]> git.ipfire.org Git - thirdparty/strongswan.git/commitdiff
Fixed some typos, courtesy of codespell
authorTobias Brunner <tobias@strongswan.org>
Fri, 25 Jun 2021 09:32:29 +0000 (11:32 +0200)
committerTobias Brunner <tobias@strongswan.org>
Fri, 25 Jun 2021 09:32:29 +0000 (11:32 +0200)
Main change is the conversion from the British cancelling/-ed to the
American canceling/-ed.

36 files changed:
NEWS
src/frontends/android/app/src/main/java/org/strongswan/android/logic/SimpleFetcher.java
src/frontends/android/gradlew.bat
src/frontends/osx/charon-xpc/xpc_channels.c
src/libcharon/network/socket_manager.c
src/libcharon/plugins/eap_aka_3gpp/eap_aka_3gpp_plugin.h
src/libcharon/plugins/load_tester/load_tester_config.c
src/libcharon/plugins/vici/libvici.h
src/libcharon/plugins/vici/perl/Vici-Session/README.pod
src/libcharon/sa/ike_sa.h
src/libcharon/sa/ike_sa_manager.h
src/libcharon/sa/ikev1/task_manager_v1.c
src/libcharon/sa/ikev1/tasks/aggressive_mode.c
src/libcharon/sa/ikev1/tasks/main_mode.c
src/libcharon/sa/ikev1/tasks/quick_mode.c
src/libcharon/sa/ikev1/tasks/xauth.c
src/libcharon/sa/ikev2/tasks/ike_auth.c
src/libcharon/sa/task_manager.h
src/libstrongswan/fetcher/fetcher.h
src/libstrongswan/plugins/keychain/keychain_creds.c
src/libstrongswan/plugins/pkcs11/pkcs11_manager.c
src/libstrongswan/plugins/winhttp/winhttp_fetcher.c
src/libstrongswan/processing/watcher.c
src/libstrongswan/tests/suites/test_threading.c
src/libstrongswan/threading/thread.c
src/libstrongswan/threading/thread.h
src/libstrongswan/threading/windows/thread.c
src/libstrongswan/utils/identification.h
src/libtls/tls_eap.c
src/libtls/tls_hkdf.c
src/libtnccs/plugins/tnccs_11/tnccs_11.c
src/libtnccs/plugins/tnccs_20/tnccs_20_client.c
src/libtnccs/plugins/tnccs_20/tnccs_20_server.c
src/manager/templates/static/jquery.js
testing/tests/ha/active-passive/description.txt
testing/tests/ikev2/dhcp-static-mac/description.txt

diff --git a/NEWS b/NEWS
index 831d37f971600374dec0d9172211f687cacdd6d5..cdad7e2e271e0d7867d038f3194e55fea0ba4cf9 100644 (file)
--- a/NEWS
+++ b/NEWS
@@ -2743,7 +2743,7 @@ strongswan-4.1.5
 strongswan-4.1.4
 ----------------
 
-- The pluto IKEv1 daemon now exhibits the same behaviour as its
+- The pluto IKEv1 daemon now exhibits the same behavior as its
   IKEv2 companion charon by inserting an explicit route via the
   _updown script only if a sourceip exists. This is admissible
   since routing through the IPsec tunnel is handled automatically
index de0ae97fe45cc1064a22e2f50bedfe4083628ef3..1f24df7a45af442592abd5a1f1513efbb53e6e4c 100644 (file)
@@ -118,7 +118,7 @@ public class SimpleFetcher
        /**
         * Disable the fetcher and abort any future requests.
         *
-        * The native thread is not cancelable as it is working on an IKE_SA (cancelling the methods of
+        * The native thread is not cancelable as it is working on an IKE_SA (canceling the methods of
         * HttpURLConnection is not reliably possible anyway), so to abort while fetching we cancel the
         * Future (causing a return from fetch() immediately) and let the executor thread continue its
         * thing in the background.
index aec99730b4e8fcd90b57a0e8e01544fea7c31a89..72d362dafd896f845f13c55bf925b14c5c8faa1d 100644 (file)
@@ -46,7 +46,7 @@ echo location of your Java installation.
 goto fail\r
 \r
 :init\r
-@rem Get command-line arguments, handling Windowz variants\r
+@rem Get command-line arguments, handling Windows variants\r
 \r
 if not "%OS%" == "Windows_NT" goto win9xME_args\r
 if "%@eval[2+2]" == "4" goto 4NT_args\r
index d013e752b662d4aa41511a99c400494c83729d8f..3fefb5a10708cebab5fbd4bce6372c197911392c 100644 (file)
@@ -64,7 +64,7 @@ typedef struct {
 } entry_t;
 
 /**
- * Clean up an entry, cancelling connection
+ * Clean up an entry, canceling connection
  */
 static void destroy_entry(entry_t *entry)
 {
index 0a7ac9d11f5383205cde82031d8c539712e845d5..dc6ce226cede3180b32cedfd54425de964c822a1 100644 (file)
@@ -66,7 +66,7 @@ METHOD(socket_manager_t, receiver, status_t,
                this->lock->unlock(this->lock);
                return NOT_SUPPORTED;
        }
-       /* receive is blocking and the thread can be cancelled */
+       /* receive is blocking and the thread can be canceled */
        thread_cleanup_push((thread_cleanup_t)this->lock->unlock, this->lock);
        status = this->socket->receive(this->socket, packet);
        thread_cleanup_pop(TRUE);
index ea2461fcca41b6cf85480191ede96e88b2848919..2f626e68206deb3e5716d344717393f708a4a045 100644 (file)
@@ -63,8 +63,8 @@ typedef struct eap_aka_3gpp_plugin_t eap_aka_3gpp_plugin_t;
  * SQN with its own locally stored value. This potentially allows an attacker
  * to do replay attacks. But since the server has proven his identity via IKE,
  * such an attack is only possible between server and AAA (if any).
- * Note that SEQ_CHECK only controls the compile-time default behaviour,
- * but the run-time behaviour can always be controlled by setting the
+ * Note that SEQ_CHECK only controls the compile-time default behavior,
+ * but the run-time behavior can always be controlled by setting the
  * charon.plugins.eap-aka-3gpp.seq_check config variable.
  */
 struct eap_aka_3gpp_plugin_t {
index 62d03c9ebc5dfbf8fcc49aeb69daadc22d1f9208..16040a1023c67f6cb3a022f4508d934fa22acc87 100644 (file)
@@ -624,7 +624,7 @@ static void add_ts(private_load_tester_config_t *this,
 /**
  * Allocate and install a dynamic external address to use
  */
-static host_t *allocate_addr(private_load_tester_config_t *this, uint num)
+static host_t *allocate_addr(private_load_tester_config_t *this, u_int num)
 {
        enumerator_t *enumerator;
        mem_pool_t *pool;
@@ -682,7 +682,7 @@ static host_t *allocate_addr(private_load_tester_config_t *this, uint num)
 /**
  * Generate a new initiator config, num = 0 for responder config
  */
-static peer_cfg_t* generate_config(private_load_tester_config_t *this, uint num)
+static peer_cfg_t* generate_config(private_load_tester_config_t *this, u_int num)
 {
        ike_cfg_t *ike_cfg;
        child_cfg_t *child_cfg;
index 297a32c32b3067cacba15c717bb340064c464362..ab7b7ffa8fe4847d687c52d1a3687d5eaacf89ec 100644 (file)
@@ -58,7 +58,7 @@
  * - vici_end_list(): Close a previously opened list
  * - vici_add_list_item() / vici_add_list_itemf(): Add list item
  *
- * Once the request message is complete, it can be sent or cancelled with:
+ * Once the request message is complete, it can be sent or canceled with:
  *
  * - vici_submit()
  * - vici_free_req()
index 1f5ff59629a680da125ad669e0c3b83620e93e63..f08697e14c6803756c6d618b770a4b6e5cdcfc53 100644 (file)
@@ -640,7 +640,7 @@ print $res ? "ok\n" : "failed: $errmsg\n";
 # close vici socket
 close($socket);
 
-=head1 COPYRIGHT AND LICENCE
+=head1 COPYRIGHT AND LICENSE
 
 Copyright (c) 2015 Andreas Steffen
 
index f15455930a85928e5462131b3f911d8e125bb84b..3b8a0cd5219b015d330e4c3dc7e44a31d80b83b4 100644 (file)
@@ -1170,7 +1170,7 @@ struct ike_sa_t {
        void (*remove_task)(ike_sa_t *this, enumerator_t *enumerator);
 
        /**
-        * Flush a task queue, cancelling all tasks in it.
+        * Flush a task queue, canceling all tasks in it.
         *
         * @param queue                 queue type to flush
         */
index b68ec7c142f1771e6b97ca7947cfec638b1716ae..318620be0ef0a2c8bf8ce752b9d3c0ef0d2a3137 100644 (file)
@@ -142,7 +142,7 @@ struct ike_sa_manager_t {
         *
         * Measures are taken according to the uniqueness policy of the IKE_SA.
         * The return value indicates whether duplicates have been found and if
-        * further measures should be taken (e.g. cancelling an IKE_AUTH exchange).
+        * further measures should be taken (e.g. canceling an IKE_AUTH exchange).
         * check_uniqueness() must be called before the IKE_SA is complete,
         * deadlocks occur otherwise.
         *
index d3089a6ab69cdfeedf73af484d7bb213746fc0dc..8df2862dd9fc64de3a326184595a45918525ba4d 100644 (file)
@@ -487,7 +487,7 @@ METHOD(task_manager_t, initiate, status_t,
        message_t *message;
        host_t *me, *other;
        exchange_type_t exchange = EXCHANGE_TYPE_UNDEFINED;
-       bool new_mid = FALSE, expect_response = FALSE, cancelled = FALSE, keep = FALSE;
+       bool new_mid = FALSE, expect_response = FALSE, canceled = FALSE, keep = FALSE;
 
        if (this->initiating.type != EXCHANGE_TYPE_UNDEFINED &&
                this->initiating.type != INFORMATIONAL_V1)
@@ -672,7 +672,7 @@ METHOD(task_manager_t, initiate, status_t,
                                /* processed, but task needs another exchange */
                                continue;
                        case ALREADY_DONE:
-                               cancelled = TRUE;
+                               canceled = TRUE;
                                break;
                        case FAILED:
                        default:
@@ -697,7 +697,7 @@ METHOD(task_manager_t, initiate, status_t,
        {       /* tasks completed, no exchange active anymore */
                this->initiating.type = EXCHANGE_TYPE_UNDEFINED;
        }
-       if (cancelled)
+       if (canceled)
        {
                message->destroy(message);
                return initiate(this);
@@ -754,7 +754,7 @@ static status_t build_response(private_task_manager_t *this, message_t *request)
        task_t *task;
        message_t *message;
        host_t *me, *other;
-       bool delete = FALSE, cancelled = FALSE, expect_request = FALSE;
+       bool delete = FALSE, canceled = FALSE, expect_request = FALSE;
 
        me = request->get_destination(request);
        other = request->get_source(request);
@@ -791,7 +791,7 @@ static status_t build_response(private_task_manager_t *this, message_t *request)
                                }
                                continue;
                        case ALREADY_DONE:
-                               cancelled = TRUE;
+                               canceled = TRUE;
                                break;
                        case INVALID_ARG:
                                if (task->get_type(task) == TASK_QUICK_MODE)
@@ -813,7 +813,7 @@ static status_t build_response(private_task_manager_t *this, message_t *request)
        enumerator->destroy(enumerator);
 
        clear_packets(this->responding.packets);
-       if (cancelled)
+       if (canceled)
        {
                message->destroy(message);
                return initiate(this);
index c38276c9c9633b224a66c6eee6314b9cd0b34881..beceb6ea19268fb62db96cd41bd8f5b0a96cfb18 100644 (file)
@@ -103,7 +103,7 @@ static bool establish(private_aggressive_mode_t *this)
 {
        if (!charon->bus->authorize(charon->bus, TRUE))
        {
-               DBG1(DBG_IKE, "final authorization hook forbids IKE_SA, cancelling");
+               DBG1(DBG_IKE, "final authorization hook forbids IKE_SA, canceling");
                return FALSE;
        }
 
@@ -177,7 +177,7 @@ static status_t send_notify(private_aggressive_mode_t *this, notify_type_t type)
 
        this->ike_sa->queue_task(this->ike_sa,
                                                (task_t*)informational_create(this->ike_sa, notify));
-       /* cancel all active/passive tasks in favour of informational */
+       /* cancel all active/passive tasks in favor of informational */
        this->ike_sa->flush_queue(this->ike_sa,
                                        this->initiator ? TASK_QUEUE_ACTIVE : TASK_QUEUE_PASSIVE);
        return ALREADY_DONE;
@@ -190,7 +190,7 @@ static status_t send_delete(private_aggressive_mode_t *this)
 {
        this->ike_sa->queue_task(this->ike_sa,
                                                (task_t*)isakmp_delete_create(this->ike_sa, TRUE));
-       /* cancel all active tasks in favour of informational */
+       /* cancel all active tasks in favor of informational */
        this->ike_sa->flush_queue(this->ike_sa,
                                        this->initiator ? TASK_QUEUE_ACTIVE : TASK_QUEUE_PASSIVE);
        return ALREADY_DONE;
@@ -320,7 +320,7 @@ METHOD(task_t, build_i, status_t,
                                        if (charon->ike_sa_manager->check_uniqueness(
                                                                charon->ike_sa_manager, this->ike_sa, FALSE))
                                        {
-                                               DBG1(DBG_IKE, "cancelling Aggressive Mode due to "
+                                               DBG1(DBG_IKE, "canceling Aggressive Mode due to "
                                                         "uniqueness policy");
                                                return send_notify(this, AUTHENTICATION_FAILED);
                                        }
@@ -507,7 +507,7 @@ METHOD(task_t, process_r, status_t,
                        if (!charon->bus->authorize(charon->bus, FALSE))
                        {
                                DBG1(DBG_IKE, "Aggressive Mode authorization hook forbids "
-                                        "IKE_SA, cancelling");
+                                        "IKE_SA, canceling");
                                charon->bus->alert(charon->bus, ALERT_PEER_AUTH_FAILED);
                                return send_delete(this);
                        }
@@ -529,7 +529,7 @@ METHOD(task_t, process_r, status_t,
                                        if (charon->ike_sa_manager->check_uniqueness(
                                                                charon->ike_sa_manager, this->ike_sa, FALSE))
                                        {
-                                               DBG1(DBG_IKE, "cancelling Aggressive Mode due to "
+                                               DBG1(DBG_IKE, "canceling Aggressive Mode due to "
                                                         "uniqueness policy");
                                                return send_delete(this);
                                        }
@@ -709,7 +709,7 @@ METHOD(task_t, process_i, status_t,
                if (!charon->bus->authorize(charon->bus, FALSE))
                {
                        DBG1(DBG_IKE, "Aggressive Mode authorization hook forbids IKE_SA, "
-                                "cancelling");
+                                "canceling");
                        return send_notify(this, AUTHENTICATION_FAILED);
                }
 
index 35e860f090881853286fef0a2c7713ed4d821670..58b00f2de1c784bbbfc2df3affb5b5cfd05eef31 100644 (file)
@@ -100,7 +100,7 @@ static bool establish(private_main_mode_t *this)
 {
        if (!charon->bus->authorize(charon->bus, TRUE))
        {
-               DBG1(DBG_IKE, "final authorization hook forbids IKE_SA, cancelling");
+               DBG1(DBG_IKE, "final authorization hook forbids IKE_SA, canceling");
                return FALSE;
        }
 
@@ -186,7 +186,7 @@ static status_t send_notify(private_main_mode_t *this, notify_type_t type)
 
        this->ike_sa->queue_task(this->ike_sa,
                                                (task_t*)informational_create(this->ike_sa, notify));
-       /* cancel all active/passive tasks in favour of informational */
+       /* cancel all active/passive tasks in favor of informational */
        this->ike_sa->flush_queue(this->ike_sa,
                                        this->initiator ? TASK_QUEUE_ACTIVE : TASK_QUEUE_PASSIVE);
        return ALREADY_DONE;
@@ -199,7 +199,7 @@ static status_t send_delete(private_main_mode_t *this)
 {
        this->ike_sa->queue_task(this->ike_sa,
                                                (task_t*)isakmp_delete_create(this->ike_sa, TRUE));
-       /* cancel all active tasks in favour of informational */
+       /* cancel all active tasks in favor of informational */
        this->ike_sa->flush_queue(this->ike_sa,
                                        this->initiator ? TASK_QUEUE_ACTIVE : TASK_QUEUE_PASSIVE);
        return ALREADY_DONE;
@@ -483,7 +483,7 @@ METHOD(task_t, process_r, status_t,
                        if (!charon->bus->authorize(charon->bus, FALSE))
                        {
                                DBG1(DBG_IKE, "Main Mode authorization hook forbids IKE_SA, "
-                                        "cancelling");
+                                        "canceling");
                                charon->bus->alert(charon->bus, ALERT_PEER_AUTH_FAILED);
                                return send_notify(this, AUTHENTICATION_FAILED);
                        }
@@ -565,7 +565,7 @@ METHOD(task_t, build_r, status_t,
                                        if (charon->ike_sa_manager->check_uniqueness(
                                                                charon->ike_sa_manager, this->ike_sa, FALSE))
                                        {
-                                               DBG1(DBG_IKE, "cancelling Main Mode due to uniqueness "
+                                               DBG1(DBG_IKE, "canceling Main Mode due to uniqueness "
                                                         "policy");
                                                return send_notify(this, AUTHENTICATION_FAILED);
                                        }
@@ -725,7 +725,7 @@ METHOD(task_t, process_i, status_t,
                        if (!charon->bus->authorize(charon->bus, FALSE))
                        {
                                DBG1(DBG_IKE, "Main Mode authorization hook forbids IKE_SA, "
-                                        "cancelling");
+                                        "canceling");
                                charon->bus->alert(charon->bus, ALERT_PEER_AUTH_FAILED);
                                return send_delete(this);
                        }
@@ -748,7 +748,7 @@ METHOD(task_t, process_i, status_t,
                                        if (charon->ike_sa_manager->check_uniqueness(
                                                                charon->ike_sa_manager, this->ike_sa, FALSE))
                                        {
-                                               DBG1(DBG_IKE, "cancelling Main Mode due to uniqueness "
+                                               DBG1(DBG_IKE, "canceling Main Mode due to uniqueness "
                                                         "policy");
                                                return send_delete(this);
                                        }
index 50c280fe5804b5ac2fb044beec20a356c62ab3f1..f75775357bdb1e4e9853514fee4cfbd6c45449ea 100644 (file)
@@ -773,7 +773,7 @@ static status_t send_notify(private_quick_mode_t *this, notify_type_t type)
 
        this->ike_sa->queue_task(this->ike_sa,
                                                (task_t*)informational_create(this->ike_sa, notify));
-       /* cancel all active/passive tasks in favour of informational */
+       /* cancel all active/passive tasks in favor of informational */
        this->ike_sa->flush_queue(this->ike_sa,
                                        this->initiator ? TASK_QUEUE_ACTIVE : TASK_QUEUE_PASSIVE);
        return ALREADY_DONE;
index bec2cfe7dd672e84328fc4dae6bfc534961c1fdf..ba2a5c841c769993ea496c897f873c69b0e76dc7 100644 (file)
@@ -150,17 +150,17 @@ static bool allowed(private_xauth_t *this)
        if (charon->ike_sa_manager->check_uniqueness(charon->ike_sa_manager,
                                                                                                 this->ike_sa, FALSE))
        {
-               DBG1(DBG_IKE, "cancelling XAuth due to uniqueness policy");
+               DBG1(DBG_IKE, "canceling XAuth due to uniqueness policy");
                return FALSE;
        }
        if (!charon->bus->authorize(charon->bus, FALSE))
        {
-               DBG1(DBG_IKE, "XAuth authorization hook forbids IKE_SA, cancelling");
+               DBG1(DBG_IKE, "XAuth authorization hook forbids IKE_SA, canceling");
                return FALSE;
        }
        if (!charon->bus->authorize(charon->bus, TRUE))
        {
-               DBG1(DBG_IKE, "final authorization hook forbids IKE_SA, cancelling");
+               DBG1(DBG_IKE, "final authorization hook forbids IKE_SA, canceling");
                return FALSE;
        }
        return TRUE;
index 54f51d1ebcc66c3307a6b737630364a46a8b4e00..1d3e8258898b7d6348b8eae3f46fe8a610c35cfd 100644 (file)
@@ -887,7 +887,7 @@ METHOD(task_t, process_r, status_t,
        /* another auth round done, invoke authorize hook */
        if (!charon->bus->authorize(charon->bus, FALSE))
        {
-               DBG1(DBG_IKE, "authorization hook forbids IKE_SA, cancelling");
+               DBG1(DBG_IKE, "authorization hook forbids IKE_SA, canceling");
                this->authentication_failed = TRUE;
                return NEED_MORE;
        }
@@ -1104,7 +1104,7 @@ METHOD(task_t, build_r, status_t,
        if (charon->ike_sa_manager->check_uniqueness(charon->ike_sa_manager,
                                                                                this->ike_sa, this->initial_contact))
        {
-               DBG1(DBG_IKE, "cancelling IKE_SA setup due to uniqueness policy");
+               DBG1(DBG_IKE, "canceling IKE_SA setup due to uniqueness policy");
                charon->bus->alert(charon->bus, ALERT_UNIQUE_KEEP);
                message->add_notify(message, TRUE, AUTHENTICATION_FAILED,
                                                        chunk_empty);
@@ -1112,7 +1112,7 @@ METHOD(task_t, build_r, status_t,
        }
        if (!charon->bus->authorize(charon->bus, TRUE))
        {
-               DBG1(DBG_IKE, "final authorization hook forbids IKE_SA, cancelling");
+               DBG1(DBG_IKE, "final authorization hook forbids IKE_SA, canceling");
                goto peer_auth_failed;
        }
        if (this->ike_sa->supports_extension(this->ike_sa, EXT_IKE_REDIRECTION) &&
@@ -1362,7 +1362,7 @@ METHOD(task_t, process_i, status_t,
                /* another auth round done, invoke authorize hook */
                if (!charon->bus->authorize(charon->bus, FALSE))
                {
-                       DBG1(DBG_IKE, "authorization forbids IKE_SA, cancelling");
+                       DBG1(DBG_IKE, "authorization forbids IKE_SA, canceling");
                        goto peer_auth_failed;
                }
 
@@ -1453,7 +1453,7 @@ METHOD(task_t, process_i, status_t,
        if (!charon->bus->authorize(charon->bus, TRUE))
        {
                DBG1(DBG_IKE, "final authorization hook forbids IKE_SA, "
-                                     "cancelling");
+                                     "canceling");
                goto peer_auth_failed;
        }
        DBG0(DBG_IKE, "IKE_SA %s[%d] established between %H[%Y]...%H[%Y]",
index d84acf4ed700062c03f3fa188de6b2f0facfc917..f9225c56ad4c93d75e8c548e27795da908f3b65c 100644 (file)
@@ -293,7 +293,7 @@ struct task_manager_t {
        void (*flush)(task_manager_t *this);
 
        /**
-        * Flush a queue, cancelling all tasks.
+        * Flush a queue, canceling all tasks.
         *
         * @param queue                 queue to flush
         */
index 953bf11b934c6e12ba63308b51e5ae49ccf05bf0..73fe9a8c6a23015fa6da9709b1cdccdfa733818b 100644 (file)
@@ -117,7 +117,7 @@ struct fetcher_t {
         *
         * The fetcher returns NOT_SUPPORTED to indicate that it is uncappable
         * to handle such URLs. Other return values indicate a failure, and
-        * fetching of that URL gets cancelled.
+        * fetching of that URL gets canceled.
         * If no FETCH_CALLBACK function is set as option, userdata must be
         * a chunk_t*. This chunk gets allocated, accumulated data using the
         * fetcher_default_callback() function.
index d60f28691ddba1a83762285042c930a193897d09..4c47fe940b406a8a9a4746821230502b72b45d3d 100644 (file)
@@ -148,7 +148,7 @@ static job_requeue_t monitor_changes(private_keychain_creds_t *this)
        {
                this->loop = CFRunLoopGetCurrent();
 
-               /* does not return until cancelled */
+               /* does not return until canceled */
                CFRunLoopRun();
 
                this->loop = NULL;
index a1400ad3b1b4510e99e6db8b1e04bc8b03064e43..8ee7140266632dea2d4f5ced30d58312f2426f91 100644 (file)
@@ -173,7 +173,7 @@ CALLBACK(dispatch_slot_events, job_requeue_t,
        rv = entry->lib->f->C_WaitForSlotEvent(0, &slot, NULL);
        if (rv == CKR_FUNCTION_NOT_SUPPORTED || rv == CKR_NO_EVENT)
        {
-               DBG1(DBG_CFG, "module '%s' does not support hot-plugging, cancelled",
+               DBG1(DBG_CFG, "module '%s' does not support hot-plugging, canceled",
                         entry->lib->get_name(entry->lib));
                return JOB_REQUEUE_NONE;
        }
index da56954ab5f1fa0605a3eae0a28a64c932968f12..f26ac90901dc3be32e9a396592d2603e2517c516 100644 (file)
@@ -165,7 +165,7 @@ static bool read_result(private_winhttp_fetcher_t *this, HINTERNET request,
                }
                if (!this->cb(user, chunk_create(buf, received)))
                {
-                       DBG1(DBG_LIB, "processing response failed or cancelled");
+                       DBG1(DBG_LIB, "processing response failed or canceled");
                        return FALSE;
                }
        }
index 4466e91eb1366e0043dc54d03d8757aedaabe225..25af6baf80084cced6eee6fccd28ba6f70bfb6ad 100644 (file)
@@ -186,12 +186,12 @@ static void update(private_watcher_t *this)
 }
 
 /**
- * Cleanup function if callback gets cancelled
+ * Cleanup function if callback gets canceled
  */
 static void unregister(notify_data_t *data)
 {
-       /* if a thread processing a callback gets cancelled, we mark the entry
-        * as cancelled, like the callback would return FALSE. This is required
+       /* if a thread processing a callback gets canceled, we mark the entry
+        * as canceled, like the callback would return FALSE. This is required
         * to not queue this watcher again if all threads have been gone. */
        data->keep = FALSE;
 }
@@ -276,7 +276,7 @@ static void activate_all(private_watcher_t *this)
 {
        entry_t *entry;
 
-       /* When the watcher thread gets cancelled, we have to reactivate any entry
+       /* When the watcher thread gets canceled, we have to reactivate any entry
         * and signal threads in remove() to go on. */
 
        this->mutex->lock(this->mutex);
@@ -398,7 +398,7 @@ static job_requeue_t watch(private_watcher_t *this)
                if (res == -1 && errno == EINTR)
                {
                        /* LinuxThreads interrupts poll(), but does not make it a
-                        * cancellation point. Manually test if we got cancelled. */
+                        * cancellation point. Manually test if we got canceled. */
                        thread_cancellation_point();
                }
 
index 140c4fd394cc2ec96534fed8b75d9a56a079dd65..2d41e5f301e1389c2d71989f876c1a7fefd67105 100644 (file)
@@ -1130,7 +1130,7 @@ static void *cancel_onoff_run(void *data_in)
        thread_cancelability(FALSE);
        data->cancellable = FALSE;
 
-       /* we should not get cancelled here */
+       /* we should not get canceled here */
        data->sem->wait(data->sem);
 
        data->cancellable = TRUE;
index ecdcfa98e24b31522cde70be7734bebdb624f3d2..cb71bc4e02fb3273c645b8041546655cc9b5674c 100644 (file)
@@ -84,7 +84,7 @@ struct private_thread_t {
        bool detached_or_joined;
 
        /**
-        * TRUE if the threads has terminated (cancelled, via thread_exit or
+        * TRUE if the threads has terminated (canceled, via thread_exit or
         * returned from the main function)
         */
        bool terminated;
@@ -130,7 +130,7 @@ static thread_value_t *current_thread;
 #endif
 
 /* the signal handler for SIG_CANCEL uses pthread_exit to terminate the
- * "cancelled" thread */
+ * "canceled" thread */
 static void cancel_signal_handler(int sig)
 {
        pthread_exit(NULL);
index 1dfc3772d570bf65267a5523f07ac9a4577de3d4..ce9cdcda27df41dc788515b1c450bd35e6bc771a 100644 (file)
@@ -109,7 +109,7 @@ u_int thread_current_id();
 
 /**
  * Push a function onto the current thread's cleanup handler stack.
- * The callback function is called whenever the thread is cancelled, exits or
+ * The callback function is called whenever the thread is canceled, exits or
  * thread_cleanup_pop is called with TRUE as execute argument.
  *
  * @param cleanup              function called on thread exit
index 798d75be7c0c153790257a6eff2bafb291f21de5..5f42c0fbc4c8bdf27706674540b515fae47f3eb3 100644 (file)
@@ -87,7 +87,7 @@ struct private_thread_t {
        bool cancelability;
 
        /**
-        * Has the thread been cancelled by thread->cancel()?
+        * Has the thread been canceled by thread->cancel()?
         */
        bool canceled;
 
index 90d945d3fbbd548359222cd685b2172ba933f9f6..aae0d161ecd54476638c6324ae785ad3e9b03f44 100644 (file)
@@ -299,7 +299,7 @@ struct identification_t {
  * - ID_RFC822_ADDR:   alice@wonderland.org
  * - ID_DER_ASN1_DN:   C=CH, O=Linux strongSwan, CN=bob
  *
- * In favour of pluto, domainnames are prepended with an @, since
+ * In favor of pluto, domainnames are prepended with an @, since
  * pluto resolves domainnames without an @ to IPv4 addresses. Since
  * we use a separate host_t class for addresses, this doesn't
  * make sense for us.
index a784c4b471323ece93e677ca7b7ade3cd115d702..c8d7a4eef9fb3ab1340e6452b382b64bb8526e4d 100644 (file)
@@ -323,7 +323,7 @@ static chunk_t create_ack(private_tls_eap_t *this)
                default:
                        break;
        }
-       DBG2(DBG_TLS, "sending %N acknowledgement packet",
+       DBG2(DBG_TLS, "sending %N acknowledgment packet",
                 eap_type_names, this->type);
        return chunk_clone(chunk_from_thing(pkt));
 }
@@ -370,7 +370,7 @@ METHOD(tls_eap_t, process, status_t,
        {
                if (in.len == sizeof(eap_tls_packet_t))
                {
-                       DBG2(DBG_TLS, "received %N acknowledgement packet",
+                       DBG2(DBG_TLS, "received %N acknowledgment packet",
                                 eap_type_names, this->type);
                        status = build_pkt(this, out);
                        if (status == INVALID_STATE && this->tls->is_complete(this->tls))
index c406b3ec907cc26132283ffbfde56c19aa8f2976..84358d3ff3e48a3a3b0a2a6e092d0f904d9acd1a 100644 (file)
@@ -735,7 +735,7 @@ tls_hkdf_t *tls_hkdf_create(hash_algorithm_t hash_algorithm, chunk_t psk)
                        DBG1(DBG_TLS, "%N not supported", hash_algorithm_names,
                                 hash_algorithm);
                }
-               DBG1(DBG_TLS, "unable to initialise HKDF");
+               DBG1(DBG_TLS, "unable to initialize HKDF");
                destroy(this);
                return NULL;
        }
index 8b118e82c32ff2f5c42f925e19fe00e0be3002fa..802f11fff3d83374b85236a45a6cb686de1592af 100644 (file)
@@ -360,7 +360,7 @@ METHOD(tls_t, process, status_t,
                this->mutex->lock(this->mutex);
                if (this->batch)
                {
-                       DBG1(DBG_TNC, "cancelling TNCCS batch");
+                       DBG1(DBG_TNC, "canceling TNCCS batch");
                        this->batch->destroy(this->batch);
                        this->batch_id--;
                 }
index c8fdf0d30bb7ba8b6f8ed281e046df0c803bbf72..3f5c0b3f7b30efb6c8e1b019190de737124a9807 100644 (file)
@@ -209,7 +209,7 @@ static void change_batch_type(private_tnccs_20_client_t *this,
        {
                if (this->batch_type != PB_BATCH_NONE)
                {
-                       DBG1(DBG_TNC, "cancelling PB-TNC %N batch",
+                       DBG1(DBG_TNC, "canceling PB-TNC %N batch",
                                 pb_tnc_batch_type_names, this->batch_type);
 
                        while (this->messages->remove_last(this->messages,
index 44889d7e9cb53d230e0a18870b1683cb29f215c6..b6666c9add8f1fee89f52730a5a405b2fbbfb0d9 100644 (file)
@@ -142,7 +142,7 @@ static void change_batch_type(private_tnccs_20_server_t *this,
        {
                if (this->batch_type != PB_BATCH_NONE)
                {
-                       DBG1(DBG_TNC, "cancelling PB-TNC %N batch",
+                       DBG1(DBG_TNC, "canceling PB-TNC %N batch",
                                 pb_tnc_batch_type_names, this->batch_type);
 
                        while (this->messages->remove_last(this->messages,
index aad352b5470d8007ba713ea410c6f982cc6f6060..7aaed5e4de001bf0ef92801492d9833b3372b8bf 100644 (file)
@@ -1542,7 +1542,7 @@ jQuery.extend({
 });
 /*
  * A number of helper functions used for managing events.
- * Many of the ideas behind this code orignated from
+ * Many of the ideas behind this code originated from
  * Dean Edwards' addEvent library.
  */
 jQuery.event = {
index 3af67f63008343d5c8eaa04932ad25aa0a5040c9..9306af60ff7c85b897699c48f6877ecffaa06bfa 100644 (file)
@@ -1,7 +1,7 @@
 The roadwarriors <b>carol</b> and <b>dave</b> set up a connection each 
 to the virtual gateway <b>mars</b> implemented by the two real gateways
 <b>alice</b> and <b>moon</b> in a <b>High Availability</b> (HA) setup 
-based on <b>ClusterIP</b>. The HA synchronisation link between the two
+based on <b>ClusterIP</b>. The HA synchronization link between the two
 gateways is secured by an IPsec transport connection. At the outset
 <b>alice</b> is the active and <b>moon</b> is the passive gateway.
 After <b>alice</b> gets killed <b>moon</b> automatically takes over
index 3a465963bdd4eff1ca94400972cdee82dfb93923..3a11740b23d95e0a9ad88c21ce642c778a92f43d 100644 (file)
@@ -1,4 +1,4 @@
-TThe roadwarriors <b>carol</b> and <b>dave</b> set up a connection each to gateway <b>moon</b>
+The roadwarriors <b>carol</b> and <b>dave</b> set up a connection each to gateway <b>moon</b>
 and request a <b>virtual IP</b> via the IKEv2 configuration payload by using the <b>vips = 0.0.0.0</b>
 parameter. The <b>dhcp</b> plugin on gateway <b>moon</b> then requests an IP address and DNS/WINS server
 information from DHCP server <b>venus</b> using the DHCP protocol. The IP addresses are assigned statically