diff options
author | Simon Kelley <simon@thekelleys.org.uk> | 2014-02-24 21:46:44 +0000 |
---|---|---|
committer | Simon Kelley <simon@thekelleys.org.uk> | 2014-02-24 21:46:44 +0000 |
commit | 24187530fb3cfc5e2eaa6352e7ea9b27f644e213 (patch) | |
tree | c23fe1ffd26bce0955427c2db97807e8cbbe4515 | |
parent | a857daa3511eebbbf63bc894695f4bfc790b2246 (diff) | |
download | dnsmasq-24187530fb3cfc5e2eaa6352e7ea9b27f644e213.tar.gz |
Speeling.
-rw-r--r-- | src/dnssec.c | 14 |
1 files changed, 7 insertions, 7 deletions
diff --git a/src/dnssec.c b/src/dnssec.c index 399bc19..be1b101 100644 --- a/src/dnssec.c +++ b/src/dnssec.c @@ -1231,7 +1231,7 @@ static int find_nsec_records(struct dns_header *header, size_t plen, unsigned ch return type_found; } -static int prove_non_existance_nsec(struct dns_header *header, size_t plen, unsigned char **nsecs, int nsec_count, +static int prove_non_existence_nsec(struct dns_header *header, size_t plen, unsigned char **nsecs, int nsec_count, char *workspace1, char *workspace2, char *name, int type) { int i, rc, rdlen; @@ -1364,7 +1364,7 @@ static int base32_decode(char *in, unsigned char *out) return p - out; } -static int prove_non_existance_nsec3(struct dns_header *header, size_t plen, unsigned char **nsecs, int nsec_count, +static int prove_non_existence_nsec3(struct dns_header *header, size_t plen, unsigned char **nsecs, int nsec_count, char *workspace1, char *workspace2, char *name, int type) { unsigned char *salt, *p, *digest; @@ -1516,7 +1516,7 @@ static int prove_non_existance_nsec3(struct dns_header *header, size_t plen, uns return STAT_SECURE; } - /* Look for NSEC3 that proves the non-existance of the next-closest encloser */ + /* Look for NSEC3 that proves the non-existence of the next-closest encloser */ if ((digest_len = hash_name(next_closest, &digest, hash, salt, salt_len, iterations)) == 0) return STAT_INSECURE; @@ -1672,9 +1672,9 @@ int dnssec_validate_reply(time_t now, struct dns_header *header, size_t plen, ch } if (nsec_type == T_NSEC) - rc = prove_non_existance_nsec(header, plen, nsecs, nsec_count, daemon->workspacename, keyname, name, type1); + rc = prove_non_existence_nsec(header, plen, nsecs, nsec_count, daemon->workspacename, keyname, name, type1); else - rc = prove_non_existance_nsec3(header, plen, nsecs, nsec_count, daemon->workspacename, keyname, name, type1); + rc = prove_non_existence_nsec3(header, plen, nsecs, nsec_count, daemon->workspacename, keyname, name, type1); if (rc != STAT_SECURE) return rc; @@ -1846,9 +1846,9 @@ int dnssec_validate_reply(time_t now, struct dns_header *header, size_t plen, ch } if (nsec_type == T_NSEC) - return prove_non_existance_nsec(header, plen, nsecs, nsec_count, daemon->workspacename, keyname, name, type1); + return prove_non_existence_nsec(header, plen, nsecs, nsec_count, daemon->workspacename, keyname, name, type1); else - return prove_non_existance_nsec3(header, plen, nsecs, nsec_count, daemon->workspacename, keyname, name, type1); + return prove_non_existence_nsec3(header, plen, nsecs, nsec_count, daemon->workspacename, keyname, name, type1); } /* Compute keytag (checksum to quickly index a key). See RFC4034 */ |