@@ -107,7 +107,7 @@ struct WOLFSSHD_AUTH {
107107#endif
108108
109109#if 0
110- /* this could potentially be useful in a deeply embeded future port */
110+ /* this could potentially be useful in a deeply embedded future port */
111111
112112/* Map user names to passwords */
113113/* Use arrays for username and p. The password or public key can
@@ -397,7 +397,7 @@ static int CheckPasswordUnix(const char* usr, const byte* pw, word32 pwSz, WOLFS
397397 wolfSSH_Log (WS_LOG_ERROR ,
398398 "[SSHD] Error getting user password info" );
399399 wolfSSH_Log (WS_LOG_ERROR ,
400- "[SSHD] Possibly permisions level error?"
400+ "[SSHD] Possibly permissions level error?"
401401 " i.e SSHD not ran as sudo" );
402402 ret = WS_FATAL_ERROR ;
403403 }
@@ -1049,7 +1049,7 @@ static int DoCheckUser(const char* usr, WOLFSSHD_AUTH* auth)
10491049
10501050 if (wolfSSHD_ConfigGetPermitRoot (auth -> conf ) == 0 ) {
10511051 if (XSTRCMP (usr , "root" ) == 0 ) {
1052- wolfSSH_Log (WS_LOG_ERROR , "[SSHD] Login as root not permited " );
1052+ wolfSSH_Log (WS_LOG_ERROR , "[SSHD] Login as root not permitted " );
10531053 ret = WOLFSSH_USERAUTH_REJECTED ;
10541054 }
10551055 }
@@ -1075,7 +1075,7 @@ static int DoCheckUser(const char* usr, WOLFSSHD_AUTH* auth)
10751075
10761076
10771077/* @TODO this will take in a pipe or equivalent to talk to a privileged thread
1078- * rathar than having WOLFSSHD_AUTH directly with privilege separation */
1078+ * rather than having WOLFSSHD_AUTH directly with privilege separation */
10791079static int RequestAuthentication (WS_UserAuthData * authData ,
10801080 WOLFSSHD_AUTH * authCtx )
10811081{
@@ -1423,7 +1423,7 @@ static int SetDefualtUserID(WOLFSSHD_AUTH* auth)
14231423
14241424
14251425/* Sets the default functions to be used for authentication of peer.
1426- * Later the default functions could be overriden if needed.
1426+ * Later the default functions could be overridden if needed.
14271427 * returns a newly created WOLFSSHD_AUTH struct success */
14281428WOLFSSHD_AUTH * wolfSSHD_AuthCreateUser (void * heap , const WOLFSSHD_CONFIG * conf )
14291429{
@@ -1501,12 +1501,12 @@ int wolfSSHD_AuthRaisePermissions(WOLFSSHD_AUTH* auth)
15011501#ifndef WIN32
15021502 if (auth ) {
15031503 if (setegid (auth -> sGid ) != 0 ) {
1504- wolfSSH_Log (WS_LOG_ERROR , "[SSHD] Error rasing gid" );
1504+ wolfSSH_Log (WS_LOG_ERROR , "[SSHD] Error raising gid" );
15051505 ret = WS_FATAL_ERROR ;
15061506 }
15071507
15081508 if (seteuid (auth -> sUid ) != 0 ) {
1509- wolfSSH_Log (WS_LOG_ERROR , "[SSHD] Error rasing uid" );
1509+ wolfSSH_Log (WS_LOG_ERROR , "[SSHD] Error raising uid" );
15101510 ret = WS_FATAL_ERROR ;
15111511 }
15121512 }
0 commit comments