=================================================================== RCS file: /cvsrepo/anoncvs/cvs/src/usr.bin/ssh/Attic/auth1.c,v retrieving revision 1.8 retrieving revision 1.9 diff -u -r1.8 -r1.9 --- src/usr.bin/ssh/Attic/auth1.c 2000/12/19 23:17:55 1.8 +++ src/usr.bin/ssh/Attic/auth1.c 2000/12/27 12:34:49 1.9 @@ -10,7 +10,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: auth1.c,v 1.8 2000/12/19 23:17:55 markus Exp $"); +RCSID("$OpenBSD: auth1.c,v 1.9 2000/12/27 12:34:49 markus Exp $"); #include "xmalloc.h" #include "rsa.h" @@ -58,7 +58,7 @@ /* * read packets and try to authenticate local user 'luser'. - * return if authentication is successfull. not that pw == NULL + * return if authentication is successful. not that pw == NULL * if the user does not exists or is not allowed to login. * each auth method has to 'fake' authentication for nonexisting * users. @@ -404,11 +404,11 @@ } else { /* Loop until the user has been authenticated or the connection is closed, do_authloop() returns only if - authentication is successfull */ + authentication is successful */ do_authloop(pw, user); } if (pw == NULL) - fatal("internal error, authentication successfull for user '%.100s'", user); + fatal("internal error, authentication successful for user '%.100s'", user); /* The user has been authenticated and accepted. */ packet_start(SSH_SMSG_SUCCESS);