Commit e3ad0e2b authored by Niels Möller's avatar Niels Möller

Fixed spelling of "receive".

Rev: doc/HACKING:1.6
Rev: doc/TODO:1.19
Rev: src/client_keyexchange.c:1.20
Rev: src/client_userauth.c:1.9
Rev: src/debug.c:1.20
Rev: src/keyexchange.c:1.31
Rev: src/keyexchange.h:1.28
Rev: src/lsh_types.h:1.25
Rev: src/publickey_crypto.h:1.14
Rev: src/read_data.c:1.15
Rev: src/read_line.c:1.16
Rev: src/read_packet.c:1.28
Rev: src/server_keyexchange.c:1.19
Rev: src/werror.c:1.16
Rev: src/werror.h:1.12
parent 99b15c0b
......@@ -63,7 +63,7 @@ abstract_io.h.x.
abstract_write is the interface structure common to all write
handlers, and abstract_write_pipe is a generic subclass used for
piping write handlers together. One specific kind of write handler is
the unpad handler, which removes padding from recieved packets, and
the unpad handler, which removes padding from received packets, and
sends them on. This object is implemented in unpad.c, and it does not
have any private data beyond the abstract_write_pipe structure above.
The write method implementation of this type looks as follows:
......
......@@ -84,7 +84,7 @@ instance, a writing to a file associated with a channel may fail. In
that case, the channel should be closed, but the connection should not
die. Handle the LSH_CHANNEL_FINISHED code properly.
Fix the flow control (it's broken on the recieving end).
Fix the flow control (it's broken on the receiving end).
CHANNEL CLOSE
......@@ -92,7 +92,7 @@ CHANNEL CLOSE
Channels may need some live-ness status. For instance, a remote
process may close its stdout and stderr, but still keep on running. In
this case, the local process should close it's stdout and stderr, but
not close the channel until it has recieved a close message and
not close the channel until it has received a close message and
possibly an exit status.
The server's close message should somehow be delayed until the dead
......@@ -102,7 +102,7 @@ initiate CHANNEL_CLOSE when all of the following conditions are true:
× The process is dead (and its exit status has been send to the
client).
x EOF has been detected on both stdout and stderr.
× An EOF message has been recieved from the client.
× An EOF message has been received from the client.
The client may want to respond to the exit-status message with an
CHANNEL_EOF message, unless it wants to talk to any forked children
......
......@@ -89,7 +89,7 @@ static int do_handle_dh_reply(struct packet_handler *c,
return disconnect_kex_failed(connection, "Invalid server signature\r\n");
/* Key exchange successful! Send a newkeys message, and install a
* handler for recieving the newkeys message. */
* handler for receiving the newkeys message. */
res = A_WRITE(connection->write, ssh_format("%c", SSH_MSG_NEWKEYS));
if (LSH_CLOSEDP(res))
......
......@@ -175,7 +175,7 @@ static int do_userauth_failure(struct packet_handler *c,
if (partial_success)
{ /* Doesn't help us */
werror("Recieved SSH_MSH_USERAUTH_FAILURE "
werror("Received SSH_MSH_USERAUTH_FAILURE "
"indicating partial success.\n");
KILL(methods);
......
......@@ -47,7 +47,7 @@ static int do_debug(struct abstract_write *w,
{
CAST(packet_debug, closure, w);
debug("DEBUG: recieved packet");
debug("DEBUG: received packet");
debug_hex(packet->length, packet->data);
debug("\n");
......@@ -117,13 +117,13 @@ static int do_rec_debug(struct packet_handler *self,
if (always_display)
{
werror("Recieved debug: ");
werror("Received debug: ");
werror_utf8(length, msg);
werror("\n");
}
else
{
verbose("Recieved debug: ");
verbose("Received debug: ");
verbose_utf8(length, msg);
verbose("\n");
}
......
......@@ -597,7 +597,7 @@ static int do_install(struct install_keys *c,
return 0;
}
/* Keys for recieving */
/* Keys for receiving */
connection->dispatch[SSH_MSG_NEWKEYS] = make_newkeys_handler
(rec,
kex_make_mac(secret, closure->algorithms,
......
......@@ -49,10 +49,10 @@
#define KEX_STATE_IGNORE 1
/* Key exchange is in progress. Neither KEX_INIT or NEWKEYS messages
* can be recieved */
* can be received */
#define KEX_STATE_IN_PROGRESS 2
/* Key exchange is finished. A NEWKEYS message should be recieved, and
/* Key exchange is finished. A NEWKEYS message should be received, and
* nothing else. */
#define KEX_STATE_NEWKEYS 3
......
......@@ -207,7 +207,7 @@ struct callback
* channels are closed. */
#define LSH_CHANNEL_PENDING_CLOSE 0x80
/* Indicates that a channel is ready to recieve remote data */
/* Indicates that a channel is ready to receive remote data */
#define LSH_CHANNEL_READY_REC 0x100
/* Indicates that a channel is ready to send data to the remote end. */
......
......@@ -104,7 +104,7 @@ struct group *make_zn(mpz_t p);
/* Creates client message */
struct lsh_string *dh_make_client_msg(struct diffie_hellman_instance *self);
/* Recieves client message */
/* Receives client message */
int dh_process_client_msg(struct diffie_hellman_instance *self,
struct lsh_string *packet);
......
......@@ -59,7 +59,7 @@ static int do_read_data(struct read_handler **h,
assert(closure->channel->sources);
if (closure->channel->flags &
(CHANNEL_RECIEVED_CLOSE | CHANNEL_SENT_CLOSE | CHANNEL_SENT_EOF))
(CHANNEL_RECEIVED_CLOSE | CHANNEL_SENT_CLOSE | CHANNEL_SENT_EOF))
return LSH_FAIL | LSH_DIE;
to_read = MIN(closure->channel->send_max_packet,
......
......@@ -96,7 +96,7 @@ static int do_read_line(struct read_handler **h,
closure->pos += n;
/* Loop over all recieved lines */
/* Loop over all received lines */
while ( (eol = memchr(closure->buffer, '\n', closure->pos) ))
{
......@@ -158,7 +158,7 @@ static int do_read_line(struct read_handler **h,
/* Partial line */
if (closure->pos == MAX_LINE)
{
werror("Recieved too long a line\n");
werror("Received too long a line\n");
return LSH_FAIL | LSH_DIE;
}
return LSH_OK | LSH_GOON;
......
......@@ -61,7 +61,7 @@
(crypt_pos simple "UINT8 *")
; Must point to an area large enough to hold a mac
(recieved_mac string)
(received_mac string)
(handler object abstract_write)
(connection object ssh_connection)))
......@@ -104,8 +104,8 @@ static int do_read_packet(struct read_handler **h,
closure->buffer = lsh_string_realloc(closure->buffer,
block_size);
if (closure->connection->rec_mac)
closure->recieved_mac = lsh_string_realloc
(closure->recieved_mac,
closure->received_mac = lsh_string_realloc
(closure->received_mac,
closure->connection->rec_mac->hash_size);
closure->pos = 0;
......@@ -150,7 +150,7 @@ static int do_read_packet(struct read_handler **h,
length = READ_UINT32(closure->buffer->data);
if (length > closure->connection->rec_max_packet)
{
werror("read_packet: Recieving too large packet.\n"
werror("read_packet: Receiving too large packet.\n"
" %d octets, limit is %d\n",
length, closure->connection->rec_max_packet);
return LSH_FAIL | LSH_DIE;
......@@ -250,7 +250,7 @@ static int do_read_packet(struct read_handler **h,
UINT8 *mac;
int n = A_READ(read, left,
closure->recieved_mac->data + closure->pos);
closure->received_mac->data + closure->pos);
switch(n)
{
......@@ -272,7 +272,7 @@ static int do_read_packet(struct read_handler **h,
HASH_DIGEST(closure->connection->rec_mac, mac);
if (!memcmp(mac,
closure->recieved_mac,
closure->received_mac,
closure->connection->rec_mac->hash_size))
/* FIXME: Free resources */
return LSH_FAIL | LSH_DIE;
......@@ -319,7 +319,7 @@ struct read_handler *make_read_packet(struct abstract_write *handler,
closure->buffer = NULL;
/* closure->crypt_pos = 0; */
closure->recieved_mac = NULL;
closure->received_mac = NULL;
return &closure->super;
}
......@@ -79,7 +79,7 @@ static int do_handle_dh_init(struct packet_handler *c,
if (LSH_CLOSEDP(res))
return res;
/* Send a newkeys message, and install a handler for recieving the
/* Send a newkeys message, and install a handler for receiving the
* newkeys message. */
res |= A_WRITE(connection->write, ssh_format("%c", SSH_MSG_NEWKEYS));
......@@ -201,7 +201,7 @@ static int do_install(struct install_keys *c,
CAST(server_install_keys, closure, c);
/* Keys for recieving */
/* Keys for receiving */
connection->dispatch[SSH_MSG_NEWKEYS] = make_newkeys_handler
(kex_make_encrypt(secret, closure->algorithms,
KEX_ENCRYPTION_CLIENT_TO_SERVER, connection),
......
......@@ -104,7 +104,7 @@ static void write_washed(UINT32 length, UINT8 *msg)
wash_char(msg[i]);
}
/* For outputting data recieved from the other end */
/* For outputting data received from the other end */
void werror_safe(UINT32 length, UINT8 *msg)
{
if (!quiet_flag)
......
......@@ -39,7 +39,7 @@ void werror(const char *format, ...) PRINTF_STYLE(1,2);
void debug(const char *format, ...) PRINTF_STYLE(1,2);
void verbose(const char *format, ...) PRINTF_STYLE(1,2);
/* For outputting data recieved from the other end */
/* For outputting data received from the other end */
void werror_safe(UINT32 length, UINT8 *msg);
void debug_safe(UINT32 length, UINT8 *msg);
void verbose_safe(UINT32 length, UINT8 *msg);
......
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment