different from the existing sd_device_enumerator_add_match_property()
matches of which one one needs to apply.
- * The MAC adress the veth side of an nspawn container shall get
+ * The MAC address the veth side of an nspawn container shall get
assigned may now be controlled via the $SYSTEMD_NSPAWN_NETWORK_MAC
environment variable.
<refsect1>
<title>Exit status</title>
- <para>If an error occured the value errno is propagated to the return code.
+ <para>If an error occurred the value errno is propagated to the return code.
Otherwise EXIT_SUCCESS is returned.</para>
</refsect1>
and <literal>content_type</literal> record fields are not used and ignored if present. Each pcrlock file
defines one set of expected, ordered PCR measurements of a specific component of the boot.</para>
- <para>*.pcrlock files may be placed in various <filename>.d/</filename> drop-in directores (see above for
- a full list). All matching files discovered in these directories are sorted alphabetically by their file
- name (without taking the actual directory they were found in into account): pcrlock files with
+ <para>*.pcrlock files may be placed in various <filename>.d/</filename> drop-in directories (see above
+ for a full list). All matching files discovered in these directories are sorted alphabetically by their
+ file name (without taking the actual directory they were found in into account): pcrlock files with
alphabetically earlier names are expected to cover measurements done before those with alphabetically
later names. In order to make positioning pcrlock files in the boot process convenient the files are
expected (by convention, this is not enforced) to be named
records[found] = rec;
}
- /* Check for existance */
+ /* Check for existence */
for (size_t i = 0; i < ELEMENTSOF(table); i++)
if (table[i].required && !records[i])
return log_error_errno(SYNTHETIC_ERRNO(EBADMSG), "Required record '%s' not found, refusing.", table[i].name);
if (r < 0)
return log_error_errno(r, "Failed to append JSON record array: %m");
- /* And then apppend a record for the section contents digests as well */
+ /* And then append a record for the section contents digests as well */
r = json_variant_append_arrayb(
&array,
JSON_BUILD_OBJECT(
assert_se(prediction);
assert_se(pcr_policy);
- /* Start with a zero policy if not specified otheriwse */
+ /* Start with a zero policy if not specified otherwise. */
TPM2B_DIGEST super_pcr_policy_digest = *pcr_policy;
/* First we look for all PCRs that have exactly one allowed hash value, and generate a single PolicyPCR policy from them */