ip->passwords = get_passwords();
if (ospf_cfg_is_v2() && (ip->autype == OSPF_AUTH_CRYPT) && (ip->helloint < 5))
- cf_warn("Hello or poll interval less that 5 makes cryptographic authenication prone to replay attacks");
+ cf_warn("Hello or poll interval less that 5 makes cryptographic authentication prone to replay attacks");
if ((ip->autype == OSPF_AUTH_NONE) && (ip->passwords != NULL))
cf_warn("Password option without authentication option does not make sense");
static const char *str_cache_states[] = {
[RPKI_CS_CONNECTING] = "Connecting",
[RPKI_CS_ESTABLISHED] = "Established",
- [RPKI_CS_RESET] = "Reseting",
+ [RPKI_CS_RESET] = "Resetting",
[RPKI_CS_SYNC_START] = "Sync-Start",
[RPKI_CS_SYNC_RUNNING] = "Sync-Running",
[RPKI_CS_FAST_RECONNECT] = "Fast-Reconnect",
break;
case SSH_KNOWN_HOSTS_OTHER:
- LOG_WARN_ABOUT_SSH_SERVER_VALIDATION(s, "The server gave use a key of a type while we had an other type recorded. " \
+ LOG_WARN_ABOUT_SSH_SERVER_VALIDATION(s, "The server gave use a key of a type while we had another type recorded. " \
"It is a possible attack.");
server_identity_is_ok = 0;
break;