_ecdh_key_exchange /* kex_method_ecdh_key_exchange
* *
* Elliptic Curve Diffie Hellman Key Exchange * Elliptic Curve Diffie Hellman Key Exchange
* supports SHA256/384/512 hashes based on negotated ecdh method * supports SHA256/384/512 hashes based on negotiated ecdh method
* *
*/ */

View File

@ -95,7 +95,7 @@ define this logical in your systartup like so:
$ define/system/executive gnv$libssh2 dev:[dir..]gnv$libssh2_x_y_z.exe $ define/system/executive gnv$libssh2 dev:[dir..]gnv$libssh2_x_y_z.exe
Optionally, you can install the executbale like so: Optionally, you can install the executable like so:
$ mc sysgen install dev:[dir..]gnv$libssh2_x_y_z.exe/open/share/header $ mc sysgen install dev:[dir..]gnv$libssh2_x_y_z.exe/open/share/header
@ -120,7 +120,7 @@ Compiling and linking against libssh2
The shared image library has a vector table with both uppercase and The shared image library has a vector table with both uppercase and
mixed case entry points, allowing to link directly against the shared mixed case entry points, allowing to link directly against the shared
image wether you need the /NAMES=AS_IS or not. image whether you need the /NAMES=AS_IS or not.
To link successfully, you MUST use /NAMES=shortened, as some function To link successfully, you MUST use /NAMES=shortened, as some function
names in libssh2 are longer than the VMS maximum of 32 characters. names in libssh2 are longer than the VMS maximum of 32 characters.
@ -309,6 +309,6 @@ Building a PCSI kit
------------------- -------------------
When you have built the shared library and the help library, When you have built the shared library and the help library,
you can build a PCSI kit by issueing this command: you can build a PCSI kit by issuing this command:
@libssh2_make_kit.dcl @libssh2_make_kit.dcl