From: Tobias Brunner Date: Mon, 25 Nov 2024 11:05:46 +0000 (+0100) Subject: Fixed some typos, courtesy of codespell X-Git-Tag: 6.0.0rc2~6 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=17bc5166d4a6385e03aa2d4f5a93be7b8521f4e5;p=thirdparty%2Fstrongswan.git Fixed some typos, courtesy of codespell --- diff --git a/NEWS b/NEWS index f85bc46d37..54c9270645 100644 --- a/NEWS +++ b/NEWS @@ -373,7 +373,7 @@ strongswan-5.9.4 salt lengths. This vulnerability has been registered as CVE-2021-41990. -- Fixed a denial-of-service vulnerabililty in the in-memory certificate cache +- Fixed a denial-of-service vulnerability in the in-memory certificate cache if certificates are replaced and a very large random value caused an integer overflow. This vulnerability has been registered as CVE-2021-41991. @@ -1785,7 +1785,7 @@ strongswan-5.0.3 PT-TLS (RFC 6876), a Posture Transport Protocol over TLS. - The charon systime-fix plugin can disable certificate lifetime checks on - embedded systems if the system time is obviously out of sync after bootup. + embedded systems if the system time is obviously out of sync after boot-up. Certificates lifetimes get checked once the system time gets sane, closing or reauthenticating connections using expired certificates. diff --git a/src/libcharon/encoding/message.h b/src/libcharon/encoding/message.h index 229ee12253..581a7d4e79 100644 --- a/src/libcharon/encoding/message.h +++ b/src/libcharon/encoding/message.h @@ -265,7 +265,7 @@ struct message_t { * The data returned is the concatenation of the IKE header and plaintext * payloads (if any) up until the end of the header of the Encrypted * Payload followed by the plaintext data of the Encrypted Payload (if any). - * Lenght fields are adjusted to only contain that of returned data (e.g. + * Length fields are adjusted to only contain that of returned data (e.g. * IV or padding is ignored). * * @param[out] plain plaintext encoding (allocated) diff --git a/src/libstrongswan/plugins/ml/ml_utils.h b/src/libstrongswan/plugins/ml/ml_utils.h index 0258132108..6f52622596 100644 --- a/src/libstrongswan/plugins/ml/ml_utils.h +++ b/src/libstrongswan/plugins/ml/ml_utils.h @@ -52,7 +52,7 @@ void ml_assign_cond_int16(int16_t *dst, int16_t val, uint16_t cond); * Read up to four bytes in little-endian order from the given buffer. * * @param buf byte buffer to read from - * @param len length betweeen 0 and 4 + * @param len length between 0 and 4 * @return read value */ uint32_t ml_read_bytes_le(uint8_t *buf, size_t len); @@ -61,7 +61,7 @@ uint32_t ml_read_bytes_le(uint8_t *buf, size_t len); * Write up to four bytes of the given value in little-endian order to a buffer. * * @param buf byte buffer to write to - * @param len length betweeen 0 and 4 + * @param len length between 0 and 4 * @param val value to write */ void ml_write_bytes_le(uint8_t *buf, size_t len, uint32_t val); diff --git a/testing/tests/ikev2/start-action-start/hosts/sun/etc/strongswan.conf b/testing/tests/ikev2/start-action-start/hosts/sun/etc/strongswan.conf index b4eb07610f..7c65725554 100644 --- a/testing/tests/ikev2/start-action-start/hosts/sun/etc/strongswan.conf +++ b/testing/tests/ikev2/start-action-start/hosts/sun/etc/strongswan.conf @@ -3,6 +3,6 @@ charon-systemd { load = random nonce openssl pem pkcs1 revocation curl kernel-netlink socket-default updown vici - # disable DoS protection as the initator will create a lot of IKE_SAs in this scenario + # disable DoS protection as the initiator will create a lot of IKE_SAs in this scenario dos_protection = no }