mirror of
https://github.com/strongswan/strongswan.git
synced 2025-12-15 00:00:26 -05:00
Some typos fixed.
This commit is contained in:
parent
2b2eecb6ec
commit
84545f6e7c
@ -594,7 +594,7 @@ sets
|
||||
to the distinguished name of the certificate's subject and
|
||||
.B leftca
|
||||
to the distinguished name of the certificate's issuer.
|
||||
The left participant's ID can be overriden by specifying a
|
||||
The left participant's ID can be overridden by specifying a
|
||||
.B leftid
|
||||
value which must be certified by the certificate, though.
|
||||
.TP
|
||||
|
||||
@ -196,7 +196,7 @@ static bool load_keys(settings_t *settings, char *dir)
|
||||
}
|
||||
else
|
||||
{
|
||||
fprintf(stderr, "unkown key type: '%s'\n", type);
|
||||
fprintf(stderr, "unknown key type: '%s'\n", type);
|
||||
enumerator->destroy(enumerator);
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
@ -85,7 +85,7 @@ METHOD(listener_t, message, bool,
|
||||
}
|
||||
else
|
||||
{
|
||||
DBG1(DBG_CFG, "unkown payload to sort: '%s', skipped", name);
|
||||
DBG1(DBG_CFG, "unknown payload to sort: '%s', skipped", name);
|
||||
}
|
||||
}
|
||||
order->destroy(order);
|
||||
|
||||
@ -261,10 +261,10 @@ struct payload_t {
|
||||
payload_t *payload_create(payload_type_t type);
|
||||
|
||||
/**
|
||||
* Check if a specific payload is implemented, or handled as unkown payload.
|
||||
* Check if a specific payload is implemented, or handled as unknown payload.
|
||||
*
|
||||
* @param type type of the payload to check
|
||||
* @return FALSE if payload type handled as unkown payload
|
||||
* @return FALSE if payload type handled as unknown payload
|
||||
*/
|
||||
bool payload_is_known(payload_type_t type);
|
||||
|
||||
|
||||
@ -967,7 +967,7 @@ METHOD(task_t, build_r, status_t,
|
||||
case INTERNAL_ADDRESS_FAILURE:
|
||||
case FAILED_CP_REQUIRED:
|
||||
{
|
||||
DBG1(DBG_IKE,"configuration payload negotation "
|
||||
DBG1(DBG_IKE,"configuration payload negotiation "
|
||||
"failed, no CHILD_SA built");
|
||||
enumerator->destroy(enumerator);
|
||||
handle_child_sa_failure(this, message);
|
||||
|
||||
@ -82,7 +82,7 @@ extern enum_name_t *eap_type_short_names;
|
||||
* Lookup the EAP method type from a string.
|
||||
*
|
||||
* @param name EAP method name (such as "md5", "aka")
|
||||
* @return method type, 0 if unkown
|
||||
* @return method type, 0 if unknown
|
||||
*/
|
||||
eap_type_t eap_type_from_string(char *name);
|
||||
|
||||
|
||||
@ -648,7 +648,7 @@ static void parse_authorityInfoAccess(chunk_t blob, int level0,
|
||||
}
|
||||
break;
|
||||
default:
|
||||
/* unkown accessMethod, ignoring */
|
||||
/* unknown accessMethod, ignoring */
|
||||
break;
|
||||
}
|
||||
break;
|
||||
|
||||
@ -202,7 +202,7 @@ struct tls_t {
|
||||
/**
|
||||
* Check if TLS negotiation completed successfully.
|
||||
*
|
||||
* @return TRUE if TLS negotation and authentication complete
|
||||
* @return TRUE if TLS negotiation and authentication complete
|
||||
*/
|
||||
bool (*is_complete)(tls_t *this);
|
||||
|
||||
|
||||
@ -629,7 +629,7 @@ void add_ca_info(const whack_message_t *msg)
|
||||
if (strncasecmp(msg->ocspuri, "http", 4) == 0)
|
||||
ca->ocspuri = clone_str(msg->ocspuri);
|
||||
else
|
||||
plog(" ignoring ocspuri with unkown protocol");
|
||||
plog(" ignoring ocspuri with unknown protocol");
|
||||
}
|
||||
|
||||
/* add crl uris */
|
||||
|
||||
@ -1147,7 +1147,7 @@ read_packet(struct msg_digest *md)
|
||||
}
|
||||
else if (from_ugh != NULL)
|
||||
{
|
||||
plog("recvfrom on %s returned misformed source sockaddr: %s"
|
||||
plog("recvfrom on %s returned malformed source sockaddr: %s"
|
||||
, ifp->rname, from_ugh);
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
@ -239,12 +239,12 @@ Log raw hex dumps.
|
||||
.PP
|
||||
.B \-C, \-\-debug\-control
|
||||
.RS 4
|
||||
Log informations about control flow.
|
||||
Log information about control flow.
|
||||
.RE
|
||||
.PP
|
||||
.B \-M, \-\-debug\-controlmore
|
||||
.RS 4
|
||||
Log more detailed informations about control flow.
|
||||
Log more detailed information about control flow.
|
||||
.RE
|
||||
.PP
|
||||
.B \-X, \-\-debug\-private
|
||||
|
||||
@ -2,4 +2,4 @@ The roadwarrior <b>carol</b> sets up a connection to gateway <b>moon</b>.
|
||||
The authentication is based on RSA signatures (<b>RSASIG</b>) using X.509
|
||||
certificates followed by extended authentication (<b>XAUTH</b>) based
|
||||
on user name and password. Because user <b>carol</b> presents a wrong
|
||||
XAUTH password the IKE negotation is aborted and the ISAKMP SA is deleted.
|
||||
XAUTH password the IKE negotiation is aborted and the ISAKMP SA is deleted.
|
||||
|
||||
@ -2,5 +2,5 @@ The roadwarrior <b>carol</b> sets up a connection to gateway <b>moon</b>.
|
||||
The authentication is based on RSA signatures (<b>RSASIG</b>) using X.509
|
||||
certificates followed by extended authentication (<b>XAUTH</b>) based
|
||||
on user name and password. Because user <b>carol</b> cannot find her
|
||||
XAUTH credentials in ipsec.secrets, the IKE negotation is aborted and the
|
||||
XAUTH credentials in ipsec.secrets, the IKE negotiation is aborted and the
|
||||
ISAKMP SA is deleted.
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user