# Only user config
user-config: none
-# These values will not be overriden
+# These values will not be overridden
key1: system1
key2: system2
key3: system3
\ No newline at end of file
* @P11_KIT_ITER_WANT_WRITABLE: Try to open read-write sessions when
* iterating over obojects.
*
- * Various flags controling the behavior of the iterator.
+ * Various flags controlling the behavior of the iterator.
*/
/**
*
* Get the token info for the token which the current matching object is on.
*
- * This can only be called after p11_kit_iter_next(0 succeeds.
+ * This can only be called after p11_kit_iter_next() succeeds.
*
* Returns: the slot of the current matching object.
*/
/**
* p11_kit_iter_destroy_object:
- * @iter: teh iterator
+ * @iter: the iterator
*
- * Destory the current matching object.
+ * Destroy the current matching object.
*
* This can only be called after p11_kit_iter_next() succeeds.
*
return CKR_OK;
/*
- * Becuase of the mutex unlock below, we temporarily increase
+ * Because of the mutex unlock below, we temporarily increase
* the ref count. This prevents module from being freed out
* from ounder us.
*/
* If @flags contains the %P11_KIT_MODULE_CRITICAL flag then the
* modules will all be treated as 'critical', regardless of the module
* configuration. This means that a failure to load any module will
- * cause this funtion to fail.
+ * cause this function to fail.
*
* For unmanaged modules there is no guarantee to the state of the
* modules. Other callers may be using the modules. Using unmanaged
{
CK_SLOT_ID slot_id;
- /* Slot id becomes appartment so lower layers can tell clients apart. */
+ /* Slot id becomes apartment so lower layers can tell clients apart. */
BEGIN_CALL (CloseAllSessions);
IN_ULONG (slot_id);
* @title: Future
* @short_description: Future Unstable API
*
- * API that is not yet stable enough to be enabled by default. In all likelyhood
+ * API that is not yet stable enough to be enabled by default. In all likelihood
* this will be included in the next release. To use this API you must define a
* MACRO. See the p11-kit.h header for more details.
*/
else
neutral = allow;
- /* The value set if a purpose is explictly rejected */
+ /* The value set if a purpose is explicitly rejected */
disallow = CKT_NSS_NOT_TRUSTED;
for (i = 0; eku_attribute_map[i].type != CKA_INVALID; i++) {
# Mark this module as a viable source of trust policy information
trust-policy: yes
-# This is for drop-in compatibilty with glib-networking and gcr. Those
+# This is for drop-in compatibility with glib-networking and gcr. Those
# projects used this non-standard attribute to denote slots to use to
# retrieve trust information.
x-trust-lookup: pkcs11:library-description=PKCS%2311%20Kit%20Trust%20Module
int ret;
/*
- * This OpenSSL format is a wierd. It's just two DER structures
+ * This OpenSSL format is weird. It's just two DER structures
* placed end to end without any wrapping SEQ. So calculate the
* length of the first DER TLV we see and try to parse that as
* the X.509 certificate.