diff --git a/src/config.c b/src/config.c index 9763bda..4b7ef03 100644 --- a/src/config.c +++ b/src/config.c @@ -117,7 +117,7 @@ void hex_dump(const char *str, const void *data, ssize_t len, const struct debug /* * mostly match getline() semantics but: - * 1) accept CEOT (Ctrl-D, 0x04) at begining of line as an input terminator + * 1) accept CEOT (Ctrl-D, 0x04) at beginning of line as an input terminator * 2) allocate the buffer at max line size of GETLINE_MAX_BUFLEN bytes * 3) remove trailing newline * diff --git a/src/crypto-openssl.c b/src/crypto-openssl.c index c8b2bc1..54f7073 100644 --- a/src/crypto-openssl.c +++ b/src/crypto-openssl.c @@ -214,7 +214,7 @@ int crypto_verify_chain(crypto_ctx *ctx, } /* X509_STORE_CTX_init did not return an error condition in prior versions */ if (X509_STORE_CTX_init (verify_ctx, store, x509, ctx->stack) != 1) { - crypto_error_set(error, 1, 0, "error intializing verification context"); + crypto_error_set(error, 1, 0, "error initializing verification context"); goto out; } diff --git a/src/math_group.c b/src/math_group.c index 4924b72..be9384a 100644 --- a/src/math_group.c +++ b/src/math_group.c @@ -38,7 +38,7 @@ static int modp_operation(struct group *, gcry_mpi_t, gcry_mpi_t, gcry_mpi_t); /* * This module provides access to the operations on the specified group - * and is absolutly free of any cryptographic devices. This is math :-). + * and is absolutely free of any cryptographic devices. This is math :-). */ /* Describe preconfigured MODP groups */ @@ -292,7 +292,7 @@ static struct group groups[] = { /* * Initialize the group structure for later use, - * this is done by converting the values given in the describtion + * this is done by converting the values given in the description * and converting them to their native representation. */ void group_init(void) diff --git a/src/pcf2vpnc b/src/pcf2vpnc index 3b048f0..2e6a6d9 100755 --- a/src/pcf2vpnc +++ b/src/pcf2vpnc @@ -30,7 +30,7 @@ sub readPCF($) { # Filter unnecessary chars at beginning & end of line s/^!*//; s/[\r ]*$//; if (/^(.*?)=(.*?)$/) { - # We don't need emtpy config strings + # We don't need empty config strings next if ($2 eq ""); if ($1 eq "Host") { $config{IPSec}{gateway} = $2; diff --git a/src/test/README.txt b/src/test/README.txt index 5445cdc..1abfdce 100644 --- a/src/test/README.txt +++ b/src/test/README.txt @@ -12,7 +12,7 @@ See below for more details on how to use test-crypto. openSSL is required to rebuild the test files. To avoid the dependence from openSSL during SW compile, -all required files are distribuited together with the +all required files are distributed together with the VPNC source code. The Makefile in this folder is able to rebuild all the diff --git a/src/vpnc.c b/src/vpnc.c index 7872a3a..27e0d7b 100644 --- a/src/vpnc.c +++ b/src/vpnc.c @@ -1257,7 +1257,7 @@ static void lifetime_ipsec_process(struct sa_block *s, struct isakmp_attribute * else s->ipsec.life.kbytes = value; - /* FIXME: for notice-payloads: write a seperate function to handle them */ + /* FIXME: for notice-payloads: write a separate function to handle them */ /* bug: this may process lifetime-attributes of SAs twice but to no consequence */ if (a->next->next != NULL && a->next->next->type == ISAKMP_IPSEC_ATTRIB_SA_LIFE_TYPE) lifetime_ipsec_process(s, a->next->next); @@ -1361,7 +1361,7 @@ static void do_phase1_am_packet1(struct sa_block *s, const char *key_id) static void do_phase1_am_packet2(struct sa_block *s, const char *shared_key) { DEBUGTOP(2, printf("S4.4 AM_packet2\n")); - /* Decode the recieved packet. */ + /* Decode the received packet. */ { int reject, ret; struct isakmp_packet *r; @@ -1388,7 +1388,7 @@ static void do_phase1_am_packet2(struct sa_block *s, const char *shared_key) reject = 0; r = parse_isakmp_packet(r_packet, r_length, &reject); - /* Verify the correctness of the recieved packet. */ + /* Verify the correctness of the received packet. */ if (reject == 0 && memcmp(r->i_cookie, s->ike.i_cookie, ISAKMP_COOKIE_LENGTH) != 0) reject = ISAKMP_N_INVALID_COOKIE; if (reject == 0)