]> git.ipfire.org Git - thirdparty/strongswan.git/commitdiff
Fixed some typos, courtesy of codespell
authorTobias Brunner <tobias@strongswan.org>
Mon, 25 Mar 2013 09:59:37 +0000 (10:59 +0100)
committerTobias Brunner <tobias@strongswan.org>
Mon, 25 Mar 2013 09:59:37 +0000 (10:59 +0100)
NEWS
src/charon-tkm/src/tkm/tkm.h
src/charon-tkm/src/tkm/tkm_chunk_map.h
src/libcharon/plugins/eap_radius/eap_radius_provider.c
src/libcharon/sa/ikev1/task_manager_v1.c

diff --git a/NEWS b/NEWS
index 10c8353b890a27dddc44331e5d6a6d65baed2d8c..b95698d910cb6cded40d99170d228d5a5ec6eca2 100644 (file)
--- a/NEWS
+++ b/NEWS
@@ -480,7 +480,7 @@ strongswan-4.5.1
   ./configure switch.
 
 - The new libstrongswan constraints plugin provides advanced X.509 constraint
-  checking. In additon to X.509 pathLen constraints, the plugin checks for
+  checking. In addition to X.509 pathLen constraints, the plugin checks for
   nameConstraints and certificatePolicies, including policyMappings and
   policyConstraints. The x509 certificate plugin and the pki tool have been
   enhanced to support these extensions. The new left/rightcertpolicy ipsec.conf
index 7c711312b428d1c28ce721ed57b79ca3df4abfb2..fb5acd1176b9cb35550970fddcb06d61e67fe4de 100644 (file)
@@ -95,7 +95,7 @@ struct tkm_t {
 /**
  * Initialize trusted key manager, creates "tkm" instance.
  *
- * @return                             FALSE if initialization error occured
+ * @return                             FALSE if initialization error occurred
  */
 bool tkm_init();
 
index 648257574ab56fd83d3c74c412ad11e2db4c47cc..c183937c1aa33083fc6e954f2cda4469ad0bfb4e 100644 (file)
@@ -52,7 +52,7 @@ struct tkm_chunk_map_t {
        /**
         * Remove mapping for given chunk.
         *
-        * @param data  data specifiying the mapping to remove
+        * @param data  data specifying the mapping to remove
         * @return              TRUE if mapping was removed, FALSE otherwise
         */
        bool (*remove)(tkm_chunk_map_t * const this, chunk_t *data);
index 83fa838303c920b074da07f298502c5a5155edab..6087313b5c129be452acb169a40a58227633986f 100644 (file)
@@ -254,7 +254,7 @@ METHOD(listener_t, message_hook, bool,
                         message->get_exchange_type(message) == IKE_AUTH))
                {
                        /* if the addresses have not been claimed yet, they won't. Release
-                        * these ressources. */
+                        * these resources. */
                        release_unclaimed(this, ike_sa);
                }
        }
@@ -267,7 +267,7 @@ METHOD(listener_t, ike_updown, bool,
        if (!up)
        {
                /* if the message hook does not apply because of a failed exchange
-                * or something, make sure we release any ressources now */
+                * or something, make sure we release any resources now */
                release_unclaimed(this, ike_sa);
        }
        return TRUE;
index 20629a05e1e93341451d25626f768e32deb3f9f5..709033cb55b3e5f89fde76349843fbb6bcf5cbb4 100644 (file)
@@ -1490,7 +1490,7 @@ METHOD(task_manager_t, process_message, status_t,
                        return SUCCESS;
                }
 
-               /* reject Main/Agressive Modes once established */
+               /* reject Main/Aggressive Modes once established */
                if (msg->get_exchange_type(msg) == ID_PROT ||
                        msg->get_exchange_type(msg) == AGGRESSIVE)
                {