diff options
-rw-r--r-- | Makefile.in | 2 | ||||
-rw-r--r-- | README.platform | 2 | ||||
-rw-r--r-- | TODO | 4 | ||||
-rw-r--r-- | configure.ac | 10 | ||||
-rw-r--r-- | contrib/cygwin/ssh-host-config | 2 | ||||
-rw-r--r-- | contrib/cygwin/ssh-user-config | 2 | ||||
-rw-r--r-- | contrib/solaris/README | 2 | ||||
-rw-r--r-- | contrib/suse/openssh.spec | 4 | ||||
-rw-r--r-- | monitor_wrap.c | 2 | ||||
-rw-r--r-- | openbsd-compat/bcrypt_pbkdf.c | 2 | ||||
-rw-r--r-- | openbsd-compat/bsd-cygwin_util.h | 2 | ||||
-rw-r--r-- | openbsd-compat/bsd-nextstep.h | 2 | ||||
-rw-r--r-- | openbsd-compat/bsd-snprintf.c | 2 | ||||
-rw-r--r-- | openbsd-compat/bsd-waitpid.h | 2 | ||||
-rw-r--r-- | openbsd-compat/explicit_bzero.c | 2 | ||||
-rw-r--r-- | openbsd-compat/fmt_scaled.c | 2 | ||||
-rw-r--r-- | openbsd-compat/port-uw.c | 2 | ||||
-rw-r--r-- | openbsd-compat/sha2.c | 2 | ||||
-rw-r--r-- | packet.c | 4 | ||||
-rw-r--r-- | sshd.8 | 2 |
20 files changed, 27 insertions, 27 deletions
diff --git a/Makefile.in b/Makefile.in index 04e1c8e53..8d33e533d 100644 --- a/Makefile.in +++ b/Makefile.in | |||
@@ -1,4 +1,4 @@ | |||
1 | # uncomment if you run a non bourne compatable shell. Ie. csh | 1 | # uncomment if you run a non bourne compatible shell. Ie. csh |
2 | #SHELL = @SH@ | 2 | #SHELL = @SH@ |
3 | 3 | ||
4 | AUTORECONF=autoreconf | 4 | AUTORECONF=autoreconf |
diff --git a/README.platform b/README.platform index c7be95fb6..9210e07c8 100644 --- a/README.platform +++ b/README.platform | |||
@@ -80,7 +80,7 @@ added to /etc/security/audit_event: | |||
80 | 32800:AUE_openssh:OpenSSH login:lo | 80 | 32800:AUE_openssh:OpenSSH login:lo |
81 | 81 | ||
82 | The BSM audit event range available for third party TCB applications is | 82 | The BSM audit event range available for third party TCB applications is |
83 | 32768 - 65535. Event number 32800 has been choosen for AUE_openssh. | 83 | 32768 - 65535. Event number 32800 has been chosen for AUE_openssh. |
84 | There is no official registry of 3rd party event numbers, so if this | 84 | There is no official registry of 3rd party event numbers, so if this |
85 | number is already in use on your system, you may change it at build time | 85 | number is already in use on your system, you may change it at build time |
86 | by configure'ing --with-cflags=-DAUE_openssh=32801 then rebuilding. | 86 | by configure'ing --with-cflags=-DAUE_openssh=32801 then rebuilding. |
@@ -57,10 +57,10 @@ Clean up configure/makefiles: | |||
57 | - Replace the whole u_intXX_t evilness in acconfig.h with something better??? | 57 | - Replace the whole u_intXX_t evilness in acconfig.h with something better??? |
58 | - Do it in configure.ac | 58 | - Do it in configure.ac |
59 | 59 | ||
60 | - Consider splitting the u_intXX_t test for sys/bitype.h into seperate test | 60 | - Consider splitting the u_intXX_t test for sys/bitype.h into separate test |
61 | to allow people to (right/wrongfully) link against Bind directly. | 61 | to allow people to (right/wrongfully) link against Bind directly. |
62 | 62 | ||
63 | - Consider splitting configure.ac into seperate files which do logically | 63 | - Consider splitting configure.ac into separate files which do logically |
64 | similar tests. E.g move all the type detection stuff into one file, | 64 | similar tests. E.g move all the type detection stuff into one file, |
65 | entropy related stuff into another. | 65 | entropy related stuff into another. |
66 | 66 | ||
diff --git a/configure.ac b/configure.ac index 663062bef..1e9f7412c 100644 --- a/configure.ac +++ b/configure.ac | |||
@@ -274,7 +274,7 @@ typedef void foo(const char *, ...) __attribute__((format(printf, 1, 2)));]], | |||
274 | [ AC_MSG_RESULT([yes]) ], | 274 | [ AC_MSG_RESULT([yes]) ], |
275 | [ AC_MSG_RESULT([no]) | 275 | [ AC_MSG_RESULT([no]) |
276 | AC_DEFINE(NO_ATTRIBUTE_ON_PROTOTYPE_ARGS, 1, | 276 | AC_DEFINE(NO_ATTRIBUTE_ON_PROTOTYPE_ARGS, 1, |
277 | [compiler does not accept __attribute__ on protoype args]) ] | 277 | [compiler does not accept __attribute__ on prototype args]) ] |
278 | ) | 278 | ) |
279 | 279 | ||
280 | if test "x$no_attrib_nonnull" != "x1" ; then | 280 | if test "x$no_attrib_nonnull" != "x1" ; then |
@@ -514,7 +514,7 @@ case "$host" in | |||
514 | # Some versions of VAC won't allow macro redefinitions at | 514 | # Some versions of VAC won't allow macro redefinitions at |
515 | # -qlanglevel=ansi, and autoconf 2.60 sometimes insists on using that | 515 | # -qlanglevel=ansi, and autoconf 2.60 sometimes insists on using that |
516 | # particularly with older versions of vac or xlc. | 516 | # particularly with older versions of vac or xlc. |
517 | # It also throws errors about null macro argments, but these are | 517 | # It also throws errors about null macro arguments, but these are |
518 | # not fatal. | 518 | # not fatal. |
519 | AC_MSG_CHECKING([if compiler allows macro redefinitions]) | 519 | AC_MSG_CHECKING([if compiler allows macro redefinitions]) |
520 | AC_COMPILE_IFELSE( | 520 | AC_COMPILE_IFELSE( |
@@ -753,7 +753,7 @@ main() { if (NSVersionOfRunTimeLibrary("System") >= (60 << 16)) | |||
753 | PATH="$PATH:/usr/etc" | 753 | PATH="$PATH:/usr/etc" |
754 | AC_DEFINE([WITH_IRIX_ARRAY], [1], | 754 | AC_DEFINE([WITH_IRIX_ARRAY], [1], |
755 | [Define if you have/want arrays | 755 | [Define if you have/want arrays |
756 | (cluster-wide session managment, not C arrays)]) | 756 | (cluster-wide session management, not C arrays)]) |
757 | AC_DEFINE([WITH_IRIX_PROJECT], [1], | 757 | AC_DEFINE([WITH_IRIX_PROJECT], [1], |
758 | [Define if you want IRIX project management]) | 758 | [Define if you want IRIX project management]) |
759 | AC_DEFINE([WITH_IRIX_AUDIT], [1], | 759 | AC_DEFINE([WITH_IRIX_AUDIT], [1], |
@@ -3005,7 +3005,7 @@ LIBS="$saved_LIBS" | |||
3005 | 3005 | ||
3006 | ### Configure cryptographic random number support | 3006 | ### Configure cryptographic random number support |
3007 | 3007 | ||
3008 | # Check wheter OpenSSL seeds itself | 3008 | # Check whether OpenSSL seeds itself |
3009 | if test "x$openssl" = "xyes" ; then | 3009 | if test "x$openssl" = "xyes" ; then |
3010 | AC_MSG_CHECKING([whether OpenSSL's PRNG is internally seeded]) | 3010 | AC_MSG_CHECKING([whether OpenSSL's PRNG is internally seeded]) |
3011 | AC_RUN_IFELSE( | 3011 | AC_RUN_IFELSE( |
@@ -3904,7 +3904,7 @@ fi | |||
3904 | 3904 | ||
3905 | AC_CHECK_TYPES([struct timespec]) | 3905 | AC_CHECK_TYPES([struct timespec]) |
3906 | 3906 | ||
3907 | # We need int64_t or else certian parts of the compile will fail. | 3907 | # We need int64_t or else certain parts of the compile will fail. |
3908 | if test "x$ac_cv_have_int64_t" = "xno" && \ | 3908 | if test "x$ac_cv_have_int64_t" = "xno" && \ |
3909 | test "x$ac_cv_sizeof_long_int" != "x8" && \ | 3909 | test "x$ac_cv_sizeof_long_int" != "x8" && \ |
3910 | test "x$ac_cv_sizeof_long_long_int" = "x0" ; then | 3910 | test "x$ac_cv_sizeof_long_long_int" = "x0" ; then |
diff --git a/contrib/cygwin/ssh-host-config b/contrib/cygwin/ssh-host-config index db6aaa08a..261020af3 100644 --- a/contrib/cygwin/ssh-host-config +++ b/contrib/cygwin/ssh-host-config | |||
@@ -22,7 +22,7 @@ | |||
22 | 22 | ||
23 | CSIH_SCRIPT=/usr/share/csih/cygwin-service-installation-helper.sh | 23 | CSIH_SCRIPT=/usr/share/csih/cygwin-service-installation-helper.sh |
24 | 24 | ||
25 | # List of apps used. This is checkad for existance in csih_sanity_check | 25 | # List of apps used. This is checkad for existence in csih_sanity_check |
26 | # Don't use *any* transient commands before sourcing the csih helper script, | 26 | # Don't use *any* transient commands before sourcing the csih helper script, |
27 | # otherwise the sanity checks are short-circuited. | 27 | # otherwise the sanity checks are short-circuited. |
28 | declare -a csih_required_commands=( | 28 | declare -a csih_required_commands=( |
diff --git a/contrib/cygwin/ssh-user-config b/contrib/cygwin/ssh-user-config index 33dc0cbea..6fa4bb3ea 100644 --- a/contrib/cygwin/ssh-user-config +++ b/contrib/cygwin/ssh-user-config | |||
@@ -127,7 +127,7 @@ readonly -f check_user_homedir | |||
127 | check_user_dot_ssh_dir() { | 127 | check_user_dot_ssh_dir() { |
128 | if [ -e "${pwdhome}/.ssh" -a ! -d "${pwdhome}/.ssh" ] | 128 | if [ -e "${pwdhome}/.ssh" -a ! -d "${pwdhome}/.ssh" ] |
129 | then | 129 | then |
130 | csih_error "${pwdhome}/.ssh is existant but not a directory. Cannot create user identity files." | 130 | csih_error "${pwdhome}/.ssh is existent but not a directory. Cannot create user identity files." |
131 | fi | 131 | fi |
132 | 132 | ||
133 | if [ ! -e "${pwdhome}/.ssh" ] | 133 | if [ ! -e "${pwdhome}/.ssh" ] |
diff --git a/contrib/solaris/README b/contrib/solaris/README index fefdd4b53..cabecaa1a 100644 --- a/contrib/solaris/README +++ b/contrib/solaris/README | |||
@@ -5,7 +5,7 @@ SVR4 style package tools. | |||
5 | 5 | ||
6 | The build process is called a 'dummy install'.. Which means the software does | 6 | The build process is called a 'dummy install'.. Which means the software does |
7 | a "make install-nokeys DESTDIR=[fakeroot]". This way all manpages should | 7 | a "make install-nokeys DESTDIR=[fakeroot]". This way all manpages should |
8 | be handled correctly and key are defered until the first time the sshd | 8 | be handled correctly and key are deferred until the first time the sshd |
9 | is started. | 9 | is started. |
10 | 10 | ||
11 | Directions: | 11 | Directions: |
diff --git a/contrib/suse/openssh.spec b/contrib/suse/openssh.spec index d9c4298f1..be07bd5f8 100644 --- a/contrib/suse/openssh.spec +++ b/contrib/suse/openssh.spec | |||
@@ -56,7 +56,7 @@ arbitrary TCP/IP ports can also be forwarded over the secure channel. | |||
56 | 56 | ||
57 | OpenSSH is OpenBSD's rework of the last free version of SSH, bringing it | 57 | OpenSSH is OpenBSD's rework of the last free version of SSH, bringing it |
58 | up to date in terms of security and features, as well as removing all | 58 | up to date in terms of security and features, as well as removing all |
59 | patented algorithms to seperate libraries (OpenSSL). | 59 | patented algorithms to separate libraries (OpenSSL). |
60 | 60 | ||
61 | This package includes all files necessary for both the OpenSSH | 61 | This package includes all files necessary for both the OpenSSH |
62 | client and server. | 62 | client and server. |
@@ -70,7 +70,7 @@ arbitrary TCP/IP ports can also be forwarded over the secure channel. | |||
70 | 70 | ||
71 | OpenSSH is OpenBSD's rework of the last free version of SSH, bringing it | 71 | OpenSSH is OpenBSD's rework of the last free version of SSH, bringing it |
72 | up to date in terms of security and features, as well as removing all | 72 | up to date in terms of security and features, as well as removing all |
73 | patented algorithms to seperate libraries (OpenSSL). | 73 | patented algorithms to separate libraries (OpenSSL). |
74 | 74 | ||
75 | This package contains an X Window System passphrase dialog for OpenSSH. | 75 | This package contains an X Window System passphrase dialog for OpenSSH. |
76 | 76 | ||
diff --git a/monitor_wrap.c b/monitor_wrap.c index 9666bda4b..b1f489f79 100644 --- a/monitor_wrap.c +++ b/monitor_wrap.c | |||
@@ -657,7 +657,7 @@ mm_sshpam_query(void *ctx, char **name, char **info, | |||
657 | sshpam_set_maxtries_reached(buffer_get_int(&m)); | 657 | sshpam_set_maxtries_reached(buffer_get_int(&m)); |
658 | *num = buffer_get_int(&m); | 658 | *num = buffer_get_int(&m); |
659 | if (*num > PAM_MAX_NUM_MSG) | 659 | if (*num > PAM_MAX_NUM_MSG) |
660 | fatal("%s: recieved %u PAM messages, expected <= %u", | 660 | fatal("%s: received %u PAM messages, expected <= %u", |
661 | __func__, *num, PAM_MAX_NUM_MSG); | 661 | __func__, *num, PAM_MAX_NUM_MSG); |
662 | *prompts = xcalloc((*num + 1), sizeof(char *)); | 662 | *prompts = xcalloc((*num + 1), sizeof(char *)); |
663 | *echo_on = xcalloc((*num + 1), sizeof(u_int)); | 663 | *echo_on = xcalloc((*num + 1), sizeof(u_int)); |
diff --git a/openbsd-compat/bcrypt_pbkdf.c b/openbsd-compat/bcrypt_pbkdf.c index 0a07f9a0f..785234563 100644 --- a/openbsd-compat/bcrypt_pbkdf.c +++ b/openbsd-compat/bcrypt_pbkdf.c | |||
@@ -46,7 +46,7 @@ | |||
46 | * function with the following modifications: | 46 | * function with the following modifications: |
47 | * 1. The input password and salt are preprocessed with SHA512. | 47 | * 1. The input password and salt are preprocessed with SHA512. |
48 | * 2. The output length is expanded to 256 bits. | 48 | * 2. The output length is expanded to 256 bits. |
49 | * 3. Subsequently the magic string to be encrypted is lengthened and modifed | 49 | * 3. Subsequently the magic string to be encrypted is lengthened and modified |
50 | * to "OxychromaticBlowfishSwatDynamite" | 50 | * to "OxychromaticBlowfishSwatDynamite" |
51 | * 4. The hash function is defined to perform 64 rounds of initial state | 51 | * 4. The hash function is defined to perform 64 rounds of initial state |
52 | * expansion. (More rounds are performed by iterating the hash.) | 52 | * expansion. (More rounds are performed by iterating the hash.) |
diff --git a/openbsd-compat/bsd-cygwin_util.h b/openbsd-compat/bsd-cygwin_util.h index 9cef694b9..202c055db 100644 --- a/openbsd-compat/bsd-cygwin_util.h +++ b/openbsd-compat/bsd-cygwin_util.h | |||
@@ -41,7 +41,7 @@ typedef void *HANDLE; | |||
41 | #define UNLEN 256 | 41 | #define UNLEN 256 |
42 | 42 | ||
43 | /* Cygwin functions for which declarations are only available when including | 43 | /* Cygwin functions for which declarations are only available when including |
44 | windows headers, so we have to define them here explicitely. */ | 44 | windows headers, so we have to define them here explicitly. */ |
45 | extern HANDLE cygwin_logon_user (const struct passwd *, const char *); | 45 | extern HANDLE cygwin_logon_user (const struct passwd *, const char *); |
46 | extern void cygwin_set_impersonation_token (const HANDLE); | 46 | extern void cygwin_set_impersonation_token (const HANDLE); |
47 | 47 | ||
diff --git a/openbsd-compat/bsd-nextstep.h b/openbsd-compat/bsd-nextstep.h index 610f9e381..4a45b15af 100644 --- a/openbsd-compat/bsd-nextstep.h +++ b/openbsd-compat/bsd-nextstep.h | |||
@@ -36,7 +36,7 @@ | |||
36 | /* NeXT's readdir() is BSD (struct direct) not POSIX (struct dirent) */ | 36 | /* NeXT's readdir() is BSD (struct direct) not POSIX (struct dirent) */ |
37 | #define dirent direct | 37 | #define dirent direct |
38 | 38 | ||
39 | /* Swap out NeXT's BSD wait() for a more POSIX complient one */ | 39 | /* Swap out NeXT's BSD wait() for a more POSIX compliant one */ |
40 | pid_t posix_wait(int *); | 40 | pid_t posix_wait(int *); |
41 | #define wait(a) posix_wait(a) | 41 | #define wait(a) posix_wait(a) |
42 | 42 | ||
diff --git a/openbsd-compat/bsd-snprintf.c b/openbsd-compat/bsd-snprintf.c index d95b6a401..f27b9d808 100644 --- a/openbsd-compat/bsd-snprintf.c +++ b/openbsd-compat/bsd-snprintf.c | |||
@@ -30,7 +30,7 @@ | |||
30 | * probably requires libm on most operating systems. Don't yet | 30 | * probably requires libm on most operating systems. Don't yet |
31 | * support the exponent (e,E) and sigfig (g,G). Also, fmtint() | 31 | * support the exponent (e,E) and sigfig (g,G). Also, fmtint() |
32 | * was pretty badly broken, it just wasn't being exercised in ways | 32 | * was pretty badly broken, it just wasn't being exercised in ways |
33 | * which showed it, so that's been fixed. Also, formated the code | 33 | * which showed it, so that's been fixed. Also, formatted the code |
34 | * to mutt conventions, and removed dead code left over from the | 34 | * to mutt conventions, and removed dead code left over from the |
35 | * original. Also, there is now a builtin-test, just compile with: | 35 | * original. Also, there is now a builtin-test, just compile with: |
36 | * gcc -DTEST_SNPRINTF -o snprintf snprintf.c -lm | 36 | * gcc -DTEST_SNPRINTF -o snprintf snprintf.c -lm |
diff --git a/openbsd-compat/bsd-waitpid.h b/openbsd-compat/bsd-waitpid.h index 5ce3ee4b5..b551268ab 100644 --- a/openbsd-compat/bsd-waitpid.h +++ b/openbsd-compat/bsd-waitpid.h | |||
@@ -27,7 +27,7 @@ | |||
27 | #define _BSD_WAITPID_H | 27 | #define _BSD_WAITPID_H |
28 | 28 | ||
29 | #ifndef HAVE_WAITPID | 29 | #ifndef HAVE_WAITPID |
30 | /* Clean out any potental issues */ | 30 | /* Clean out any potential issues */ |
31 | #undef WIFEXITED | 31 | #undef WIFEXITED |
32 | #undef WIFSTOPPED | 32 | #undef WIFSTOPPED |
33 | #undef WIFSIGNALED | 33 | #undef WIFSIGNALED |
diff --git a/openbsd-compat/explicit_bzero.c b/openbsd-compat/explicit_bzero.c index 53a003472..6ef9825a9 100644 --- a/openbsd-compat/explicit_bzero.c +++ b/openbsd-compat/explicit_bzero.c | |||
@@ -41,7 +41,7 @@ explicit_bzero(void *p, size_t n) | |||
41 | /* | 41 | /* |
42 | * clang -fsanitize=memory needs to intercept memset-like functions | 42 | * clang -fsanitize=memory needs to intercept memset-like functions |
43 | * to correctly detect memory initialisation. Make sure one is called | 43 | * to correctly detect memory initialisation. Make sure one is called |
44 | * directly since our indirection trick above sucessfully confuses it. | 44 | * directly since our indirection trick above successfully confuses it. |
45 | */ | 45 | */ |
46 | #if defined(__has_feature) | 46 | #if defined(__has_feature) |
47 | # if __has_feature(memory_sanitizer) | 47 | # if __has_feature(memory_sanitizer) |
diff --git a/openbsd-compat/fmt_scaled.c b/openbsd-compat/fmt_scaled.c index 7c5193e26..f68f24123 100644 --- a/openbsd-compat/fmt_scaled.c +++ b/openbsd-compat/fmt_scaled.c | |||
@@ -188,7 +188,7 @@ scan_scaled(char *scaled, long long *result) | |||
188 | /* scale whole part */ | 188 | /* scale whole part */ |
189 | whole *= scale_fact; | 189 | whole *= scale_fact; |
190 | 190 | ||
191 | /* truncate fpart so it does't overflow. | 191 | /* truncate fpart so it doesn't overflow. |
192 | * then scale fractional part. | 192 | * then scale fractional part. |
193 | */ | 193 | */ |
194 | while (fpart >= LLONG_MAX / scale_fact) { | 194 | while (fpart >= LLONG_MAX / scale_fact) { |
diff --git a/openbsd-compat/port-uw.c b/openbsd-compat/port-uw.c index 014cac264..3028e429a 100644 --- a/openbsd-compat/port-uw.c +++ b/openbsd-compat/port-uw.c | |||
@@ -99,7 +99,7 @@ nischeck(char *namep) | |||
99 | 99 | ||
100 | if ((fd = fopen (password_file, "r")) == NULL) { | 100 | if ((fd = fopen (password_file, "r")) == NULL) { |
101 | /* | 101 | /* |
102 | * If the passwd file has dissapeared we are in a bad state. | 102 | * If the passwd file has disappeared we are in a bad state. |
103 | * However, returning 0 will send us back through the | 103 | * However, returning 0 will send us back through the |
104 | * authentication scheme that has checked the ia database for | 104 | * authentication scheme that has checked the ia database for |
105 | * passwords earlier. | 105 | * passwords earlier. |
diff --git a/openbsd-compat/sha2.c b/openbsd-compat/sha2.c index a22099bbe..b55ea30ac 100644 --- a/openbsd-compat/sha2.c +++ b/openbsd-compat/sha2.c | |||
@@ -72,7 +72,7 @@ | |||
72 | * Please make sure that your system defines BYTE_ORDER. If your | 72 | * Please make sure that your system defines BYTE_ORDER. If your |
73 | * architecture is little-endian, make sure it also defines | 73 | * architecture is little-endian, make sure it also defines |
74 | * LITTLE_ENDIAN and that the two (BYTE_ORDER and LITTLE_ENDIAN) are | 74 | * LITTLE_ENDIAN and that the two (BYTE_ORDER and LITTLE_ENDIAN) are |
75 | * equivilent. | 75 | * equivalent. |
76 | * | 76 | * |
77 | * If your system does not define the above, then you can do so by | 77 | * If your system does not define the above, then you can do so by |
78 | * hand like this: | 78 | * hand like this: |
@@ -597,7 +597,7 @@ ssh_packet_close_internal(struct ssh *ssh, int do_close) | |||
597 | state->newkeys[mode] = NULL; | 597 | state->newkeys[mode] = NULL; |
598 | ssh_clear_newkeys(ssh, mode); /* next keys */ | 598 | ssh_clear_newkeys(ssh, mode); /* next keys */ |
599 | } | 599 | } |
600 | /* comression state is in shared mem, so we can only release it once */ | 600 | /* compression state is in shared mem, so we can only release it once */ |
601 | if (do_close && state->compression_buffer) { | 601 | if (do_close && state->compression_buffer) { |
602 | sshbuf_free(state->compression_buffer); | 602 | sshbuf_free(state->compression_buffer); |
603 | if (state->compression_out_started) { | 603 | if (state->compression_out_started) { |
@@ -965,7 +965,7 @@ ssh_packet_need_rekeying(struct ssh *ssh, u_int outbound_packet_len) | |||
965 | state->p_read.packets > MAX_PACKETS) | 965 | state->p_read.packets > MAX_PACKETS) |
966 | return 1; | 966 | return 1; |
967 | 967 | ||
968 | /* Rekey after (cipher-specific) maxiumum blocks */ | 968 | /* Rekey after (cipher-specific) maximum blocks */ |
969 | out_blocks = ROUNDUP(outbound_packet_len, | 969 | out_blocks = ROUNDUP(outbound_packet_len, |
970 | state->newkeys[MODE_OUT]->enc.block_size); | 970 | state->newkeys[MODE_OUT]->enc.block_size); |
971 | return (state->max_blocks_out && | 971 | return (state->max_blocks_out && |
@@ -277,7 +277,7 @@ locked, listed in | |||
277 | .Cm DenyUsers | 277 | .Cm DenyUsers |
278 | or its group is listed in | 278 | or its group is listed in |
279 | .Cm DenyGroups | 279 | .Cm DenyGroups |
280 | \&. The definition of a locked account is system dependant. Some platforms | 280 | \&. The definition of a locked account is system dependent. Some platforms |
281 | have their own account database (eg AIX) and some modify the passwd field ( | 281 | have their own account database (eg AIX) and some modify the passwd field ( |
282 | .Ql \&*LK\&* | 282 | .Ql \&*LK\&* |
283 | on Solaris and UnixWare, | 283 | on Solaris and UnixWare, |