On a mobile laptop computer the situation is quite different. The computer can
be stolen or the user may leave it unattended so that unauthorized persons
-can get access to it. In theses cases it would be preferable not to keep any
+can get access to it. In these cases it would be preferable not to keep any
passphrases openly in `/etc/ipsec.secrets` but to prompt for them interactively
instead. This is easily done by defining
FLAG,
/**
- * Representating a length field of a payload.
+ * Representing a length field of a payload.
*
* When generating it must be changed from host to network order.
* The value is read from the associated data struct.
PAYLOAD_LENGTH,
/**
- * Representating a length field of a header.
+ * Representing a length field of a header.
*
* When generating it must be changed from host to network order.
* The value is read from the associated data struct.
HEADER_LENGTH,
/**
- * Representating a spi size field.
+ * Representing a spi size field.
*
* When generating it must be changed from host to network order.
* The value is read from the associated data struct.
SPI_SIZE,
/**
- * Representating a spi field.
+ * Representing a spi field.
*
* When generating the content of the chunkt pointing to
* is written.
ATTRIBUTE_VALUE,
/**
- * Representating a Traffic selector type field.
+ * Representing a Traffic selector type field.
*
* When generating it must be changed from host to network order.
* The value is read from the associated data struct.
TS_TYPE,
/**
- * Representating an address field in a traffic selector.
+ * Representing an address field in a traffic selector.
*
* Depending on the last field of type TS_TYPE
* this field is either 4 or 16 byte long.
CHUNK_DATA,
/**
- * Representating an IKE_SPI field in an IKEv2 Header.
+ * Representing an IKE_SPI field in an IKEv2 Header.
*
* When generating the value of the uint64_t pointing to
* is written (host and networ order is not changed).
IKE_SPI,
/**
- * Representating an encrypted IKEv1 message.
+ * Representing an encrypted IKEv1 message.
*/
ENCRYPTED_DATA,
PLV2_TS_INITIATOR = 44,
/**
- * Traffic selector for the original responser (TSr).
+ * Traffic selector for the original responder (TSr).
*/
PLV2_TS_RESPONDER = 45,
/**
* Encode the given code point as UTF-16LE where utf16 points to and advance
- * the position. Invalid code points are ingored.
+ * the position. Invalid code points are ignored.
*/
static inline void encode_utf16le(chunk_t *utf16, uint32_t c)
{
}
/**
- * Callback processing incoming requestes in strict order
+ * Callback processing incoming requests in strict order
*/
CALLBACK(process_queue, job_requeue_t,
entry_selector_t *sel)
}
/**
- * Check if we have any path avialable for this IKE SA.
+ * Check if we have any path available for this IKE SA.
*/
static bool is_any_path_valid(private_ike_sa_t *this)
{
/**
* Both peers initiate the IKE_SA rekeying concurrently but the proposed DH
- * gropus are not the same. After handling the INVALID_KE_PAYLOAD they should
+ * groups are not the same. After handling the INVALID_KE_PAYLOAD they should
* still handle the collision properly depending on the nonces.
*/
START_TEST(test_collision_ke_invalid)
/**
* Add a PA-TNC attribute
*
- * @param attr PA-TNC attribute to be addedd
+ * @param attr PA-TNC attribute to be added
* @return TRUE if attribute fit into message and was added
*/
bool (*add_attribute)(pa_tnc_msg_t *this, pa_tnc_attr_t* attr);
case INVALID_STATE:
break;
case SUCCESS:
- /* shoudln't happen, continue until we get a result */
+ /* shouldn't happen, continue until we get a result */
case NEED_MORE:
writer->write_data(writer, data);
free(data.ptr);
typedef bool (*stream_cb_t)(void *data, stream_t *stream);
/**
- * Abstraction of a Berkley socket using stream semantics.
+ * Abstraction of a Berkeley socket using stream semantics.
*/
struct stream_t {
int len;
/* n and d are of keysize length, p and q plus the three CRT
- * params roughtly half that, the version and e are small */
+ * params roughly half that, the version and e are small */
len = wc_RsaEncryptSize(&this->rsa) * 5 + MAX_SEQ_SZ;
*encoding = chunk_alloc(len);
len = wc_RsaKeyToDer(&this->rsa, encoding->ptr, len);
/**
* Add TNCCS message
*
- * @param msg TNCCS message to be addedd
+ * @param msg TNCCS message to be added
*/
void (*add_msg)(tnccs_batch_t *this, tnccs_msg_t* msg);
/**
* Add a PB-TNC Message
*
- * @param msg PB-TNC message to be addedd
+ * @param msg PB-TNC message to be added
* @return TRUE if message fit into batch and was added
*/
bool (*add_msg)(pb_tnc_batch_t *this, pb_tnc_msg_t* msg);
elem.tagName && elem.ownerDocument && !elem.ownerDocument.body;
},
- // Evalulates a script in a global context
+ // Evaluates a script in a global context
// Evaluates Async. in Safari 2 :-(
globalEval: function( data ) {
data = jQuery.trim( data );