Misspellings found by codespell.
I have left out files that appear to have been generated, such as:
scripts/boiler.mk
which has been generated from:
https://github.com/dmoulding/boilermake
}
}
-// reenable once we can style the number too
+// re-enable once we can style the number too
//.qanda > ol > li > p > em:only-child {
// color: darken($primary-color, 5%);
//}
This mode will download the specified artifact and extract the
reproducers that it contains. (The list of available fuzzer
- artifacts is ouput by the preceeding mode.)
+ artifacts is output by the preceding mode.)
artifact-zip - "path/to/downloaded/artifact/fuzzer-radius-701e5be.zip"
closures[value] = { testEnv_str ->
def(dir,testEnv) = testEnv_str.split(":")
stage("$testEnv") {
- // Docker needs full privileges and capabilites to run the tests
+ // Docker needs full privileges and capabilities to run the tests
// This passes the necessary arguments to "docker run"
travisImage.inside("--privileged --cap-add=ALL") {
checkout([$class: 'GitSCM',\
--- Simple API represending a slow response for testing timeouts
+-- Simple API representing a slow response for testing timeouts
local t0 = os.clock()
while os.clock() - t0 <= 2 do end
# installed by the distribution packaging.
#
# We want the run-time environment to be lean, typical of a fresh system
-# installation so that we catch any missing runtime dependancies, assets
+# installation so that we catch any missing runtime dependencies, assets
# missing from the packages, issues with the dynamic loader, etc.
#
# Therefore we skip the usual build framework so that we do not have so
#
-# Documentation build dependecies
+# Documentation build dependencies
#
# - doxygen & JSON.pm
#
-# Use LTB's openldap packages intead of the distribution version to avoid linking against NSS
+# Use LTB's openldap packages instead of the distribution version to avoid linking against NSS
#
RUN echo $'[ltb-project]\n\
name=LTB project packages\n\
#
-# Documentation build dependecies
+# Documentation build dependencies
#
# - doxygen & JSON.pm
#
-# Documentation build dependecies
+# Documentation build dependencies
#
# - doxygen & JSON.pm
#
-# Documentation build dependecies
+# Documentation build dependencies
#
# - doxygen & JSON.pm
#
-# Documentation build dependecies
+# Documentation build dependencies
#
# - doxygen & JSON.pm
#
-# Documentation build dependecies
+# Documentation build dependencies
#
# - doxygen & JSON.pm
#
-# Documentation build dependecies
+# Documentation build dependencies
#
# - doxygen & JSON.pm
my %passwords;
# This might or might not be necessary depending if your LDAP server
-# when importing from ldif introduces crypted passwords in the LDAP db
+# when importing from ldif introduces encrypted passwords in the LDAP db
# (not necessary for Netscape's Directory Server)
read_passwds ($opt_f) if $opt_f;
$mapping{'framed-netmask'} = "radiusFramedIPNetmask";
$mapping{'user-service'} = "radiusServiceType";
# Since this might not change they could be placed in the DEFAULT
-# user insted of the LDAP
+# user instead of the LDAP
#$mapping{'ascend-metric'} = "radiusAscendMetric";
#$mapping{'ascend-idle-limit'} = "radiusAscendIdleLimit";
# But this really ought to be there :
exit 0;
sub read_passwds {
-# Reads passwords from a file in order to get the crypted
+# Reads passwords from a file in order to get the encrypted
# version, the file must be of the following format:
# password cryptedversion
my ($file)=@_;
The files in this directory replace the old FreeRADIUS SNMP
-implementantion with a new one.
+implementation with a new one.
net-radius-freeradius-dictionary.diff
Patch to enable the Perl Net::RADIUS module to read the
#
# Will create a pool from a sparsely populated IPv4 range for a /16
# network (maximum of 65.536 addresses), populating the range with 10,000
-# addreses. The effective size of the pool can be increased in future by
+# addresses. The effective size of the pool can be increased in future by
# increasing the capacity of the range with:
#
# generate_pool_addresses.pl main_pool 10.66.0.0 10.66.255.255 20000
if ($range_size < $capacity) {
$capacity = "$range_size";
- warn "WARNING: Insufficent IPs in the range. Will create $capacity entries.";
+ warn "WARNING: Insufficient IPs in the range. Will create $capacity entries.";
}
# Prune the entries to only those within the specified range
# the size of the range. It becomes slower as the population of a range nears
# the range's limit since it is harder to choose a free address at random.
#
-# It is useful for selecting a handful of addresses from an enourmous IPv6 /64
+# It is useful for selecting a handful of addresses from an enormous IPv6 /64
# network for example.
#
sub sparse_fill {
my ($dbinfo,$query) = @_;
debug ">";
until ($dbinfo->{handle}->do($query)) {
- # If an error occured and we're disconnected then try to recomnnect
+ # If an error occurred and we're disconnected then try to recomnnect
# and redo the query, otherwise give up so we don't become stuck.
print $dbinfo->{handle}->errstr."\n";
if ($dbinfo->{handle}->ping) {
# different SQL dialects.
#
# The SQL first creates a temporary table to insert the new pools into,
-# inserts the addresses, then removes any exisitng entries from the pool
+# inserts the addresses, then removes any existing entries from the pool
# table that do not exist in the new pool. Finally any new entries that
# don't exist in the existing pool table are copied from the temporary
# table.
#
# Will create a pool from a sparsely populated IPv4 range for a /16
# network (maximum of 65.536 addresses), populating the range with 10,000
-# addreses. With SQL output suitable for MySQL.
+# addresses. With SQL output suitable for MySQL.
# The effective size of the pool can be increased in future by increasing
# the capacity of the range with:
#
if ($range_size < $capacity) {
$capacity = "$range_size";
- warn 'WARNING: Insufficent IPs in the range. Will create '.$capacity.' entries.';
+ warn 'WARNING: Insufficient IPs in the range. Will create '.$capacity.' entries.';
}
# Prune the entries to only those within the specified range
# the size of the range. It becomes slower as the population of a range nears
# the range's limit since it is harder to choose a free address at random.
#
-# It is useful for selecting a handful of addresses from an enourmous IPv6 /64
+# It is useful for selecting a handful of addresses from an enormous IPv6 /64
# network for example.
#
sub sparse_fill {
DEBUG "Error creating archive for '$LOGFP'"
exit 65
elif ! rm -rf $LOGDD; then
- DEBUG "Error removing uncompresed directory"
+ DEBUG "Error removing uncompressed directory"
exit 65
fi
fi
)
parser.add_argument("-i",
dest = "iter",
- help = "Number of interations. (default: {})".format(DEFAULT_INTERATIONS),
+ help = "Number of iterations. (default: {})".format(DEFAULT_INTERATIONS),
type = int,
required = False,
default = DEFAULT_INTERATIONS
print("* Verbose: {}".format(args.verbose))
if args.verbose >= 1:
print("* Parallel: {}".format(args.parallel))
- print("* Interations: {}".format(args.iter))
+ print("* Iterations: {}".format(args.iter))
print("* dict_dir: {}".format(args.dict_dir))
print("* eapol_test_bin: {}".format(args.eapol_test_bin))
print("* eapol_test ctrl: {}".format(args.eapol_ctrl))
# - C=x.x.x.x: Ignored packet sniffed from unknown client.
# - D: Dropped sniffed packet due to processing bottleneck. Consider
# increasing THREADS.
-# - I: Invalid/unparseable packet sniffed.
+# - I: Invalid/unparsable packet sniffed.
# - Mreq: Response was sniffed without sniffing a corresponding request.
# - Mresp: Request was sniffed without sniffing a corresponding response.
# - T: Request to test server timed out.