uint8_t done_pside6;
/** the TLS authentication name, (if not NULL) to use. */
char* tls_auth_name;
- /** the port to use; it should mosty be the default 53 but configured
+ /** the port to use; it should mostly be the default 53 but configured
* upstreams can provide nondefault ports. */
int port;
};
struct matched_delegation_point match = {0};
if(ms->rpz_passthru) {
- verbose(VERB_ALGO, "query is rpz_passthru, no futher processing");
+ verbose(VERB_ALGO, "query is rpz_passthru, no further processing");
return NULL;
}
struct dns_msg* ret = NULL;
if(ms->rpz_passthru) {
- verbose(VERB_ALGO, "query is rpz_passthru, no futher processing");
+ verbose(VERB_ALGO, "query is rpz_passthru, no further processing");
return NULL;
}
/* add space */
/* when addlen < 2, the token buffer is full considering the NULL byte
* from strlen and will lead to buffer overflow with the second
- * assignement below. */
+ * assignment below. */
if(addlen < 2) return 0;
token[*token_strlen] = ' ';
token[++(*token_strlen)] = 0;
,sldns_str2wire_svcparam_key_cmp);
- /* The code below revolves around sematic errors in the SVCParam set.
+ /* The code below revolves around semantic errors in the SVCParam set.
* So long as we do not distinguish between running Unbound as a primary
* or as a secondary, we default to secondary behavior and we ignore the
- * sematic errors. */
+ * semantic errors. */
#ifdef SVCB_SEMANTIC_ERRORS
{
*/
qsort((void *)(rd + 4), count, sizeof(uint16_t), sldns_network_uint16_cmp);
- /* The code below revolves around sematic errors in the SVCParam set.
+ /* The code below revolves around semantic errors in the SVCParam set.
* So long as we do not distinguish between running Unbound as a primary
* or as a secondary, we default to secondary behavior and we ignore the
* semantic errors. */