diff --git a/svr-runopts.c b/svr-runopts.c
index 9fbacf77b4a9fb3e5bb6cac022de77345a6452f0..414cb45e0a84edf3df0419c1f1502d76fe7db876 100644
--- a/svr-runopts.c
+++ b/svr-runopts.c
@@ -475,8 +475,7 @@ void load_all_hostkeys() {
 #endif
 
 #ifdef DROPBEAR_DELAY_HOSTKEY
-	if (svr_opts.delay_hostkey)
-	{
+	if (svr_opts.delay_hostkey) {
 		disable_unset_keys = 0;
 	}
 #endif
@@ -484,19 +483,15 @@ void load_all_hostkeys() {
 #ifdef DROPBEAR_RSA
 	if (disable_unset_keys && !svr_opts.hostkey->rsakey) {
 		disablekey(DROPBEAR_SIGNKEY_RSA);
-	}
-	else
-	{
+	} else {
 		any_keys = 1;
 	}
 #endif
 
 #ifdef DROPBEAR_DSS
 	if (disable_unset_keys && !svr_opts.hostkey->dsskey) {
-		disablekey(DROPBEAR_SIGNKEY_RSA);
-	}
-	else
-	{
+		disablekey(DROPBEAR_SIGNKEY_DSS);
+	} else {
 		any_keys = 1;
 	}
 #endif
@@ -507,9 +502,7 @@ void load_all_hostkeys() {
 	if ((disable_unset_keys || ECDSA_DEFAULT_SIZE != 256)
 		&& !svr_opts.hostkey->ecckey256) {
 		disablekey(DROPBEAR_SIGNKEY_ECDSA_NISTP256);
-	}
-	else
-	{
+	} else {
 		any_keys = 1;
 	}
 #endif
@@ -518,9 +511,7 @@ void load_all_hostkeys() {
 	if ((disable_unset_keys || ECDSA_DEFAULT_SIZE != 384)
 		&& !svr_opts.hostkey->ecckey384) {
 		disablekey(DROPBEAR_SIGNKEY_ECDSA_NISTP384);
-	}
-	else
-	{
+	} else {
 		any_keys = 1;
 	}
 #endif
@@ -529,17 +520,13 @@ void load_all_hostkeys() {
 	if ((disable_unset_keys || ECDSA_DEFAULT_SIZE != 521)
 		&& !svr_opts.hostkey->ecckey521) {
 		disablekey(DROPBEAR_SIGNKEY_ECDSA_NISTP521);
-	}
-	else
-	{
+	} else {
 		any_keys = 1;
 	}
 #endif
 #endif /* DROPBEAR_ECDSA */
 
-	if (!any_keys)
-	{
+	if (!any_keys) {
 		dropbear_exit("No hostkeys available");
 	}
-
 }
diff --git a/svr-session.c b/svr-session.c
index 2852f296500535a63915dfe661a40bf1dabf6ee7..e9fde24b78db29a5389d86779ffbd2aa03b231b1 100644
--- a/svr-session.c
+++ b/svr-session.c
@@ -142,7 +142,7 @@ void svr_dropbear_exit(int exitcode, const char* format, va_list param) {
 	if (!sessinitdone) {
 		/* before session init */
 		snprintf(fmtbuf, sizeof(fmtbuf), 
-				"Premature exit: %s", format);
+				"Early exit: %s", format);
 	} else if (ses.authstate.authdone) {
 		/* user has authenticated */
 		snprintf(fmtbuf, sizeof(fmtbuf),