to the distinguished name of the certificate's subject and
.B leftca
to the distinguished name of the certificate's issuer.
-The left participant's ID can be overriden by specifying a
+The left participant's ID can be overridden by specifying a
.B leftid
value which must be certified by the certificate, though.
.TP
}
else
{
- fprintf(stderr, "unkown key type: '%s'\n", type);
+ fprintf(stderr, "unknown key type: '%s'\n", type);
enumerator->destroy(enumerator);
return FALSE;
}
}
else
{
- DBG1(DBG_CFG, "unkown payload to sort: '%s', skipped", name);
+ DBG1(DBG_CFG, "unknown payload to sort: '%s', skipped", name);
}
}
order->destroy(order);
payload_t *payload_create(payload_type_t type);
/**
- * Check if a specific payload is implemented, or handled as unkown payload.
+ * Check if a specific payload is implemented, or handled as unknown payload.
*
* @param type type of the payload to check
- * @return FALSE if payload type handled as unkown payload
+ * @return FALSE if payload type handled as unknown payload
*/
bool payload_is_known(payload_type_t type);
case INTERNAL_ADDRESS_FAILURE:
case FAILED_CP_REQUIRED:
{
- DBG1(DBG_IKE,"configuration payload negotation "
+ DBG1(DBG_IKE,"configuration payload negotiation "
"failed, no CHILD_SA built");
enumerator->destroy(enumerator);
handle_child_sa_failure(this, message);
* Lookup the EAP method type from a string.
*
* @param name EAP method name (such as "md5", "aka")
- * @return method type, 0 if unkown
+ * @return method type, 0 if unknown
*/
eap_type_t eap_type_from_string(char *name);
}
break;
default:
- /* unkown accessMethod, ignoring */
+ /* unknown accessMethod, ignoring */
break;
}
break;
/**
* Check if TLS negotiation completed successfully.
*
- * @return TRUE if TLS negotation and authentication complete
+ * @return TRUE if TLS negotiation and authentication complete
*/
bool (*is_complete)(tls_t *this);
if (strncasecmp(msg->ocspuri, "http", 4) == 0)
ca->ocspuri = clone_str(msg->ocspuri);
else
- plog(" ignoring ocspuri with unkown protocol");
+ plog(" ignoring ocspuri with unknown protocol");
}
/* add crl uris */
}
else if (from_ugh != NULL)
{
- plog("recvfrom on %s returned misformed source sockaddr: %s"
+ plog("recvfrom on %s returned malformed source sockaddr: %s"
, ifp->rname, from_ugh);
return FALSE;
}
.PP
.B \-C, \-\-debug\-control
.RS 4
-Log informations about control flow.
+Log information about control flow.
.RE
.PP
.B \-M, \-\-debug\-controlmore
.RS 4
-Log more detailed informations about control flow.
+Log more detailed information about control flow.
.RE
.PP
.B \-X, \-\-debug\-private
The authentication is based on RSA signatures (<b>RSASIG</b>) using X.509
certificates followed by extended authentication (<b>XAUTH</b>) based
on user name and password. Because user <b>carol</b> presents a wrong
-XAUTH password the IKE negotation is aborted and the ISAKMP SA is deleted.
+XAUTH password the IKE negotiation is aborted and the ISAKMP SA is deleted.
The authentication is based on RSA signatures (<b>RSASIG</b>) using X.509
certificates followed by extended authentication (<b>XAUTH</b>) based
on user name and password. Because user <b>carol</b> cannot find her
-XAUTH credentials in ipsec.secrets, the IKE negotation is aborted and the
+XAUTH credentials in ipsec.secrets, the IKE negotiation is aborted and the
ISAKMP SA is deleted.