struct apr_array_header_t *cert_files; /* != NULL iff pubcerts explicitly configured */
struct apr_array_header_t *pkey_files; /* != NULL iff privkeys explicitly configured */
const char *ca_eab_kid; /* optional KEYID for external account binding */
- const char *ca_eab_hmac; /* optional HMAC for external accont binding */
+ const char *ca_eab_hmac; /* optional HMAC for external account binding */
md_state_t state; /* state of this MD */
const char *state_descr; /* description of state of NULL */
/* RFC 8555 only requires "directory" and "newNonce" resources.
* mod_md uses "newAccount" and "newOrder" so check for them.
* But mod_md does not use the "revokeCert" or "keyChange"
- * resources, so tolerate the absense of those keys. In the
+ * resources, so tolerate the absence of those keys. In the
* future if mod_md implements revocation or key rollover then
* the use of those features should be predicated on the
* server's advertised capabilities. */
/* Create a "tls-alpn-01" certificate for the domain we want to authenticate.
* The server will need to answer a TLS connection with SNI == authz->domain
- * and ALPN procotol "acme-tls/1" with this certificate.
+ * and ALPN protocol "acme-tls/1" with this certificate.
*/
md_data_init_str(&data, cha->key_authz);
rv = md_crypt_sha256_digest_hex(&token, p, &data);
if (APR_SUCCESS != rv) goto leave;
if (!ad->order->certificate) {
- md_result_set(result, APR_EINVAL, "Order valid, but certifiate url is missing.");
+ md_result_set(result, APR_EINVAL, "Order valid, but certificate url is missing.");
goto leave;
}
md_result_set(result, APR_SUCCESS, NULL);
rv = md_cert_read_chain(chain, res->req->pool, data, data_len);
if (APR_SUCCESS == rv && chain->nelts == 0) {
md_log_perror(MD_LOG_MARK, MD_LOG_ERR, 0, p,
- "certificiate chain response did not contain any certificates "
+ "certificate chain response did not contain any certificates "
"(suspicious content-type: %s)", ct);
rv = APR_ENOENT;
}
{
apr_thread_mutex_lock(reg->mutex);
if (ostat->resp_der.len <= 0) {
- /* No resonse known, check the store if out watchdog retrieved one
+ /* No response known, check the store if out watchdog retrieved one
* in the meantime. */
ocsp_status_refresh(ostat, p);
}
switch ((n = OCSP_check_nonce(ostat->ocsp_req, basic_resp))) {
case 1:
md_log_perror(MD_LOG_MARK, MD_LOG_TRACE3, 0, req->pool,
- "req[%d]: OCSP respoonse nonce does match", req->id);
+ "req[%d]: OCSP response nonce does match", req->id);
break;
case 0:
rv = APR_EINVAL;
case -1:
md_log_perror(MD_LOG_MARK, MD_LOG_TRACE3, 0, req->pool,
- "req[%d]: OCSP respoonse did not return the nonce", req->id);
+ "req[%d]: OCSP response did not return the nonce", req->id);
break;
default:
break;
}
else {
state = MD_S_ERROR;
- state_descr = "error intializing";
+ state_descr = "error initializing";
md_log_perror(MD_LOG_MARK, MD_LOG_WARNING, rv, p, "md{%s}: error", md->name);
goto cleanup;
}
if (APR_SUCCESS == rv) {
md_json_setn(MD_STORE_VERSION, json, MD_KEY_STORE, MD_KEY_VERSION, NULL);
rv = md_json_freplace(json, ptemp, MD_JSON_FMT_INDENT, fname, MD_FPROT_F_UONLY);
- }
- md_log_perror(MD_LOG_MARK, MD_LOG_INFO, rv, p, "migrated store");
+ }
+ md_log_perror(MD_LOG_MARK, MD_LOG_INFO, rv, p, "migrated store");
}
}
return rv;
buffer[LOG_BUF_LEN-1] = '\0';
if (log_server) {
- ap_log_error(file, line, APLOG_MODULE_INDEX, (int)level, rv, log_server, "%s",buffer);
+ ap_log_error(file, line, APLOG_MODULE_INDEX, (int)level, rv, log_server, "%s", buffer);
}
else {
ap_log_perror(file, line, APLOG_MODULE_INDEX, (int)level, rv, p, "%s", buffer);
}
else if (APR_STATUS_IS_ENOENT(rv)) {
/* certificate for this pkey is not available, others might
- * if pkeys have been added for a runnign mdomain.
+ * if pkeys have been added for a running mdomain.
* see issue #260 */
rv = APR_SUCCESS;
}