summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>2002-05-22 11:02:15 +1000
committerDamien Miller <djm@mindrot.org>2002-05-22 11:02:15 +1000
commit74cc5bb8511428b5c1cda3138fca355bfed3b96d (patch)
treeef31b4f8538352f1f7b9e3dff12b400d210dc319
parentbc5bb55755aba69746d22cb9c79873e76e34f0bc (diff)
fix spelling mistakes spotted by Solar Designer <solar@openwall.com>
-rw-r--r--ChangeLog6
-rw-r--r--README.privsep4
-rw-r--r--configure.ac4
3 files changed, 9 insertions, 5 deletions
diff --git a/ChangeLog b/ChangeLog
index dbd131181..2f348d398 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,7 @@
120020522
2 - (djm) Fix spelling mistakes, spotted by Solar Designer i
3 <solar@openwall.com>
4
120020521 520020521
2 - (stevesk) [sshd.c] bug 245; disable setsid() for now 6 - (stevesk) [sshd.c] bug 245; disable setsid() for now
3 - (stevesk) [sshd.c] #ifndef HAVE_CYGWIN for setgroups() 7 - (stevesk) [sshd.c] #ifndef HAVE_CYGWIN for setgroups()
@@ -660,4 +664,4 @@
660 - (stevesk) entropy.c: typo in debug message 664 - (stevesk) entropy.c: typo in debug message
661 - (djm) ssh-keygen -i needs seeded RNG; report from markus@ 665 - (djm) ssh-keygen -i needs seeded RNG; report from markus@
662 666
663$Id: ChangeLog,v 1.2137 2002/05/21 17:59:14 stevesk Exp $ 667$Id: ChangeLog,v 1.2138 2002/05/22 01:02:15 djm Exp $
diff --git a/README.privsep b/README.privsep
index b1aadd26a..89b9d0457 100644
--- a/README.privsep
+++ b/README.privsep
@@ -28,7 +28,7 @@ If you are on UnixWare 7 or OpenUNIX 8 do this additional step.
28configure supports the following options to change the default 28configure supports the following options to change the default
29privsep user and chroot directory: 29privsep user and chroot directory:
30 30
31 --with-privsep-path=xxx Path for privilege seperation chroot 31 --with-privsep-path=xxx Path for privilege separation chroot
32 --with-privsep-user=user Specify non-privileged user for privilege separation 32 --with-privsep-user=user Specify non-privileged user for privilege separation
33 33
34Privsep requires operating system support for file descriptor passing 34Privsep requires operating system support for file descriptor passing
@@ -54,4 +54,4 @@ process 1005 is the sshd process listening for new connections.
54process 6917 is the privileged monitor process, 6919 is the user owned 54process 6917 is the privileged monitor process, 6919 is the user owned
55sshd process and 6921 is the shell process. 55sshd process and 6921 is the shell process.
56 56
57$Id: README.privsep,v 1.4 2002/05/14 03:50:38 tim Exp $ 57$Id: README.privsep,v 1.5 2002/05/22 01:02:15 djm Exp $
diff --git a/configure.ac b/configure.ac
index 4370f9273..df78b789d 100644
--- a/configure.ac
+++ b/configure.ac
@@ -1,4 +1,4 @@
1# $Id: configure.ac,v 1.62 2002/05/17 15:59:23 tim Exp $ 1# $Id: configure.ac,v 1.63 2002/05/22 01:02:15 djm Exp $
2 2
3AC_INIT 3AC_INIT
4AC_CONFIG_SRCDIR([ssh.c]) 4AC_CONFIG_SRCDIR([ssh.c])
@@ -1794,7 +1794,7 @@ AC_ARG_WITH(rsh,
1794 1794
1795PRIVSEP_PATH=/var/empty 1795PRIVSEP_PATH=/var/empty
1796AC_ARG_WITH(privsep-path, 1796AC_ARG_WITH(privsep-path,
1797 [ --with-privsep-path=xxx Path for privilege seperation chroot ], 1797 [ --with-privsep-path=xxx Path for privilege separation chroot ],
1798 [ 1798 [
1799 if test "x$withval" != "$no" ; then 1799 if test "x$withval" != "$no" ; then
1800 PRIVSEP_PATH=$withval 1800 PRIVSEP_PATH=$withval