1
0
mirror of https://github.com/libssh2/libssh2.git synced 2025-08-07 08:02:56 +03:00

Spelling corrections (#380)

Files : 
libssh2.h, libssh2_sftp.h, bcrypt_pbkdf.c, mbedtls.c, sftp.c, ssh2.c

Notes :
* Fixed misspellings

Credit :
Pedro Monreal
This commit is contained in:
Pedro Monreal
2019-07-01 19:00:09 +02:00
committed by Will Cosgrove
parent fd8b28658d
commit f4663f9f12
6 changed files with 11 additions and 11 deletions

View File

@@ -545,7 +545,7 @@ LIBSSH2_API void libssh2_free(LIBSSH2_SESSION *session, void *ptr);
* *
* Fills algs with a list of supported acryptographic algorithms. Returns a * Fills algs with a list of supported acryptographic algorithms. Returns a
* non-negative number (number of supported algorithms) on success or a * non-negative number (number of supported algorithms) on success or a
* negative number (an eror code) on failure. * negative number (an error code) on failure.
* *
* NOTE: on success, algs must be deallocated (by calling libssh2_free) when * NOTE: on success, algs must be deallocated (by calling libssh2_free) when
* not needed anymore * not needed anymore
@@ -688,7 +688,7 @@ libssh2_userauth_publickey_frommemory(LIBSSH2_SESSION *session,
* response_callback is provided with filled by library prompts array, * response_callback is provided with filled by library prompts array,
* but client must allocate and fill individual responses. Responses * but client must allocate and fill individual responses. Responses
* array is already allocated. Responses data will be freed by libssh2 * array is already allocated. Responses data will be freed by libssh2
* after callback return, but before subsequent callback invokation. * after callback return, but before subsequent callback invocation.
*/ */
LIBSSH2_API int LIBSSH2_API int
libssh2_userauth_keyboard_interactive_ex(LIBSSH2_SESSION* session, libssh2_userauth_keyboard_interactive_ex(LIBSSH2_SESSION* session,
@@ -718,7 +718,7 @@ LIBSSH2_API int libssh2_poll(LIBSSH2_POLLFD *fds, unsigned int nfds,
#define SSH_EXTENDED_DATA_STDERR 1 #define SSH_EXTENDED_DATA_STDERR 1
/* Returned by any function that would block during a read/write opperation */ /* Returned by any function that would block during a read/write operation */
#define LIBSSH2CHANNEL_EAGAIN LIBSSH2_ERROR_EAGAIN #define LIBSSH2CHANNEL_EAGAIN LIBSSH2_ERROR_EAGAIN
LIBSSH2_API LIBSSH2_CHANNEL * LIBSSH2_API LIBSSH2_CHANNEL *
@@ -1165,7 +1165,7 @@ libssh2_knownhost_writefile(LIBSSH2_KNOWNHOSTS *hosts,
* libssh2_knownhost_get() * libssh2_knownhost_get()
* *
* Traverse the internal list of known hosts. Pass NULL to 'prev' to get * Traverse the internal list of known hosts. Pass NULL to 'prev' to get
* the first one. Or pass a poiner to the previously returned one to get the * the first one. Or pass a pointer to the previously returned one to get the
* next. * next.
* *
* Returns: * Returns:
@@ -1221,7 +1221,7 @@ libssh2_agent_list_identities(LIBSSH2_AGENT *agent);
* libssh2_agent_get_identity() * libssh2_agent_get_identity()
* *
* Traverse the internal list of public keys. Pass NULL to 'prev' to get * Traverse the internal list of public keys. Pass NULL to 'prev' to get
* the first one. Or pass a poiner to the previously returned one to get the * the first one. Or pass a pointer to the previously returned one to get the
* next. * next.
* *
* Returns: * Returns:

View File

@@ -214,7 +214,7 @@ struct _LIBSSH2_SFTP_STATVFS {
#define LIBSSH2_FX_INVALID_FILENAME 20 #define LIBSSH2_FX_INVALID_FILENAME 20
#define LIBSSH2_FX_LINK_LOOP 21 #define LIBSSH2_FX_LINK_LOOP 21
/* Returned by any function that would block during a read/write opperation */ /* Returned by any function that would block during a read/write operation */
#define LIBSSH2SFTP_EAGAIN LIBSSH2_ERROR_EAGAIN #define LIBSSH2SFTP_EAGAIN LIBSSH2_ERROR_EAGAIN
/* SFTP API */ /* SFTP API */

View File

@@ -36,7 +36,7 @@
* function with the following modifications: * function with the following modifications:
* 1. The input password and salt are preprocessed with SHA512. * 1. The input password and salt are preprocessed with SHA512.
* 2. The output length is expanded to 256 bits. * 2. The output length is expanded to 256 bits.
* 3. Subsequently the magic string to be encrypted is lengthened and modifed * 3. Subsequently the magic string to be encrypted is lengthened and modified
* to "OxychromaticBlowfishSwatDynamite" * to "OxychromaticBlowfishSwatDynamite"
* 4. The hash function is defined to perform 64 rounds of initial state * 4. The hash function is defined to perform 64 rounds of initial state
* expansion. (More rounds are performed by iterating the hash.) * expansion. (More rounds are performed by iterating the hash.)
@@ -158,7 +158,7 @@ bcrypt_pbkdf(const char *pass, size_t passlen, const uint8_t *salt,
} }
/* /*
* pbkdf2 deviation: ouput the key material non-linearly. * pbkdf2 deviation: output the key material non-linearly.
*/ */
amt = MINIMUM(amt, keylen); amt = MINIMUM(amt, keylen);
for(i = 0; i < amt; i++) { for(i = 0; i < amt; i++) {

View File

@@ -272,7 +272,7 @@ _libssh2_mbedtls_bignum_random(_libssh2_bn *bn, int bits, int top, int bottom)
if(err) if(err)
return -1; return -1;
/* Zero unsued bits above the most significant bit*/ /* Zero unused bits above the most significant bit*/
for(i = len*8 - 1; bits <= i; --i) { for(i = len*8 - 1; bits <= i; --i) {
err = mbedtls_mpi_set_bit(bn, i, 0); err = mbedtls_mpi_set_bit(bn, i, 0);
if(err) if(err)

View File

@@ -1428,7 +1428,7 @@ static ssize_t sftp_read(LIBSSH2_SFTP_HANDLE * handle, char *buffer,
/* 'count' is how much more data to ask for, and 'already' is how /* 'count' is how much more data to ask for, and 'already' is how
much data that already has been asked for but not yet returned. much data that already has been asked for but not yet returned.
Specificly, 'count' means how much data that have or will be Specifically, 'count' means how much data that have or will be
asked for by the nodes that are already added to the linked asked for by the nodes that are already added to the linked
list. Some of those read requests may not actually have been list. Some of those read requests may not actually have been
sent off successfully yet. sent off successfully yet.

View File

@@ -92,7 +92,7 @@ int main(int argc, char *argv[])
return 1; return 1;
} }
/* At this point we havn't authenticated, /* At this point we haven't authenticated,
* The first thing to do is check the hostkey's fingerprint against our known hosts * The first thing to do is check the hostkey's fingerprint against our known hosts
* Your app may have it hard coded, may go to a file, may present it to the user, that's your call * Your app may have it hard coded, may go to a file, may present it to the user, that's your call
*/ */