refactored to support modular credential providers, proper
CERTREQ/CERT payload exchanges and extensible authorization rules.
-- The framework of strongSwan Manager has envolved to the web application
+- The framework of strongSwan Manager has evolved to the web application
framework libfast (FastCGI Application Server w/ Templates) and is usable
by other applications.
Very basic auditing logs, (e.g. SA up/SA down)
.TP
.B 1
-Generic control flow with errors, a good default to see whats going on
+Generic control flow with errors, a good default to see what's going on
.TP
.B 2
More detailed debugging control flow
}
/* Only fchown() the pidfile if we have CAP_CHOWN. Otherwise,
* directory permissions should allow pidfile to be accessed
- * by the UID/GID under which the charon deamon will run. */
+ * by the UID/GID under which the charon daemon will run. */
if (lib->caps->check(lib->caps, CAP_CHOWN))
{
ignore_result(fchown(fd,
/**
* Forward RADIUS attributes from a RADIUS response to IKE notifies.
*
- * @param response RADIUS respose to read notifies from
+ * @param response RADIUS response to read notifies from
*/
void eap_radius_forward_to_ike(radius_message_t *response);
/**
* EAP RADIUS proxy plugin.
*
- * This plugin provides not a single EAP method, but a proxy to forwared
+ * This plugin provides not a single EAP method, but a proxy to forward
* EAP packets to a RADIUS server. It only provides server implementations.
*/
struct eap_radius_plugin_t {
* Attribute enumerator implementation
*/
typedef struct {
- /** implementes enumerator_t */
+ /** implements enumerator_t */
enumerator_t public;
/** position in message */
chunk_t buf;
/**
* General purpose netlink buffer.
*
- * Some platforms require an enforced aligment to four bytes (e.g. ARM).
+ * Some platforms require an enforced alignment to four bytes (e.g. ARM).
*/
typedef union {
struct nlmsghdr hdr;
{
end = chunk_clone(start);
- /* mem_pool is currenty limited to 2^31 addresses, so 32-bit
+ /* mem_pool is currently limited to 2^31 addresses, so 32-bit
* calculations should be sufficient. */
size = untoh32(start.ptr + start.len - sizeof(size));
htoun32(end.ptr + end.len - sizeof(size), size + pool->get_size(pool));
rwlock_t *lock;
/**
- * Condvar used to snyc running actions
+ * Condvar used to sync running actions
*/
rwlock_condvar_t *condvar;
void (*dpd)(ike_mobike_t *this);
/**
- * Transmision hook, called by task manager.
+ * Transmission hook, called by task manager.
*
* The task manager calls this hook whenever it transmits a packet. It
* allows the mobike task to send the packet on multiple paths to do path
*
* The application has a global context and a session context. The global
* context is accessed from all sessions simultaneously and therefore
- * needs to be threadsave. Often a database wrapper is the global context.
+ * needs to be threadsafe. Often a database wrapper is the global context.
* The session context is instantiated per session. Sessions are managed
* automatically through session cookies. The session context is kept alive
* until the session times out. It must implement the context_t interface and
};
/**
- * ClearSilver cgiwrap is not threadsave, so we use a private
+ * ClearSilver cgiwrap is not threadsafe, so we use a private
* context for each thread.
*/
static thread_value_t *thread_this;
if (latest_success)
{
/*skipping enforcement */
- printf("skipping enforcment %d\n", id);
+ printf("skipping enforcement %d\n", id);
continue;
}
typedef struct entry_t entry_t;
/**
- * Contains a settins name/value pair
+ * Contains a settings name/value pair
*/
struct entry_t {
char *name;
chunk_t asn1_algorithmIdentifier(int oid);
/**
- * Build an algorithmIdentifier from a known OID and the given prameters.
+ * Build an algorithmIdentifier from a known OID and the given parameters.
*
* @param oid known OID index
* @param params parameters to encode in the algorithmIdentifier (adopted)
char *string;
/** current position */
char *pos;
- /** separater chars */
+ /** separator chars */
const char *sep;
/** trim chars */
const char *trim;
{ /* required to chown(2) service socket */
DBG1(DBG_NET, "cannot change ownership of socket '%s' without "
"CAP_CHOWN capability. socket directory should be accessible to "
- "UID/GID under which the deamon will run", uri);
+ "UID/GID under which the daemon will run", uri);
}
fd = socket(AF_UNIX, SOCK_STREAM, 0);
if (fd == -1)
OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
SUCH DAMAGE.
-The license and distribution terms for any publically available version or
+The license and distribution terms for any publicly available version or
derivative of this code cannot be changed. i.e. this code cannot simply be
copied and put under another distribution license
[including the GNU Public License.]
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
- * The licence and distribution terms for any publically available version or
+ * The licence and distribution terms for any publicly available version or
* derivative of this code cannot be changed. i.e. this code cannot simply be
* copied and put under another distribution licence
* [including the GNU Public Licence.]
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
- * The licence and distribution terms for any publically available version or
+ * The licence and distribution terms for any publicly available version or
* derivative of this code cannot be changed. i.e. this code cannot simply be
* copied and put under another distribution licence
* [including the GNU Public Licence.]
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
- * The licence and distribution terms for any publically available version or
+ * The licence and distribution terms for any publicly available version or
* derivative of this code cannot be changed. i.e. this code cannot simply be
* copied and put under another distribution licence
* [including the GNU Public Licence.]
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
- * The licence and distribution terms for any publically available version or
+ * The licence and distribution terms for any publicly available version or
* derivative of this code cannot be changed. i.e. this code cannot simply be
* copied and put under another distribution licence
* [including the GNU Public Licence.]
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
- * The licence and distribution terms for any publically available version or
+ * The licence and distribution terms for any publicly available version or
* derivative of this code cannot be changed. i.e. this code cannot simply be
* copied and put under another distribution licence
* [including the GNU Public Licence.]
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
- * The licence and distribution terms for any publically available version or
+ * The licence and distribution terms for any publicly available version or
* derivative of this code cannot be changed. i.e. this code cannot simply be
* copied and put under another distribution licence
* [including the GNU Public Licence.]
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
- * The licence and distribution terms for any publically available version or
+ * The licence and distribution terms for any publicly available version or
* derivative of this code cannot be changed. i.e. this code cannot simply be
* copied and put under another distribution licence
* [including the GNU Public Licence.]
}
if (!msg_rep_good)
{
- DBG1(DBG_LIB, "decryption failed due to unsufficient minimum weight");
+ DBG1(DBG_LIB, "decryption failed due to insufficient minimum weight");
success = FALSE;
}
*
* This program is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
- * or FITNESS FOR A PARTICULAR PURPSE. See the GNU General Public License
+ * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* for more details.
*/
*
* This program is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
- * or FITNESS FOR A PARTICULAR PURPSE. See the GNU General Public License
+ * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* for more details.
*/
*
* This program is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
- * or FITNESS FOR A PARTICULAR PURPSE. See the GNU General Public License
+ * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* for more details.
*/
plugin_t *sqlite_plugin_create()
{
private_sqlite_plugin_t *this;
- int threadsave = 0;
+ int threadsafe = 0;
INIT(this,
.public = {
);
#if SQLITE_VERSION_NUMBER >= 3005000
- threadsave = sqlite3_threadsafe();
+ threadsafe = sqlite3_threadsafe();
#endif
DBG2(DBG_LIB, "using SQLite %s, thread safety %d",
- sqlite3_libversion(), threadsave);
+ sqlite3_libversion(), threadsafe);
return &this->public.plugin;
}
* The ENUM and the ENUM_END define a enum_name_t pointer with the name supplied
* in "name".
*
- * Resolving of enum names is done using a printf hook. A printf fromat
+ * Resolving of enum names is done using a printf hook. A printf format
* character %N is replaced by the enum string. Printf needs two arguments to
* resolve a %N, the enum_name_t* (the defined name in ENUM_BEGIN) followed
* by the numerical enum value.
* Block and wait for a set of signals
*
* We don't replicate the functionality of siginfo_t. If info is not NULL
- * -1 is returend and errno is set to EINVAL.
+ * -1 is returned and errno is set to EINVAL.
*
* @param set set of signals to wait for
* @param info must be NULL
{
dst[i] ^= src[i];
}
- /* try to use words if src shares an aligment with dst */
+ /* try to use words if src shares an alignment with dst */
switch (((uintptr_t)&src[i] % sizeof(long)))
{
case 0:
-TThe roadwarriors <b>carol</b> and <b>dave</b> set up an IPv6 tunnel connection each
+The roadwarriors <b>carol</b> and <b>dave</b> set up an IPv6 tunnel connection each
to gateway <b>moon</b>. The authentication is based on distinct <b>pre-shared keys</b>
and IPv6 addresses. Upon the successful establishment of the IPsec tunnels,
automatically inserted ip6tables-based firewall rules let pass the tunneled traffic.