fi
##############################################################################
-# Check if non-empty certficate already exists
+# Check if non-empty certificate already exists
#
if [ -s $HOSTCERT ]
then
#!/bin/bash
# Install the present and past CA certificates in the ldap_tls_cacertdir
-# directory defined by sssd.conf, folllowed by the execution of the
+# directory defined by sssd.conf, followed by the execution of the
# openssl_rehash command in that directory so that the SSSD daemon can verify
# the LDAP server certificate.
#
be requested on demand). For other key types use \fI\-\-priv\fR.
.TP
.BI "\-\-priv " path
-Pivate key to use for authentication (if a password is required, it will
+Private key to use for authentication (if a password is required, it will
be requested on demand).
.TP
.BI "\-\-p12 " path
}
/**
- * Copy RADIUS attribute nofifies from IKE message to queue
+ * Copy RADIUS attribute notifies from IKE message to queue
*/
static void ike2queue(message_t *message, linked_list_t *queue,
linked_list_t *selector)
bool ignore = FALSE;
int family;
- /* ignore multi- and broadcast TS, othewise, install a route without
+ /* ignore multi- and broadcast TS, otherwise, install a route without
* preferred source IP to forward non-local traffic via TUN device */
switch (src_ts->get_type(src_ts))
{
}
/**
- * Add a HW offload attribuet to the given policy-related message.
+ * Add a HW offload attribute to the given policy-related message.
*/
static bool add_hw_offload_policy(struct nlmsghdr *hdr, int buflen,
policy_entry_t *policy,
json_object* (*get_jrequest)(imv_swima_state_t *this);
/**
- * Set the number of still missing SW [ID] records or envents
+ * Set the number of still missing SW [ID] records or events
*
- * @param count Number of missing SW [ID] records or envents
+ * @param count Number of missing SW [ID] records or events
*/
void (*set_missing)(imv_swima_state_t *this, uint32_t count);
*
* @param ke key exchange method to test
* @param create constructor function for the key exchange method
- * @param speed speeed test result, NULL to omit
+ * @param speed speed test result, NULL to omit
* @return TRUE if test passed
*/
bool (*test_ke)(crypto_tester_t *this, key_exchange_method_t ke,
/**
* Concatenates two bignums into a chunk, thereby enforcing the length of
- * a single BIGNUM, if necessary, by pre-pending it with zeros.
+ * a single BIGNUM, if necessary, by prepending it with zeros.
*
* Note: this function allocates memory for the chunk
*
/**
* Concatenates two integers into a chunk, thereby enforcing the length of
- * a single integer, if necessary, by pre-pending it with zeros.
+ * a single integer, if necessary, by prepending it with zeros.
*
* Note: this function allocates memory for the chunk
*
* Generate a X.509 OCSP response.
*
* The resulting builder accepts:
- * BUILD_OCSP_STATUS: status from OCSP respnder
+ * BUILD_OCSP_STATUS: status from OCSP responder
* BUILD_OCSP_RESPONSES: enumerator over the list of OCSP single responses
* BUILD_NONCE: nonce extracted from the OCSP request
* BUILD_SIGNING_CERT: certificate to create OCSP response signature
/**
* munmap() a chunk previously mapped with chunk_map().
*
- * When unmapping a writeable map, the return value should be checked to
+ * When unmapping a writable map, the return value should be checked to
* ensure changes landed on disk.
*
* @param chunk pointer returned from chunk_map()
*
* @note Writable maps (i.e. created with wr = TRUE) are NOT cleared.
*
- * When unmapping a writeable map, the return value should be checked to
+ * When unmapping a writable map, the return value should be checked to
* ensure changes landed on disk.
*
* @param chunk pointer returned from chunk_map()
#endif
/**
- * Address santizer support
+ * Address sanitizer support
*/
#if __has_feature(address_sanitizer) || \
(defined(__GNUC__) && defined(__SANITIZE_ADDRESS__))
}
certs->destroy(certs);
- /* otherwise trust in root CA has to be established manuallly */
+ /* otherwise trust in root CA has to be established manually */
if (!trusted)
{
creds->add_cert(creds, TRUE, cert->get_ref(cert));