From 24187530fb3cfc5e2eaa6352e7ea9b27f644e213 Mon Sep 17 00:00:00 2001 From: Simon Kelley Date: Mon, 24 Feb 2014 21:46:44 +0000 Subject: [PATCH] Speeling. --- src/dnssec.c | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/src/dnssec.c b/src/dnssec.c index 399bc19..be1b101 100644 --- a/src/dnssec.c +++ b/src/dnssec.c @@ -1231,7 +1231,7 @@ static int find_nsec_records(struct dns_header *header, size_t plen, unsigned ch return type_found; } -static int prove_non_existance_nsec(struct dns_header *header, size_t plen, unsigned char **nsecs, int nsec_count, +static int prove_non_existence_nsec(struct dns_header *header, size_t plen, unsigned char **nsecs, int nsec_count, char *workspace1, char *workspace2, char *name, int type) { int i, rc, rdlen; @@ -1364,7 +1364,7 @@ static int base32_decode(char *in, unsigned char *out) return p - out; } -static int prove_non_existance_nsec3(struct dns_header *header, size_t plen, unsigned char **nsecs, int nsec_count, +static int prove_non_existence_nsec3(struct dns_header *header, size_t plen, unsigned char **nsecs, int nsec_count, char *workspace1, char *workspace2, char *name, int type) { unsigned char *salt, *p, *digest; @@ -1516,7 +1516,7 @@ static int prove_non_existance_nsec3(struct dns_header *header, size_t plen, uns return STAT_SECURE; } - /* Look for NSEC3 that proves the non-existance of the next-closest encloser */ + /* Look for NSEC3 that proves the non-existence of the next-closest encloser */ if ((digest_len = hash_name(next_closest, &digest, hash, salt, salt_len, iterations)) == 0) return STAT_INSECURE; @@ -1672,9 +1672,9 @@ int dnssec_validate_reply(time_t now, struct dns_header *header, size_t plen, ch } if (nsec_type == T_NSEC) - rc = prove_non_existance_nsec(header, plen, nsecs, nsec_count, daemon->workspacename, keyname, name, type1); + rc = prove_non_existence_nsec(header, plen, nsecs, nsec_count, daemon->workspacename, keyname, name, type1); else - rc = prove_non_existance_nsec3(header, plen, nsecs, nsec_count, daemon->workspacename, keyname, name, type1); + rc = prove_non_existence_nsec3(header, plen, nsecs, nsec_count, daemon->workspacename, keyname, name, type1); if (rc != STAT_SECURE) return rc; @@ -1846,9 +1846,9 @@ int dnssec_validate_reply(time_t now, struct dns_header *header, size_t plen, ch } if (nsec_type == T_NSEC) - return prove_non_existance_nsec(header, plen, nsecs, nsec_count, daemon->workspacename, keyname, name, type1); + return prove_non_existence_nsec(header, plen, nsecs, nsec_count, daemon->workspacename, keyname, name, type1); else - return prove_non_existance_nsec3(header, plen, nsecs, nsec_count, daemon->workspacename, keyname, name, type1); + return prove_non_existence_nsec3(header, plen, nsecs, nsec_count, daemon->workspacename, keyname, name, type1); } /* Compute keytag (checksum to quickly index a key). See RFC4034 */