Commit 191b6165 authored by Evan Hunt's avatar Evan Hunt

fix additional spelling errors

parent e09f0856
Pipeline #34995 passed with stages
in 15 minutes and 43 seconds
......@@ -1132,7 +1132,7 @@
and defaulting to the working directory if not
specified) must be writable. [RT #46077]
4766. [cleanup] Addresss Coverity warnings. [RT #46150]
4766. [cleanup] Address Coverity warnings. [RT #46150]
4763. [contrib] Improve compatibility when building MySQL DLZ
module by using mysql_config if available.
......@@ -10745,7 +10745,7 @@
1831. [doc] Update named-checkzone documentation. [RT #13604]
1830. [bug] adb lame cache has sence of test reversed. [RT #13600]
1830. [bug] adb lame cache has sense of test reversed. [RT #13600]
1829. [bug] win32: "pid-file none;" broken. [RT #13563]
......
......@@ -802,7 +802,7 @@ hashlist_hasdup(hashlist_t *l) {
size_t entries = l->entries;
/*
* Skip initial speculative wild card hashs.
* Skip initial speculative wild card hashes.
*/
while (entries > 0U && next[l->length-1] != 0U) {
next += l->length;
......@@ -2312,7 +2312,7 @@ nsec3ify(unsigned int hashalg, dns_iterations_t iterations,
salt, salt_len, false);
dns_db_detachnode(gdb, &node);
/*
* Add hashs for empty nodes. Use closest encloser logic.
* Add hashes for empty nodes. Use closest encloser logic.
* The closest encloser either has data or is a empty
* node for another <name,nextname> span so we don't add
* it here. Empty labels on nextname are within the span.
......
......@@ -694,7 +694,7 @@ verifynsec(dns_db_t *db, dns_dbversion_t *ver, dns_name_t *name,
result = dns_rdataset_next(&rdataset);
if (result != ISC_R_NOMORE) {
dns_name_format(name, namebuf, sizeof(namebuf));
fprintf(stderr, "Multipe NSEC records for %s\n", namebuf);
fprintf(stderr, "Multiple NSEC records for %s\n", namebuf);
goto failure;
}
......@@ -1073,7 +1073,7 @@ verifynsec3(dns_db_t *db, dns_dbversion_t *ver, dns_name_t *origin,
check_result(result, "dns_nsec3_hashname()");
/*
* We don't use dns_db_find() here as it works with the choosen
* We don't use dns_db_find() here as it works with the chosen
* nsec3 chain and we may also be called with uncommitted data
* from dnssec-signzone so the secure status of the zone may not
* be up to date.
......
......@@ -685,7 +685,7 @@ exit_check(ns_client_t *client) {
* the "freed" state, it will be removed from the inactive
* list shortly, and we need to keep the manager locked until
* that has been done, lest the manager decide to reactivate
* the dying client inbetween.
* the dying client in between.
*/
client->state = NS_CLIENTSTATE_INACTIVE;
INSIST(client->recursionquota == NULL);
......
......@@ -13,8 +13,8 @@
* \brief
* Main program for the Lightweight Resolver Daemon.
*
* To paraphrase the old saying about X11, "It's not a lightweight deamon
* for resolvers, it's a deamon for lightweight resolvers".
* To paraphrase the old saying about X11, "It's not a lightweight daemon
* for resolvers, it's a daemon for lightweight resolvers".
*/
#include <config.h>
......
......@@ -5667,7 +5667,7 @@ rpz_rewrite(ns_client_t *client, dns_rdatatype_t qtype,
goto cleanup;
/*
* We are finished checking the IP addresses for the qname.
* Start with IPv4 if we will check NS IP addesses.
* Start with IPv4 if we will check NS IP addresses.
*/
st->state |= DNS_RPZ_DONE_QNAME_IP;
st->state &= ~DNS_RPZ_DONE_IPv4;
......
......@@ -364,7 +364,7 @@ main(int argc, char **argv) {
lookup("moghedien.flame.org."); /* should fetch */
lookup("mailrelay.flame.org."); /* should fetch */
lookup("ipv4v6.flame.org."); /* should fetch */
lookup("nonexistant.flame.org."); /* should fail to be found */
lookup("nonexistent.flame.org."); /* should fail to be found */
lookup("foobar.badns.flame.org."); /* should fail utterly (NS) */
lookup("i.root-servers.net."); /* Should be in hints */
lookup("www.firstcard.com.");
......@@ -386,7 +386,7 @@ main(int argc, char **argv) {
lookup("moghedien.flame.org."); /* should fetch */
lookup("mailrelay.flame.org."); /* should fetch */
lookup("ipv4v6.flame.org."); /* should fetch */
lookup("nonexistant.flame.org."); /* should fail to be found */
lookup("nonexistent.flame.org."); /* should fail to be found */
lookup("foobar.badns.flame.org."); /* should fail utterly (NS) */
lookup("i.root-servers.net."); /* Should be in hints */
CUNLOCK();
......
......@@ -191,7 +191,7 @@ status=`expr $status + $ret`
if [ -x ${DELV} ] ; then
ret=0
echo_i "checking postive validation NSEC using dns_client ($n)"
echo_i "checking positive validation NSEC using dns_client ($n)"
$DELV $DELVOPTS @10.53.0.4 a a.example > delv.out$n || ret=1
grep "a.example..*10.0.0.1" delv.out$n > /dev/null || ret=1
grep "a.example..*.RRSIG.A [0-9][0-9]* 2 300 .*" delv.out$n > /dev/null || ret=1
......
......@@ -527,8 +527,8 @@ digcomp knowngood.ns1.afterstop dig.out.ns1 || ret=1
ret=0
echo_i "check that 'nsupdate -l' with a missing keyfile reports the missing file"
$NSUPDATE -l -p ${PORT} -k ns1/nonexistant.key 2> nsupdate.out < /dev/null
grep ns1/nonexistant.key nsupdate.out > /dev/null || ret=1
$NSUPDATE -l -p ${PORT} -k ns1/nonexistent.key 2> nsupdate.out < /dev/null
grep ns1/nonexistent.key nsupdate.out > /dev/null || ret=1
if test $ret -ne 0
then
echo_i "failed"; status=1
......
......@@ -454,7 +454,7 @@ sleep ${interval:-0}
$DIG $DIGOPTS @10.53.0.5 fetch.tld txt > dig.out.2.${n} || ret=1
ttl2=`awk '/"A" "short" "ttl"/ { print $2 }' dig.out.2.${n}`
sleep 1
# check that prefetch occured
# check that prefetch occurred
$DIG $DIGOPTS @10.53.0.5 fetch.tld txt > dig.out.3.${n} || ret=1
ttl=`awk '/"A" "short" "ttl"/ { print $2 }' dig.out.3.${n}`
test ${ttl:-0} -gt ${ttl2:-1} || ret=1
......@@ -473,7 +473,7 @@ sleep ${interval:-0}
$DIG $DIGOPTS @10.53.0.5 ds.example.net ds > dig.out.2.${n} || ret=1
dsttl2=`awk '$4 == "DS" && $7 == "1" { print $2 }' dig.out.2.${n}`
sleep 1
# check that prefetch occured
# check that prefetch occurred
$DIG $DIGOPTS @10.53.0.5 ds.example.net ds +dnssec > dig.out.3.${n} || ret=1
dsttl=`awk '$4 == "DS" && $7 == "1" { print $2 }' dig.out.3.${n}`
sigttl=`awk '$4 == "RRSIG" && $5 == "DS" { print $2 }' dig.out.3.${n}`
......@@ -498,7 +498,7 @@ no_prefetch() {
# the previous one.
$DIG $DIGOPTS @10.53.0.7 fetch.example.net txt > dig.out.2.${n} || return 1
ttl2=`awk '/"A" "short" "ttl"/ { print $2 }' dig.out.2.${n}`
# check that prefetch has not occured
# check that prefetch has not occurred
if [ $ttl2 -ge $tmp_ttl ]; then
return 1
fi
......
......@@ -487,7 +487,7 @@ EOF
sleep 1
done
nochange a7-1.tld2 # 19 PASSTHRU
# ensure that a clock tick has occured so that the reload takes effect
# ensure that a clock tick has occurred so that the reload takes effect
sleep 1
cp ns2/blv3.tld2.db.in ns2/bl.tld2.db
goodsoa="rpz.tld2. hostmaster.ns.tld2. 3 3600 1200 604800 60"
......
......@@ -30,7 +30,7 @@ zone "nsec" { type master; file "nsec.db.signed"; };
zone "private.nsec" { type master; file "private.nsec.db.signed"; };
/*
* The contents of nsec3 and private.nsec3 are specially choosen to
* The contents of nsec3 and private.nsec3 are specially chosen to
* have separate NSEC3 records for the "no qname proof" and the
* "closest encloser proof".
*/
......
......@@ -277,12 +277,12 @@ BEGIN
IDS_BAD_PRIVILEGES "This user cannot acquire the privileges necessary to install BIND. Please ensure you are logged on as a member of the Administrators group."
IDS_ERR_CREATE_DIR "An error occurred while creating directory %s\n(%s)"
IDS_VERSION "Version %s"
IDS_ERR_CREATE_KEY "An error occured while creating registry keys\n(%s)"
IDS_ERR_CREATE_KEY "An error occurred while creating registry keys\n(%s)"
END
STRINGTABLE
BEGIN
IDS_ERR_SET_VALUE "An error occured while setting registry key values\n(%s)"
IDS_ERR_SET_VALUE "An error occurred while setting registry key values\n(%s)"
IDS_NO_VERSION "Version Unknown"
IDS_EXISTING_NEWER "%s\nThe existing version of this file is newer than the version being installed.\nDo you wish to overwrite the existing file?"
IDS_FILE_BAD "Could not retrieve version info for file %s. Do you wish to continue?\n(Continuing may overwrite a newer version of the file) "
......
......@@ -648,7 +648,7 @@ void CBINDInstallDlg::OnInstall() {
}
catch(DWORD dw) {
CString msg;
msg.Format("A fatal error occured\n(%s)", GetErrMessage(dw));
msg.Format("A fatal error occurred\n(%s)", GetErrMessage(dw));
MessageBox(msg);
SetCurrent(IDS_CLEANUP);
FailedInstall();
......
......@@ -24674,7 +24674,7 @@ $as_echo "not found" >&6; }
$as_echo "" >&6; }
for dd in $bdbdirs
do
# Skip nonexistant directories
# Skip nonexistent directories
if test ! -d "$dd"
then
continue
......
......@@ -251,7 +251,7 @@ case "$use_dlz_bdb" in
AC_MSG_RESULT( )
for dd in $bdbdirs
do
# Skip nonexistant directories
# Skip nonexistent directories
if test ! -d "$dd"
then
continue
......
......@@ -196,7 +196,7 @@ bdb_parse_data(char *in, parsed_data_t *pd) {
if (*endp != '\0' || pd->ttl < 0) {
isc_log_write(dns_lctx, DNS_LOGCATEGORY_DATABASE,
DNS_LOGMODULE_DLZ, ISC_LOG_ERROR,
"BDB driver ttl must be a postive number");
"BDB driver ttl must be a positive number");
return ISC_R_FAILURE;
}
......
......@@ -223,7 +223,7 @@ bdbhpt_parse_data(char *in, bdbhpt_parsed_data_t *pd) {
if (*endp != '\0' || pd->ttl < 0) {
isc_log_write(dns_lctx, DNS_LOGCATEGORY_DATABASE,
DNS_LOGMODULE_DLZ, ISC_LOG_ERROR,
"bdbhpt driver ttl must be a postive number");
"bdbhpt driver ttl must be a positive number");
return ISC_R_FAILURE;
}
......
......@@ -560,7 +560,7 @@ process_dir(isc_dir_t *dir, void *passback, config_data_t *cd,
isc_log_write(dns_lctx, DNS_LOGCATEGORY_DATABASE,
DNS_LOGMODULE_DLZ, ISC_LOG_ERROR,
"Filesystem driver "
"ttl must be a postive number");
"ttl must be a positive number");
}
/* pass data back to Bind */
......@@ -938,7 +938,7 @@ fs_create(const char *dlzname, unsigned int argc, char *argv[],
isc_log_write(dns_lctx, DNS_LOGCATEGORY_DATABASE,
DNS_LOGMODULE_DLZ, ISC_LOG_ERROR,
"Directory split count must be zero (0) "
"or a postive number");
"or a positive number");
}
/* get and store our separator character */
......
......@@ -422,7 +422,7 @@ ldap_process_results(LDAP *dbc, LDAPMessage *msg, char ** attrs,
DNS_LOGMODULE_DLZ,
ISC_LOG_ERROR,
"LDAP driver ttl must "
"be a postive number");
"be a positive number");
goto cleanup;
}
break;
......
......@@ -409,7 +409,7 @@ mysql_process_rs(dns_sdlzlookup_t *lookup, MYSQL_RES *rs)
DNS_LOGCATEGORY_DATABASE,
DNS_LOGMODULE_DLZ, ISC_LOG_ERROR,
"mysql driver ttl must be "
"a postive number");
"a positive number");
}
result = dns_sdlz_putrr(lookup, safeGet(row[1]), ttl,
safeGet(row[2]));
......@@ -458,7 +458,7 @@ mysql_process_rs(dns_sdlzlookup_t *lookup, MYSQL_RES *rs)
DNS_LOGCATEGORY_DATABASE,
DNS_LOGMODULE_DLZ, ISC_LOG_ERROR,
"mysql driver ttl must be "
"a postive number");
"a positive number");
}
/* ok, now tell Bind about it. */
result = dns_sdlz_putrr(lookup, safeGet(row[1]),
......@@ -638,7 +638,7 @@ mysql_allnodes(const char *zone, void *driverarg, void *dbdata,
isc_log_write(dns_lctx, DNS_LOGCATEGORY_DATABASE,
DNS_LOGMODULE_DLZ, ISC_LOG_ERROR,
"mysql driver ttl must be "
"a postive number");
"a positive number");
}
if (fields == 4) {
/* tell Bind about it. */
......
......@@ -899,7 +899,7 @@ odbc_process_rs(dns_sdlzlookup_t *lookup, dbinstance_t *dbi)
DNS_LOGMODULE_DLZ,
ISC_LOG_ERROR,
"Odbc driver ttl must "
"be a postive number");
"be a positive number");
result = ISC_R_FAILURE;
} else {
/*
......@@ -1131,7 +1131,7 @@ odbc_allnodes(const char *zone, void *driverarg, void *dbdata,
DNS_LOGCATEGORY_DATABASE,
DNS_LOGMODULE_DLZ, ISC_LOG_ERROR,
"Odbc driver ttl must be "
"a postive number");
"a positive number");
result = ISC_R_FAILURE;
} else {
/* successful converting TTL, tell Bind */
......
......@@ -725,7 +725,7 @@ postgres_process_rs(dns_sdlzlookup_t *lookup, PGresult *rs)
DNS_LOGCATEGORY_DATABASE,
DNS_LOGMODULE_DLZ, ISC_LOG_ERROR,
"Postgres driver ttl must be "
"a postive number");
"a positive number");
}
/* ok, now tell Bind about it. */
result = dns_sdlz_putrr(lookup, PQgetvalue(rs, i, 1),
......@@ -907,7 +907,7 @@ postgres_allnodes(const char *zone, void *driverarg, void *dbdata,
isc_log_write(dns_lctx, DNS_LOGCATEGORY_DATABASE,
DNS_LOGMODULE_DLZ, ISC_LOG_ERROR,
"Postgres driver ttl must be "
"a postive number");
"a positive number");
}
if (fields == 4) {
/* tell Bind about it. */
......
......@@ -528,7 +528,7 @@ process_dir(dir_t *dir, void *passback, config_data_t *cd,
if (*endp != '\0' || ttl < 0)
cd->log(ISC_LOG_ERROR,
"Filesystem driver "
"ttl must be a postive number");
"ttl must be a positive number");
/* pass data back to Bind */
if (dir_list == NULL)
......@@ -898,7 +898,7 @@ dlz_create(const char *dlzname, unsigned int argc, char *argv[],
if (*endp != '\0' || cd->splitcnt < 0)
cd->log(ISC_LOG_ERROR,
"Directory split count must be zero (0) "
"or a postive number");
"or a positive number");
/* get and store our separator character */
cd->separator = *argv[5];
......
......@@ -403,7 +403,7 @@ ldap_process_results(ldap_instance_t *db, LDAP *dbc, LDAPMessage *msg,
if (*endp != '\0' || ttl < 0) {
db->log(ISC_LOG_ERROR,
"LDAP driver ttl must "
"be a postive number");
"be a positive number");
goto cleanup;
}
break;
......
......@@ -475,7 +475,7 @@ mysql_process_rs(mysql_instance_t *db, dns_sdlzlookup_t *lookup,
if (*endp != '\0' || ttl < 0) {
db->log(ISC_LOG_ERROR,
"MySQL module ttl must be "
"a postive number");
"a positive number");
return (ISC_R_FAILURE);
}
......@@ -514,7 +514,7 @@ mysql_process_rs(mysql_instance_t *db, dns_sdlzlookup_t *lookup,
if (*endp != '\0' || ttl < 0) {
db->log(ISC_LOG_ERROR,
"MySQL module ttl must be "
"a postive number");
"a positive number");
free(tmpString);
return (ISC_R_FAILURE);
}
......@@ -672,7 +672,7 @@ dlz_allnodes(const char *zone, void *dbdata, dns_sdlzallnodes_t *allnodes) {
if (*endp != '\0' || ttl < 0) {
db->log(ISC_LOG_ERROR,
"MySQL module ttl must be "
"a postive number");
"a positive number");
result = ISC_R_FAILURE;
goto cleanup;
}
......
......@@ -550,7 +550,7 @@ sqlite3_process_rs(sqlite3_instance_t *db, dns_sdlzlookup_t *lookup,
if (*endp != '\0' || ttl < 0) {
db->log(ISC_LOG_ERROR,
"SQLite3 module: TTL must be "
"a postive number");
"a positive number");
return (ISC_R_FAILURE);
}
......@@ -589,7 +589,7 @@ sqlite3_process_rs(sqlite3_instance_t *db, dns_sdlzlookup_t *lookup,
if (*endp != '\0' || ttl < 0) {
db->log(ISC_LOG_ERROR,
"SQLite3 module: TTL must be "
"a postive number");
"a positive number");
free(tmpString);
return (ISC_R_FAILURE);
}
......@@ -748,7 +748,7 @@ dlz_allnodes(const char *zone, void *dbdata, dns_sdlzallnodes_t *allnodes) {
if (*endp != '\0' || ttl < 0) {
db->log(ISC_LOG_ERROR,
"SQLite3 module: TTL must be "
"a postive number");
"a positive number");
result = ISC_R_FAILURE;
goto cleanup;
}
......
......@@ -204,7 +204,7 @@ uint64_t xscount; /* sent counters */
uint64_t xrcount; /* received counters */
/*
* statictics counters and accumulators
* statistics counters and accumulators
*/
uint64_t recverr, tooshort, locallimit; /* error counters */
......@@ -2356,7 +2356,7 @@ main(const int argc, char * const argv[])
(void) pthread_cancel(sender);
(void) pthread_cancel(receiver);
/* main statictics */
/* main statistics */
printf("connect: %llu, sent: %llu, received: %llu\n",
(unsigned long long) xccount,
(unsigned long long) xscount,
......
......@@ -1152,7 +1152,7 @@ next_input_line(char *line, int n) {
/*
* identify_directive:
* Gives us a numerical value equivelant for a directive string
* Gives us a numerical value equivalent for a directive string
*
* Returns the value for the directive
* Returns -1 if not a valid directive
......@@ -1654,7 +1654,7 @@ register_response(unsigned short int id, unsigned int rcode, char *qname,
/*
* process_single_response:
* Receive from the given socket & process an invididual response packet.
* Receive from the given socket & process an individual response packet.
* Remove it from the list of open queries (status[]) and decrement the
* number of outstanding queries if it matches an open query.
*/
......
......@@ -42,7 +42,7 @@
* Returns a valid 'DB' handle.
*
* Requires:
* 'file' is a valid non-existant path.
* 'file' is a valid non-existent path.
*/
DB *
bdb_init(const char *file)
......
......@@ -7,7 +7,7 @@ zone2ldap [-D Bind DN] [-w Bind Password] [-b Base DN] [-z Zone] [-f Zone File
zone2ldap will parse a complete BIND 9 format DNS zone file, and load
the contents into an LDAP directory, for use with the LDAP sdb back-end.
If the zone already exists, zone2ldap will exit succesfully. If the zone does not exists, or
If the zone already exists, zone2ldap will exit successfully. If the zone does not exists, or
partially exists, zone2ldap will attempt to add all/missing zone data.
.SS Options
......@@ -18,7 +18,7 @@ If the zone you are loading is different from the base, then you will need to te
base is.
.TP
-v
Print version information, and immediatly exit.
Print version information, and immediately exit.
.TP
-f
Zone file. Bind 9.1 compatible zone file, from which zone information will be read.
......@@ -31,7 +31,7 @@ LDAP Bind password, corresponding the the value of "-b".
.TP
-h
LDAP Directory host. This is the hostname of the LDAP system you wish to store zone information on.
An LDAP server should be listening on port 389 of the target system. This may be ommited, and will default
An LDAP server should be listening on port 389 of the target system. This may be omitted, and will default
to "localhost".
.TP
-c
......
......@@ -322,7 +322,7 @@ main (int argc, char **argv)
sprintf (fullbasedn, "%s", ctmp);
}
result = ldap_add_s (conn, fullbasedn, base_attrs);
ldap_result_check ("intial ldap_add_s", fullbasedn, result);
ldap_result_check ("initial ldap_add_s", fullbasedn, result);
}
}
......@@ -432,7 +432,7 @@ locate_by_dn (char *dn)
* If locate_by_dn does not return, alloc a new ldap_info structure, and then
* calloc a LDAPMod array, fill in the default "everyone needs this" information,
* including object classes and dc's. If it locate_by_dn does return, then we'll
* realloc for more LDAPMod structs, and appened the new data. If an LDAPMod exists
* realloc for more LDAPMod structs, and append the new data. If an LDAPMod exists
* for the parameter we're adding, then we'll realloc the mod_values array, and
* add the new value to the existing LDAPMod. Finnaly, it assures linkage exists
* within the Run queue linked ilst*/
......
......@@ -14,7 +14,7 @@ Overview.
send it. This fits with the principle of being liberal with
what you accept and strict with what you send.
There are a few cases where it does not make sence to accept
There are a few cases where it does not make sense to accept
compression pointers of a given type. i.e. the first domain name
in a message, local compression pointers in the ownername of a RR
or in a question.
......
......@@ -34,7 +34,7 @@ UDP restart:
/*
* If too many recv()'s are already running, just return.
*
* If noone is attached to us, just return.
* If no one is attached to us, just return.
*
* Allocate a new buffer to receive into.
* If no more buffers:
......
......@@ -2,8 +2,6 @@ Copyright (C) Internet Systems Consortium, Inc. ("ISC")
See COPYRIGHT in the source root or http://isc.org/copyright.html for terms.
$Id: lwres,v 1.6 2004/03/05 05:04:46 marka Exp $
This document describes the bind v9 lightweight resolver.
WHY LWRES?
......@@ -134,7 +132,7 @@ various options, including search lists, sort lists, etc.
API
The simpliest interface is to call lwres_getaddrsbyname() or
The simplest interface is to call lwres_getaddrsbyname() or
lwres_getnamebyaddr(), both of which are blocking calls. That is, a
packet is transmitted to the local lightweight resolver, and the call
will not return until a response is received or the timeout period
......
......@@ -376,7 +376,7 @@ on failure (setting `errno` to indicate what the nature of the problem
was), BIND style always keeps indication of the function's success or
failure separate from its returned data. Similarly, the C library
function `fread()` returns the number of characters read and then
depends on `feof()` and `ferror()` to determine whether an error occured
depends on `feof()` and `ferror()` to determine whether an error occurred
or the end of file was reached, but BIND's version uses result codes:
char buffer[BUFSIZ];
......
......@@ -647,7 +647,7 @@ support it. Is it in the POSIX standard? If so, how long has it been
there? (BIND is still run on some operating systems released in the
1990s.) Is its behavior the same on all platforms? Is its signature
the same? Are integer parameters the same size and signedness? Does it
alwasy return the same values on success, and set the same `errno` codes
always return the same values on success, and set the same `errno` codes
on failure?
If there is a chance the library call may not be completely portable,
......
......@@ -2597,7 +2597,7 @@ dns_adb_create(isc_mem_t *mem, dns_view_t *view, isc_timermgr_t *timermgr,
result = isc_taskmgr_excltask(adb->taskmgr, &adb->excl);
if (result != ISC_R_SUCCESS) {
DP(DEF_LEVEL, "adb: task-exclusive mode unavailable, "
"intializing table sizes to %u\n",
"initializing table sizes to %u\n",
nbuckets[11]);
adb->nentries = nbuckets[11];
adb->nnames = nbuckets[11];
......
......@@ -2904,7 +2904,7 @@ get_udpsocket(dns_dispatchmgr_t *mgr, dns_dispatch_t *disp,
result = open_socket(sockmgr, &localaddr_bound,
0, &sock, NULL);
/*
* Continue if the port choosen is already in use
* Continue if the port chosen is already in use
* or the OS has reserved it.
*/
if (result == ISC_R_NOPERM ||
......
......@@ -2041,7 +2041,7 @@ dns_dnssec_syncupdate(dns_dnsseckeylist_t *keys, dns_dnsseckeylist_t *rmkeys,
return (ISC_R_SUCCESS);
/*
* Unconditionaly remove CDS/DNSKEY records for removed keys.
* Unconditionally remove CDS/DNSKEY records for removed keys.
*/
for (key = ISC_LIST_HEAD(*rmkeys);
key != NULL;
......
......@@ -754,7 +754,7 @@ void
dns_adb_setcookie(dns_adb_t *adb, dns_adbaddrinfo_t *addr,
const unsigned char *cookie, size_t len);
/*%<
* Record the COOKIE associated with this addresss. If
* Record the COOKIE associated with this address. If
* cookie is NULL or len is zero the recorded COOKIE is cleared.
*
* Requires:
......
......@@ -9,8 +9,6 @@
* information regarding copyright ownership.
*/
/* $Id$ */
#ifndef DNS_DB_H
#define DNS_DB_H 1
......@@ -1488,7 +1486,7 @@ dns_db_getoriginnode(dns_db_t *db, dns_dbnode_t **nodep);
isc_result_t
dns_db_getnsec3parameters(dns_db_t *db, dns_dbversion_t *version,
dns_hash_t *hash, uint8_t *flags,
uint16_t *interations,
uint16_t *iterations,
unsigned char *salt, size_t *salt_length);
/*%<
* Get the NSEC3 parameters that are associated with this zone.
......
......@@ -22,7 +22,7 @@ ISC_LANG_BEGINDECLS
/*!
* \brief
* Context for intializing a dyndb module.
* Context for initializing a dyndb module.
*
* This structure passes global server data to which a dyndb
* module will need access -- the server memory context, hash
......@@ -71,7 +71,7 @@ typedef isc_result_t dns_dyndb_register_t(isc_mem_t *mctx,
* 'parameters' contains the driver configuration text. 'dctx' is the
* initialization context set up in dns_dyndb_createctx().
*
* '*instp' must be set to the driver instance handle if the functino
* '*instp' must be set to the driver instance handle if the function
* is successful.
*
* Returns:
......
......@@ -427,7 +427,7 @@ dns_keynode_detach(isc_mem_t *mctx, dns_keynode_t **target);
void
dns_keynode_detachall(isc_mem_t *mctx, dns_keynode_t **target);
/*%<
* Detach a keynode and all its succesors.
* Detach a keynode and all its successors.
*/
isc_result_t
......
......@@ -674,7 +674,7 @@ fix_mustbedelegationornxdomain(dns_message_t *message, fetchctx_t *fctx) {
* zone. So a response to an explicit query for this type should be
* excluded from delegation-only fixup.
*
* SOA, NS, and DNSKEY can only exist at a zone apex, so a postive
* SOA, NS, and DNSKEY can only exist at a zone apex, so a positive
* response to a query for these types can never violate the
* delegation-only assumption: if the query name is below a
* zone cut, the response should normally be a referral, which should
......@@ -2455,7 +2455,7 @@ resquery_send(resquery_t *query) {
query->ednsversion = -1;
/*
* Record the UDP EDNS size choosen.
* Record the UDP EDNS size chosen.
*/
query->udpsize = udpsize;
......
......@@ -629,7 +629,7 @@ netspeed(void **state) {
/*
* GeoIP best-database matching
* (With no specified databse and a city database available, answers
* (With no specified database and a city database available, answers
* should come from city database. With city database unavailable, region
* database. Region database unavailable, country database.)
*/
......
......@@ -88,7 +88,7 @@ int i = 0;
*
* 'out' MUST point to an array of at least len * 2 + 1
*
* Return values: ISC_R_SUCCESS if the operation is sucessful
* Return values: ISC_R_SUCCESS if the operation is successful
*/
static isc_result_t
tohexstr(unsigned char *d, unsigned int len, char *out, size_t out_size) {
......
......@@ -907,19 +907,19 @@ amtrelay(void **state) {
TEXT_INVALID("256 1 0"), /* precedence out of range */
/* IPv4 gateway */
TEXT_INVALID("0 0 1"), /* no addresss */
TEXT_INVALID("0 0 1"), /* no address */
TEXT_VALID("0 0 1 0.0.0.0"),
TEXT_INVALID("0 0 1 0.0.0.0 x"), /* extra */
TEXT_INVALID("0 0 1 0.0.0.0.0"), /* bad addresss */
TEXT_INVALID("0 0 1 ::"), /* bad addresss */
TEXT_INVALID("0 0 1 ."), /* bad addresss */
TEXT_INVALID("0 0 1 0.0.0.0.0"), /* bad address */
TEXT_INVALID("0 0 1 ::"), /* bad address */
TEXT_INVALID("0 0 1 ."), /* bad address */
/* IPv6 gateway */
TEXT_INVALID("0 0 2"), /* no addresss */
TEXT_INVALID("0 0 2"), /* no address */
TEXT_VALID("0 0 2 ::"),
TEXT_INVALID("0 0 2 :: xx"), /* extra */
TEXT_INVALID("0 0 2 0.0.0.0"), /* bad addresss */
TEXT_INVALID("0 0 2 ."), /* bad addresss */