From: Tobias Brunner Date: Mon, 25 Mar 2013 09:59:37 +0000 (+0100) Subject: Fixed some typos, courtesy of codespell X-Git-Tag: 5.0.3~50 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=cf95d2926caf45c1d3647dc65bfb70ca1b207d4d;p=thirdparty%2Fstrongswan.git Fixed some typos, courtesy of codespell --- diff --git a/NEWS b/NEWS index 10c8353b89..b95698d910 100644 --- a/NEWS +++ b/NEWS @@ -480,7 +480,7 @@ strongswan-4.5.1 ./configure switch. - The new libstrongswan constraints plugin provides advanced X.509 constraint - checking. In additon to X.509 pathLen constraints, the plugin checks for + checking. In addition to X.509 pathLen constraints, the plugin checks for nameConstraints and certificatePolicies, including policyMappings and policyConstraints. The x509 certificate plugin and the pki tool have been enhanced to support these extensions. The new left/rightcertpolicy ipsec.conf diff --git a/src/charon-tkm/src/tkm/tkm.h b/src/charon-tkm/src/tkm/tkm.h index 7c711312b4..fb5acd1176 100644 --- a/src/charon-tkm/src/tkm/tkm.h +++ b/src/charon-tkm/src/tkm/tkm.h @@ -95,7 +95,7 @@ struct tkm_t { /** * Initialize trusted key manager, creates "tkm" instance. * - * @return FALSE if initialization error occured + * @return FALSE if initialization error occurred */ bool tkm_init(); diff --git a/src/charon-tkm/src/tkm/tkm_chunk_map.h b/src/charon-tkm/src/tkm/tkm_chunk_map.h index 648257574a..c183937c1a 100644 --- a/src/charon-tkm/src/tkm/tkm_chunk_map.h +++ b/src/charon-tkm/src/tkm/tkm_chunk_map.h @@ -52,7 +52,7 @@ struct tkm_chunk_map_t { /** * Remove mapping for given chunk. * - * @param data data specifiying the mapping to remove + * @param data data specifying the mapping to remove * @return TRUE if mapping was removed, FALSE otherwise */ bool (*remove)(tkm_chunk_map_t * const this, chunk_t *data); diff --git a/src/libcharon/plugins/eap_radius/eap_radius_provider.c b/src/libcharon/plugins/eap_radius/eap_radius_provider.c index 83fa838303..6087313b5c 100644 --- a/src/libcharon/plugins/eap_radius/eap_radius_provider.c +++ b/src/libcharon/plugins/eap_radius/eap_radius_provider.c @@ -254,7 +254,7 @@ METHOD(listener_t, message_hook, bool, message->get_exchange_type(message) == IKE_AUTH)) { /* if the addresses have not been claimed yet, they won't. Release - * these ressources. */ + * these resources. */ release_unclaimed(this, ike_sa); } } @@ -267,7 +267,7 @@ METHOD(listener_t, ike_updown, bool, if (!up) { /* if the message hook does not apply because of a failed exchange - * or something, make sure we release any ressources now */ + * or something, make sure we release any resources now */ release_unclaimed(this, ike_sa); } return TRUE; diff --git a/src/libcharon/sa/ikev1/task_manager_v1.c b/src/libcharon/sa/ikev1/task_manager_v1.c index 20629a05e1..709033cb55 100644 --- a/src/libcharon/sa/ikev1/task_manager_v1.c +++ b/src/libcharon/sa/ikev1/task_manager_v1.c @@ -1490,7 +1490,7 @@ METHOD(task_manager_t, process_message, status_t, return SUCCESS; } - /* reject Main/Agressive Modes once established */ + /* reject Main/Aggressive Modes once established */ if (msg->get_exchange_type(msg) == ID_PROT || msg->get_exchange_type(msg) == AGGRESSIVE) {