*
* - If 'recv Synchronization-Failure { ... }' returned a failure
* rcode, enter the FAILURE-NOTIFICATION state.
- * - ...or if no 'recv Syncronization-Failure { ... }' section was
+ * - ...or if no 'recv Synchronization-Failure { ... }' section was
* defined, then enter the FAILURE-NOTIFICATION state.
* - ...or if the user didn't provide a new SQN value in &control.SQN
* then enter the FAILURE-NOTIFICATION state.
* - ...or enter the AKA-CHALLENGE state.
*/
-RESUME(recv_aka_syncronization_failure)
+RESUME(recv_aka_synchronization_failure)
{
eap_aka_sim_process_conf_t *inst = talloc_get_type_abort(mctx->inst->data, eap_aka_sim_process_conf_t);
eap_aka_sim_session_t *eap_aka_sim_session = talloc_get_type_abort(mctx->rctx, eap_aka_sim_session_t);
* then it's highly likely whatever user configured action was
* configured was unsuccessful, and we should just give up.
*/
- if (!inst->actions.recv_aka_syncronization_failure || eap_aka_sim_session->prev_recv_sync_failure) {
+ if (!inst->actions.recv_aka_synchronization_failure || eap_aka_sim_session->prev_recv_sync_failure) {
failure:
return STATE_TRANSITION(common_failure_notification);
}
* - EAP-Response/AKA-Challenge - call 'recv Challenge-Response { ... }'.
* - EAP-Response/AKA-Authentication-Reject - call 'recv Authentication-Reject { ... }' and after that
* send a EAP-Request/SIM-Notification indicating a General Failure.
- * - EAP-Response/AKA-Syncronization-Failure - call 'recv Syncronization-Failure { ... }'.
+ * - EAP-Response/AKA-Synchronization-Failure - call 'recv Syncronization-Failure { ... }'.
* - EAP-Response/AKA-Client-Error - call 'recv Client-Error { ... }' and after that
* send a EAP-Request/AKA-Notification indicating a General Failure.
* - Anything else, enter the FAILURE-NOTIFICATION state.
goto failure;
}
- return CALL_SECTION(recv_aka_syncronization_failure);
+ return CALL_SECTION(recv_aka_synchronization_failure);
}
/*
CONF_SECTION *recv_aka_authentication_reject;//!< Called if the supplicant rejects the
///< authentication attempt.
- CONF_SECTION *recv_aka_syncronization_failure;//!< Called if the supplicant determines
+ CONF_SECTION *recv_aka_synchronization_failure;//!< Called if the supplicant determines
///< the AUTN value is invalid.
///< Usually used for resyncing with the HLR.
///< an error of some kind.
CONF_SECTION *recv_authentication_reject; //!< Called if the supplicant rejects the
///< authentication attempt.
- CONF_SECTION *recv_syncronization_failure; //!< Called if the supplicant determines
+ CONF_SECTION *recv_synchronization_failure; //!< Called if the supplicant determines
///< the AUTN value is invalid.
///< Usually used for resyncing with the HLR.
This file must exist and must point to a valid libunbound configuration file.
The default is ${raddbdir}/mods-config/unbound/default.conf.
.IP timeout
-While libunbound provides an asyncronous API for internal use, using any xlat
-is done syncronously from the perspective of unlang. This value limits the
+While libunbound provides an asynchronous API for internal use, using any xlat
+is done synchronously from the perspective of unlang. This value limits the
amount of time a request will wait for DNS to respond, after which the xlat
will fail. The default is 3000 milliseconds. This setting is independent of
any libunbound configuration values.
},
{
.name = "recv",
- .name2 = "Syncronization-Failure",
+ .name2 = "Synchronization-Failure",
.component = MOD_AUTHORIZE,
- .offset = offsetof(eap_aka_sim_process_conf_t, actions.recv_aka_syncronization_failure)
+ .offset = offsetof(eap_aka_sim_process_conf_t, actions.recv_aka_synchronization_failure)
},
/*
},
{
.name = "recv",
- .name2 = "Syncronization-Failure",
+ .name2 = "Synchronization-Failure",
.component = MOD_AUTHORIZE,
- .offset = offsetof(eap_aka_sim_process_conf_t, actions.recv_aka_syncronization_failure)
+ .offset = offsetof(eap_aka_sim_process_conf_t, actions.recv_aka_synchronization_failure)
},
/*