* Activate a set of IKE_SAs identified by a segment.
*
* @param segment numerical segment to takeover, 0 for all
- * @param notify wheter to notify other nodes about activation
+ * @param notify whether to notify other nodes about activation
*/
void (*activate)(ha_segments_t *this, u_int segment, bool notify);
* Deactivate a set of IKE_SAs identified by a segment.
*
* @param segment numerical segment to takeover, 0 for all
- * @param notify wheter to notify other nodes about deactivation
+ * @param notify whether to notify other nodes about deactivation
*/
void (*deactivate)(ha_segments_t *this, u_int segment, bool notify);
bool do_http_lookup;
/**
- * wheter this is the final authentication round
+ * whether this is the final authentication round
*/
bool final;
};
* Send an e-mail message.
*
* @param from sender address
- * @param to receipient address
+ * @param to recipient address
* @param subject mail subject
* @param fmt mail body format string
* @param ... arguments for body format string
database_t *db;
/**
- * wheter to record lease history in lease table
+ * whether to record lease history in lease table
*/
bool history;
};
resolve_plugin_t public;
/**
- * The registerd DNS attribute handler
+ * The registered DNS attribute handler
*/
resolve_handler_t *handler;
};
"libimcv.plugins.imc-attestation.use_quote2", TRUE);
if (!pts->quote_tpm(pts, use_quote2, &pcr_composite, "e_sig))
{
- DBG1(DBG_IMC, "error occured during TPM quote operation");
+ DBG1(DBG_IMC, "error occurred during TPM quote operation");
return FALSE;
}
if (!pts->read_pcr(pts, extended_pcr, &pcr_after))
{
- DBG1(DBG_PTS, "error occured while reading PCR: %d", extended_pcr);
+ DBG1(DBG_PTS, "error occurred while reading PCR: %d", extended_pcr);
return FAILED;
}
}
else
{
- DBG1(DBG_PTS, "error: %s occured while validating path: %s",
+ DBG1(DBG_PTS, "error: %s occurred while validating path: %s",
strerror(errno), path);
return FALSE;
}
#define ASSESSMENT_SECRET_LEN 20
/**
- * Lenght of the TPM_QUOTE_INFO structure, TPM Spec 1.2
+ * Length of the TPM_QUOTE_INFO structure, TPM Spec 1.2
*/
#define TPM_QUOTE_INFO_LEN 48
* @param error_code Output variable for PTS error code
* @return TRUE if path is valid or file/directory
* doesn't exist or path is invalid
- * FALSE if local error occured within stat function
+ * FALSE if local error occurred within stat function
*/
bool (*is_path_valid)(pts_t *this, char *path, pts_error_code_t *error_code);
* Quote over PCR's
* Expects owner and SRK secret to be WELL_KNOWN_SECRET and no password set for AIK
*
- * @param use_quote2 Version of the Quote funtion to be used
+ * @param use_quote2 Version of the Quote function to be used
* @param pcr_comp Chunk to save PCR composite structure
* @param quote_sig Chunk to save quote operation output
* without external data (anti-replay protection)
if (!reader->read_uint16(reader, &len))
{
DBG1(DBG_TNC, "insufficient data for PTS Simple Component Evidence "
- "Verification Policy URI Lenght");
+ "Verification Policy URI Length");
goto end;
}
if (!reader->read_data(reader, len, &policy_uri))
if (!reader->read_uint32(reader, &pcr_comp_len))
{
DBG1(DBG_TNC, "insufficient data for PTS Simple Evidence Final "
- "PCR Composite Lenght");
+ "PCR Composite Length");
goto end;
}
if (!reader->read_data(reader, pcr_comp_len, &this->pcr_comp))
if (!reader->read_uint32(reader, &tpm_quote_sig_len))
{
DBG1(DBG_TNC, "insufficient data for PTS Simple Evidence Final "
- "TPM Quote Singature Lenght");
+ "TPM Quote Singature Length");
goto end;
}
if (!reader->read_data(reader, tpm_quote_sig_len, &this->tpm_quote_sig))
identification_t *pseudonym);
/**
- * Get a stored pseudonym from one of the registerd SIM cards.
+ * Get a stored pseudonym from one of the registered SIM cards.
*
* @param id permanent identity of the peer
* @return associated pseudonym identity, NULL if none found
u_int16_t counter);
/**
- * Retrieve fast reauthentication parameters from one of the registerd cards.
+ * Retrieve fast reauthentication parameters from one of the registered cards.
*
* @param id permanent identity of the peer
* @param mk buffer receiving master key MK
* Constructor function to build credentials.
*
* Any added parts are cloned/refcounted by the builder implementation.
- * Callers may need to free the passed ressources themselves.
+ * Callers may need to free the passed resources themselves.
*
* @param subtype constructor specific subtype, e.g. a certificate_type_t
* @param args list of builder part types, followed by parts, BUILD_END
#include <fetcher/fetcher.h>
/**
- * Fetches from URIs using registerd fetcher_t instances.
+ * Fetches from URIs using registered fetcher_t instances.
*/
struct fetcher_manager_t {
# The hosts stated here will be created. Possible values
# are sun, moon, dave, carol, alice, venus, bob, winnetou.
# It's fine to make them all unless you don't have much
-# ressources. In this case we assume you know what you do!
+# resources. In this case we assume you know what you do!
#
STRONGSWANHOSTS="sun moon dave carol alice venus bob winnetou"