Fixed some typos, courtesy of codespell

This commit is contained in:
Tobias Brunner 2018-05-23 16:06:45 +02:00
parent 1b67166921
commit 89bd016ef4
34 changed files with 36 additions and 36 deletions

2
NEWS
View File

@ -2089,7 +2089,7 @@ strongswan-4.2.0
refactored to support modular credential providers, proper
CERTREQ/CERT payload exchanges and extensible authorization rules.
- The framework of strongSwan Manager has envolved to the web application
- The framework of strongSwan Manager has evolved to the web application
framework libfast (FastCGI Application Server w/ Templates) and is usable
by other applications.

View File

@ -93,7 +93,7 @@ Absolutely silent
Very basic auditing logs, (e.g. SA up/SA down)
.TP
.B 1
Generic control flow with errors, a good default to see whats going on
Generic control flow with errors, a good default to see what's going on
.TP
.B 2
More detailed debugging control flow

View File

@ -233,7 +233,7 @@ static bool check_pidfile()
}
/* Only fchown() the pidfile if we have CAP_CHOWN. Otherwise,
* directory permissions should allow pidfile to be accessed
* by the UID/GID under which the charon deamon will run. */
* by the UID/GID under which the charon daemon will run. */
if (lib->caps->check(lib->caps, CAP_CHOWN))
{
ignore_result(fchown(fd,

View File

@ -58,7 +58,7 @@ void eap_radius_forward_from_ike(radius_message_t *request);
/**
* Forward RADIUS attributes from a RADIUS response to IKE notifies.
*
* @param response RADIUS respose to read notifies from
* @param response RADIUS response to read notifies from
*/
void eap_radius_forward_to_ike(radius_message_t *response);

View File

@ -34,7 +34,7 @@ typedef struct eap_radius_plugin_t eap_radius_plugin_t;
/**
* EAP RADIUS proxy plugin.
*
* This plugin provides not a single EAP method, but a proxy to forwared
* This plugin provides not a single EAP method, but a proxy to forward
* EAP packets to a RADIUS server. It only provides server implementations.
*/
struct eap_radius_plugin_t {

View File

@ -320,7 +320,7 @@ METHOD(ha_message_t, add_attribute, void,
* Attribute enumerator implementation
*/
typedef struct {
/** implementes enumerator_t */
/** implements enumerator_t */
enumerator_t public;
/** position in message */
chunk_t buf;

View File

@ -32,7 +32,7 @@
/**
* General purpose netlink buffer.
*
* Some platforms require an enforced aligment to four bytes (e.g. ARM).
* Some platforms require an enforced alignment to four bytes (e.g. ARM).
*/
typedef union {
struct nlmsghdr hdr;

View File

@ -249,7 +249,7 @@ static bool have_vips_from_pool(mem_pool_t *pool, linked_list_t *vips)
{
end = chunk_clone(start);
/* mem_pool is currenty limited to 2^31 addresses, so 32-bit
/* mem_pool is currently limited to 2^31 addresses, so 32-bit
* calculations should be sufficient. */
size = untoh32(start.ptr + start.len - sizeof(size));
htoun32(end.ptr + end.len - sizeof(size), size + pool->get_size(pool));

View File

@ -112,7 +112,7 @@ struct private_vici_config_t {
rwlock_t *lock;
/**
* Condvar used to snyc running actions
* Condvar used to sync running actions
*/
rwlock_condvar_t *condvar;

View File

@ -63,7 +63,7 @@ struct ike_mobike_t {
void (*dpd)(ike_mobike_t *this);
/**
* Transmision hook, called by task manager.
* Transmission hook, called by task manager.
*
* The task manager calls this hook whenever it transmits a packet. It
* allows the mobike task to send the packet on multiple paths to do path

View File

@ -24,7 +24,7 @@
*
* The application has a global context and a session context. The global
* context is accessed from all sessions simultaneously and therefore
* needs to be threadsave. Often a database wrapper is the global context.
* needs to be threadsafe. Often a database wrapper is the global context.
* The session context is instantiated per session. Sessions are managed
* automatically through session cookies. The session context is kept alive
* until the session times out. It must implement the context_t interface and

View File

@ -75,7 +75,7 @@ struct private_fast_request_t {
};
/**
* ClearSilver cgiwrap is not threadsave, so we use a private
* ClearSilver cgiwrap is not threadsafe, so we use a private
* context for each thread.
*/
static thread_value_t *thread_this;

View File

@ -113,7 +113,7 @@ static bool iterate_enforcements(database_t *db, int device_id, int session_id,
if (latest_success)
{
/*skipping enforcement */
printf("skipping enforcment %d\n", id);
printf("skipping enforcement %d\n", id);
continue;
}

View File

@ -29,7 +29,7 @@ typedef struct private_ita_attr_settings_t private_ita_attr_settings_t;
typedef struct entry_t entry_t;
/**
* Contains a settins name/value pair
* Contains a settings name/value pair
*/
struct entry_t {
char *name;

View File

@ -100,7 +100,7 @@ extern const chunk_t ASN1_INTEGER_2;
chunk_t asn1_algorithmIdentifier(int oid);
/**
* Build an algorithmIdentifier from a known OID and the given prameters.
* Build an algorithmIdentifier from a known OID and the given parameters.
*
* @param oid known OID index
* @param params parameters to encode in the algorithmIdentifier (adopted)

View File

@ -291,7 +291,7 @@ typedef struct {
char *string;
/** current position */
char *pos;
/** separater chars */
/** separator chars */
const char *sep;
/** trim chars */
const char *trim;

View File

@ -41,7 +41,7 @@ stream_service_t *stream_service_create_unix(char *uri, int backlog)
{ /* required to chown(2) service socket */
DBG1(DBG_NET, "cannot change ownership of socket '%s' without "
"CAP_CHOWN capability. socket directory should be accessible to "
"UID/GID under which the deamon will run", uri);
"UID/GID under which the daemon will run", uri);
}
fd = socket(AF_UNIX, SOCK_STREAM, 0);
if (fd == -1)

View File

@ -35,7 +35,7 @@ LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
SUCH DAMAGE.
The license and distribution terms for any publically available version or
The license and distribution terms for any publicly available version or
derivative of this code cannot be changed. i.e. this code cannot simply be
copied and put under another distribution license
[including the GNU Public License.]

View File

@ -50,7 +50,7 @@
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
* The licence and distribution terms for any publically available version or
* The licence and distribution terms for any publicly available version or
* derivative of this code cannot be changed. i.e. this code cannot simply be
* copied and put under another distribution licence
* [including the GNU Public Licence.]

View File

@ -50,7 +50,7 @@
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
* The licence and distribution terms for any publically available version or
* The licence and distribution terms for any publicly available version or
* derivative of this code cannot be changed. i.e. this code cannot simply be
* copied and put under another distribution licence
* [including the GNU Public Licence.]

View File

@ -50,7 +50,7 @@
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
* The licence and distribution terms for any publically available version or
* The licence and distribution terms for any publicly available version or
* derivative of this code cannot be changed. i.e. this code cannot simply be
* copied and put under another distribution licence
* [including the GNU Public Licence.]

View File

@ -50,7 +50,7 @@
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
* The licence and distribution terms for any publically available version or
* The licence and distribution terms for any publicly available version or
* derivative of this code cannot be changed. i.e. this code cannot simply be
* copied and put under another distribution licence
* [including the GNU Public Licence.]

View File

@ -50,7 +50,7 @@
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
* The licence and distribution terms for any publically available version or
* The licence and distribution terms for any publicly available version or
* derivative of this code cannot be changed. i.e. this code cannot simply be
* copied and put under another distribution licence
* [including the GNU Public Licence.]

View File

@ -49,7 +49,7 @@
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
* The licence and distribution terms for any publically available version or
* The licence and distribution terms for any publicly available version or
* derivative of this code cannot be changed. i.e. this code cannot simply be
* copied and put under another distribution licence
* [including the GNU Public Licence.]

View File

@ -52,7 +52,7 @@
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
* The licence and distribution terms for any publically available version or
* The licence and distribution terms for any publicly available version or
* derivative of this code cannot be changed. i.e. this code cannot simply be
* copied and put under another distribution licence
* [including the GNU Public Licence.]

View File

@ -276,7 +276,7 @@ METHOD(ntru_private_key_t, decrypt, bool,
}
if (!msg_rep_good)
{
DBG1(DBG_LIB, "decryption failed due to unsufficient minimum weight");
DBG1(DBG_LIB, "decryption failed due to insufficient minimum weight");
success = FALSE;
}

View File

@ -9,7 +9,7 @@
*
* This program is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
* or FITNESS FOR A PARTICULAR PURPSE. See the GNU General Public License
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* for more details.
*/

View File

@ -9,7 +9,7 @@
*
* This program is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
* or FITNESS FOR A PARTICULAR PURPSE. See the GNU General Public License
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* for more details.
*/

View File

@ -9,7 +9,7 @@
*
* This program is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
* or FITNESS FOR A PARTICULAR PURPSE. See the GNU General Public License
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* for more details.
*/

View File

@ -61,7 +61,7 @@ METHOD(plugin_t, destroy, void,
plugin_t *sqlite_plugin_create()
{
private_sqlite_plugin_t *this;
int threadsave = 0;
int threadsafe = 0;
INIT(this,
.public = {
@ -74,10 +74,10 @@ plugin_t *sqlite_plugin_create()
);
#if SQLITE_VERSION_NUMBER >= 3005000
threadsave = sqlite3_threadsafe();
threadsafe = sqlite3_threadsafe();
#endif
DBG2(DBG_LIB, "using SQLite %s, thread safety %d",
sqlite3_libversion(), threadsave);
sqlite3_libversion(), threadsafe);
return &this->public.plugin;
}

View File

@ -53,7 +53,7 @@ typedef struct enum_name_t enum_name_t;
* The ENUM and the ENUM_END define a enum_name_t pointer with the name supplied
* in "name".
*
* Resolving of enum names is done using a printf hook. A printf fromat
* Resolving of enum names is done using a printf hook. A printf format
* character %N is replaced by the enum string. Printf needs two arguments to
* resolve a %N, the enum_name_t* (the defined name in ENUM_BEGIN) followed
* by the numerical enum value.

View File

@ -206,7 +206,7 @@ void utils_deinit();
* Block and wait for a set of signals
*
* We don't replicate the functionality of siginfo_t. If info is not NULL
* -1 is returend and errno is set to EINVAL.
* -1 is returned and errno is set to EINVAL.
*
* @param set set of signals to wait for
* @param info must be NULL

View File

@ -29,7 +29,7 @@ void memxor(uint8_t dst[], const uint8_t src[], size_t n)
{
dst[i] ^= src[i];
}
/* try to use words if src shares an aligment with dst */
/* try to use words if src shares an alignment with dst */
switch (((uintptr_t)&src[i] % sizeof(long)))
{
case 0:

View File

@ -1,4 +1,4 @@
TThe roadwarriors <b>carol</b> and <b>dave</b> set up an IPv6 tunnel connection each
The roadwarriors <b>carol</b> and <b>dave</b> set up an IPv6 tunnel connection each
to gateway <b>moon</b>. The authentication is based on distinct <b>pre-shared keys</b>
and IPv6 addresses. Upon the successful establishment of the IPsec tunnels,
automatically inserted ip6tables-based firewall rules let pass the tunneled traffic.