From: Tobias Brunner Date: Thu, 20 Dec 2012 08:31:38 +0000 (+0100) Subject: Fixed some typos, courtesy of codespell X-Git-Tag: 5.0.2dr4~33 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=ef33a4ab82994b24f984c2dd02ea034498b24ad3;p=thirdparty%2Fstrongswan.git Fixed some typos, courtesy of codespell --- diff --git a/NEWS b/NEWS index 2c689bed73..05c5cc1e2c 100644 --- a/NEWS +++ b/NEWS @@ -411,7 +411,7 @@ strongswan-4.5.1 ./configure switch. - The new libstrongswan constraints plugin provides advanced X.509 constraint - checking. In additon to X.509 pathLen constraints, the plugin checks for + checking. In addition to X.509 pathLen constraints, the plugin checks for nameConstraints and certificatePolicies, including policyMappings and policyConstraints. The x509 certificate plugin and the pki tool have been enhanced to support these extensions. The new left/rightcertpolicy ipsec.conf diff --git a/src/libcharon/bus/bus.h b/src/libcharon/bus/bus.h index 105375ae48..4645bbde6b 100644 --- a/src/libcharon/bus/bus.h +++ b/src/libcharon/bus/bus.h @@ -122,7 +122,7 @@ enum alert_t { ALERT_INSTALL_CHILD_POLICY_FAILED, /** IKE_SA deleted because of "replace" unique policy, no argument */ ALERT_UNIQUE_REPLACE, - /** IKE_SA deleted because of "keep" unique policy, no arguement */ + /** IKE_SA deleted because of "keep" unique policy, no argument */ ALERT_UNIQUE_KEEP, /** IKE_SA kept on failed child SA establishment, no argument */ ALERT_KEEP_ON_CHILD_SA_FAILURE, diff --git a/src/libcharon/encoding/payloads/ike_header.h b/src/libcharon/encoding/payloads/ike_header.h index e6b7d0dff6..d9a44dd0cc 100644 --- a/src/libcharon/encoding/payloads/ike_header.h +++ b/src/libcharon/encoding/payloads/ike_header.h @@ -72,7 +72,7 @@ enum exchange_type_t{ AUTH_ONLY = 3, /** - * Aggresive (Aggressive mode) + * Aggressive (Aggressive mode) */ AGGRESSIVE = 4, diff --git a/src/libcharon/plugins/lookip/lookip_listener.c b/src/libcharon/plugins/lookip/lookip_listener.c index f1f630f37d..caf336a2e3 100644 --- a/src/libcharon/plugins/lookip/lookip_listener.c +++ b/src/libcharon/plugins/lookip/lookip_listener.c @@ -232,7 +232,7 @@ METHOD(listener_t, ike_rekey, bool, { /* During IKE_SA rekey, the unique identifier changes. Fire update events * and update the cached entry. During the invocation of this hook, the - * virutal IPs have been migrated to new, hence remove that entry. */ + * virtual IPs have been migrated to new, hence remove that entry. */ remove_entry(this, new); add_entry(this, new); diff --git a/src/libcharon/plugins/unity/unity_handler.c b/src/libcharon/plugins/unity/unity_handler.c index b8d571dde1..31d13add27 100644 --- a/src/libcharon/plugins/unity/unity_handler.c +++ b/src/libcharon/plugins/unity/unity_handler.c @@ -115,7 +115,7 @@ static bool add_include(private_unity_handler_t *this, chunk_t subnet) } /** - * Rempve a subnet from the inclusion list for this IKE_SA + * Remove a subnet from the inclusion list for this IKE_SA */ static bool remove_include(private_unity_handler_t *this, chunk_t subnet) { diff --git a/src/libcharon/sa/ikev1/tasks/isakmp_natd.c b/src/libcharon/sa/ikev1/tasks/isakmp_natd.c index 5a71c34d83..5a779ff622 100644 --- a/src/libcharon/sa/ikev1/tasks/isakmp_natd.c +++ b/src/libcharon/sa/ikev1/tasks/isakmp_natd.c @@ -385,7 +385,7 @@ METHOD(task_t, process_r, status_t, switch (message->get_exchange_type(message)) { case AGGRESSIVE: - { /* proccess NAT-D payloads in the second request, already added ours + { /* process NAT-D payloads in the second request, already added ours * in the first response */ result = SUCCESS; /* fall */ diff --git a/src/libcharon/sa/ikev2/tasks/child_create.c b/src/libcharon/sa/ikev2/tasks/child_create.c index 787c51eb28..eb3972c293 100644 --- a/src/libcharon/sa/ikev2/tasks/child_create.c +++ b/src/libcharon/sa/ikev2/tasks/child_create.c @@ -1163,7 +1163,7 @@ METHOD(task_t, process_i, status_t, break; } - /* check for erronous notifies */ + /* check for erroneous notifies */ enumerator = message->create_payload_enumerator(message); while (enumerator->enumerate(enumerator, &payload)) { diff --git a/src/libcharon/sa/ikev2/tasks/ike_init.c b/src/libcharon/sa/ikev2/tasks/ike_init.c index e2960273ca..7542937b3a 100644 --- a/src/libcharon/sa/ikev2/tasks/ike_init.c +++ b/src/libcharon/sa/ikev2/tasks/ike_init.c @@ -426,7 +426,7 @@ METHOD(task_t, process_i, status_t, enumerator_t *enumerator; payload_t *payload; - /* check for erronous notifies */ + /* check for erroneous notifies */ enumerator = message->create_payload_enumerator(message); while (enumerator->enumerate(enumerator, &payload)) { diff --git a/src/libstrongswan/crypto/nonce_gen.h b/src/libstrongswan/crypto/nonce_gen.h index 50f3c0090c..7dae4f7761 100644 --- a/src/libstrongswan/crypto/nonce_gen.h +++ b/src/libstrongswan/crypto/nonce_gen.h @@ -35,7 +35,7 @@ struct nonce_gen_t { * * @param size size of nonce in bytes * @param buffer pointer where the generated nonce will be written - * @return TRUE if nonce allocation was succesful, FALSE otherwise + * @return TRUE if nonce allocation was successful, FALSE otherwise */ bool (*get_nonce)(nonce_gen_t *this, size_t size, u_int8_t *buffer) __attribute__((warn_unused_result)); @@ -45,7 +45,7 @@ struct nonce_gen_t { * * @param size size of nonce in bytes * @param chunk chunk which will hold the generated nonce - * @return TRUE if nonce allocation was succesful, FALSE otherwise + * @return TRUE if nonce allocation was successful, FALSE otherwise */ bool (*allocate_nonce)(nonce_gen_t *this, size_t size, chunk_t *chunk) __attribute__((warn_unused_result)); diff --git a/src/libstrongswan/plugins/gmp/gmp_rsa_private_key.c b/src/libstrongswan/plugins/gmp/gmp_rsa_private_key.c index 74d99cafd9..052b10741d 100644 --- a/src/libstrongswan/plugins/gmp/gmp_rsa_private_key.c +++ b/src/libstrongswan/plugins/gmp/gmp_rsa_private_key.c @@ -211,7 +211,7 @@ static status_t compute_prime(size_t prime_size, bool safe, mpz_t *p, mpz_t *q) rng->destroy(rng); - /* additonally return p-1 */ + /* additionally return p-1 */ mpz_sub_ui(*q, *p, 1); return SUCCESS; diff --git a/src/libstrongswan/plugins/pkcs7/pkcs7_generic.c b/src/libstrongswan/plugins/pkcs7/pkcs7_generic.c index 13fe5f54ab..35d8d11a7e 100644 --- a/src/libstrongswan/plugins/pkcs7/pkcs7_generic.c +++ b/src/libstrongswan/plugins/pkcs7/pkcs7_generic.c @@ -116,7 +116,7 @@ pkcs7_t *pkcs7_generic_load(container_type_t type, va_list args) { if (blob.len >= 2 && blob.ptr[0] == ASN1_SEQUENCE && blob.ptr[1] == 0x80) - { /* looks like infinite lenght BER encoding, but we can't handle it. + { /* looks like infinite length BER encoding, but we can't handle it. * ignore silently, our openssl backend can handle it */ return NULL; }