aboutsummaryrefslogtreecommitdiff
path: root/src/plugins
diff options
context:
space:
mode:
authorGreg Hudson <ghudson@mit.edu>2020-04-02 13:56:58 -0400
committerGreg Hudson <ghudson@mit.edu>2020-04-08 15:10:30 -0400
commitdb245c0d98c8e38a78a2e0b4af40ee23a18aaa96 (patch)
tree8453c1707733d0cdc3d9c2c6b0e3c0c9a825490d /src/plugins
parent022f2cbc7f5abc9fbefa0d68b6025216c1b59353 (diff)
downloadkrb5-db245c0d98c8e38a78a2e0b4af40ee23a18aaa96.zip
krb5-db245c0d98c8e38a78a2e0b4af40ee23a18aaa96.tar.gz
krb5-db245c0d98c8e38a78a2e0b4af40ee23a18aaa96.tar.bz2
Fix typos in comments
Correct comment spelling errors detected using codespell. Reported by Jens Schleusener.
Diffstat (limited to 'src/plugins')
-rw-r--r--src/plugins/kdb/db2/adb_policy.c2
-rw-r--r--src/plugins/kdb/db2/kdb_db2.c4
-rw-r--r--src/plugins/kdb/db2/kdb_xdr.c5
-rw-r--r--src/plugins/kdb/ldap/ldap_util/kdb5_ldap_list.c4
-rw-r--r--src/plugins/kdb/ldap/ldap_util/kdb5_ldap_policy.c2
-rw-r--r--src/plugins/kdb/ldap/ldap_util/kdb5_ldap_services.c2
-rw-r--r--src/plugins/kdb/ldap/ldap_util/kdb5_ldap_util.c2
-rw-r--r--src/plugins/kdb/ldap/libkdb_ldap/ldap_handle.c2
-rw-r--r--src/plugins/kdb/ldap/libkdb_ldap/ldap_krbcontainer.c4
-rw-r--r--src/plugins/kdb/ldap/libkdb_ldap/ldap_principal.c6
-rw-r--r--src/plugins/kdb/ldap/libkdb_ldap/ldap_realm.c2
-rw-r--r--src/plugins/kdb/ldap/libkdb_ldap/ldap_tkt_policy.c2
-rw-r--r--src/plugins/preauth/pkinit/pkinit_clnt.c2
-rw-r--r--src/plugins/preauth/pkinit/pkinit_crypto.h2
-rw-r--r--src/plugins/preauth/pkinit/pkinit_matching.c2
-rw-r--r--src/plugins/preauth/securid_sam2/securid2.c4
16 files changed, 24 insertions, 23 deletions
diff --git a/src/plugins/kdb/db2/adb_policy.c b/src/plugins/kdb/db2/adb_policy.c
index 5e046ab..9bf1931 100644
--- a/src/plugins/kdb/db2/adb_policy.c
+++ b/src/plugins/kdb/db2/adb_policy.c
@@ -310,7 +310,7 @@ error:
*
* Arguments:
* db (input) db handle
- * func (input) fucntion pointer to call
+ * func (input) function pointer to call
* data opaque data type
* <return value> 0 on success error code on failure
*
diff --git a/src/plugins/kdb/db2/kdb_db2.c b/src/plugins/kdb/db2/kdb_db2.c
index 5106a5c..1a476b5 100644
--- a/src/plugins/kdb/db2/kdb_db2.c
+++ b/src/plugins/kdb/db2/kdb_db2.c
@@ -95,7 +95,7 @@
* time of this file is the "version number" of the database.
* At the start of a read operation, the reader checks the version
* number; at the end of the read operation, it checks again. If the
- * version number changed, or if the semaphore was nonexistant at
+ * version number changed, or if the semaphore was nonexistent at
* either time, the reader sleeps for a second to let things
* stabilize, and then tries again; if it does not succeed after
* KRB5_DBM_MAX_RETRY attempts, it gives up.
@@ -107,7 +107,7 @@
*
* If the system crashes in the middle of an update, the semaphore
* file is not automatically created on reboot; this is a feature, not
- * a bug, since the database may be inconsistant. Note that the
+ * a bug, since the database may be inconsistent. Note that the
* absence of a semaphore file does not prevent another _update_ from
* taking place later. Database replacements take place automatically
* only on replica servers; a crash in the middle of an update will be
diff --git a/src/plugins/kdb/db2/kdb_xdr.c b/src/plugins/kdb/db2/kdb_xdr.c
index aae5343..054a87a 100644
--- a/src/plugins/kdb/db2/kdb_xdr.c
+++ b/src/plugins/kdb/db2/kdb_xdr.c
@@ -182,7 +182,7 @@ krb5_encode_princ_entry(krb5_context context, krb5_data *content,
(void) memcpy(nextloc, unparse_princ, unparse_princ_size);
nextloc += unparse_princ_size;
- /* tl_data is a linked list, of type, legth, contents */
+ /* tl_data is a linked list, of type, length, contents */
for (tl_data = entry->tl_data; tl_data; tl_data = tl_data->tl_data_next) {
krb5_kdb_encode_int16(tl_data->tl_data_type, nextloc);
nextloc += 2;
@@ -399,7 +399,8 @@ krb5_decode_princ_entry(krb5_context context, krb5_data *content,
krb5_kdb_decode_int16(nextloc, key_data->key_data_kvno);
nextloc += 2;
- /* key_data_ver determins number of elements and how to unparse them. */
+ /* key_data_ver determines number of elements and how to unparse
+ * them. */
if (key_data->key_data_ver >= 0 &&
key_data->key_data_ver <= KRB5_KDB_V1_KEY_DATA_ARRAY) {
for (j = 0; j < key_data->key_data_ver; j++) {
diff --git a/src/plugins/kdb/ldap/ldap_util/kdb5_ldap_list.c b/src/plugins/kdb/ldap/ldap_util/kdb5_ldap_list.c
index 9402813..52375a2 100644
--- a/src/plugins/kdb/ldap/ldap_util/kdb5_ldap_list.c
+++ b/src/plugins/kdb/ldap/ldap_util/kdb5_ldap_list.c
@@ -163,7 +163,7 @@ list_modify_str_array(char ***destlist, const char **sourcelist, int mode)
/* We need to add every entry present in the source list to
* the destination list */
if (mode == LIST_MODE_ADD) {
- /* Traverse throught the end of destlist for appending */
+ /* Traverse through the end of destlist for appending */
for (dlist = *destlist, dcount = 0; *dlist != NULL;
dlist++, dcount++) {
; /* NULL statement */
@@ -227,7 +227,7 @@ list_modify_int_array(int *destlist, const int *sourcelist, int mode)
/* We need to add every entry present in the source list to the
* destination list */
if (mode == LIST_MODE_ADD) {
- /* Traverse throught the end of destlist for appending */
+ /* Traverse through the end of destlist for appending */
for (dlist = destlist, dcount = 0; *dlist != END_OF_LIST;
dlist++, dcount++)
; /* NULL statement */
diff --git a/src/plugins/kdb/ldap/ldap_util/kdb5_ldap_policy.c b/src/plugins/kdb/ldap/ldap_util/kdb5_ldap_policy.c
index 02cb059..c642e17 100644
--- a/src/plugins/kdb/ldap/ldap_util/kdb5_ldap_policy.c
+++ b/src/plugins/kdb/ldap/ldap_util/kdb5_ldap_policy.c
@@ -432,7 +432,7 @@ kdb5_ldap_modify_policy(int argc, char *argv[])
int i = 0;
/* Check for number of arguments -- minimum is 3
- since atleast one parameter should be given in
+ since at least one parameter should be given in
addition to 'modify_policy' and policy DN */
if ((argc < 3) || (argc > 16)) {
goto err_usage;
diff --git a/src/plugins/kdb/ldap/ldap_util/kdb5_ldap_services.c b/src/plugins/kdb/ldap/ldap_util/kdb5_ldap_services.c
index b92cb58..e87688d 100644
--- a/src/plugins/kdb/ldap/ldap_util/kdb5_ldap_services.c
+++ b/src/plugins/kdb/ldap/ldap_util/kdb5_ldap_services.c
@@ -284,7 +284,7 @@ kdb5_ldap_stash_service_password(int argc, char **argv)
goto cleanup;
}
- /* TODO: file lock for the service passowrd file */
+ /* TODO: file lock for the service password file */
fclose(pfile);
fclose(newfile);
diff --git a/src/plugins/kdb/ldap/ldap_util/kdb5_ldap_util.c b/src/plugins/kdb/ldap/ldap_util/kdb5_ldap_util.c
index d233106..0b56ba8 100644
--- a/src/plugins/kdb/ldap/ldap_util/kdb5_ldap_util.c
+++ b/src/plugins/kdb/ldap/ldap_util/kdb5_ldap_util.c
@@ -432,7 +432,7 @@ main(int argc, char *argv[])
&global_params, &global_params);
if (retval) {
com_err(progname, retval,
- _("while retreiving configuration parameters"));
+ _("while retrieving configuration parameters"));
exit_status++;
goto cleanup;
}
diff --git a/src/plugins/kdb/ldap/libkdb_ldap/ldap_handle.c b/src/plugins/kdb/ldap/libkdb_ldap/ldap_handle.c
index 2f5d3d9..49d684e 100644
--- a/src/plugins/kdb/ldap/libkdb_ldap/ldap_handle.c
+++ b/src/plugins/kdb/ldap/libkdb_ldap/ldap_handle.c
@@ -57,7 +57,7 @@ krb5_get_ldap_handle(krb5_ldap_context *ldap_context)
}
/*
- * This is called incase krb5_get_ldap_handle returns NULL.
+ * This is called in case krb5_get_ldap_handle returns NULL.
* Try getting a single connection (handle) and return the same by
* calling krb5_get_ldap_handle function.
* Do not lock the mutex here. The caller should lock it
diff --git a/src/plugins/kdb/ldap/libkdb_ldap/ldap_krbcontainer.c b/src/plugins/kdb/ldap/libkdb_ldap/ldap_krbcontainer.c
index 7668ee5..a810e63 100644
--- a/src/plugins/kdb/ldap/libkdb_ldap/ldap_krbcontainer.c
+++ b/src/plugins/kdb/ldap/libkdb_ldap/ldap_krbcontainer.c
@@ -48,7 +48,7 @@ krb5_ldap_read_krbcontainer_dn(krb5_context context, char **container_dn)
*container_dn = NULL;
SETUP_CONTEXT();
- /* read kerberos containter location from [dbmodules] section of krb5.conf file */
+ /* read kerberos container location from [dbmodules] section of krb5.conf file */
if (ldap_context->conf_section) {
if ((st=profile_get_string(context->profile, KDB_MODULE_SECTION, ldap_context->conf_section,
KRB5_CONF_LDAP_KERBEROS_CONTAINER_DN, NULL,
@@ -59,7 +59,7 @@ krb5_ldap_read_krbcontainer_dn(krb5_context context, char **container_dn)
}
}
- /* read kerberos containter location from [dbdefaults] section of krb5.conf file */
+ /* read kerberos container location from [dbdefaults] section of krb5.conf file */
if (dn == NULL) {
if ((st=profile_get_string(context->profile, KDB_MODULE_DEF_SECTION,
KRB5_CONF_LDAP_KERBEROS_CONTAINER_DN, NULL,
diff --git a/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal.c b/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal.c
index a5180c7..ce28bf6 100644
--- a/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal.c
+++ b/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal.c
@@ -291,7 +291,7 @@ krb5_ldap_delete_principal(krb5_context context,
* From the attrsetmask value, identify the attributes set on the directory user
* object and delete them.
* NOTE: krbsecretkey attribute has per principal entries. There can be chances that the
- * other principals' keys are exisiting/left-over. So delete all the values.
+ * other principals' keys are existing/left-over. So delete all the values.
*/
while (attrsetmask) {
if (attrsetmask & 1) {
@@ -565,7 +565,7 @@ cleanup:
/*
* Function: krb5_ldap_unparse_principal_name
*
- * Purpose: Removes '\\' that comes before every occurence of '@'
+ * Purpose: Removes '\\' that comes before every occurrence of '@'
* in the principal name component.
*
* Arguments:
@@ -593,7 +593,7 @@ krb5_ldap_unparse_principal_name(char *user_name)
/*
* Function: krb5_ldap_parse_principal_name
*
- * Purpose: Inserts '\\' before every occurence of '@'
+ * Purpose: Inserts '\\' before every occurrence of '@'
* in the principal name component.
*
* Arguments:
diff --git a/src/plugins/kdb/ldap/libkdb_ldap/ldap_realm.c b/src/plugins/kdb/ldap/libkdb_ldap/ldap_realm.c
index f6d00be..3daf524 100644
--- a/src/plugins/kdb/ldap/libkdb_ldap/ldap_realm.c
+++ b/src/plugins/kdb/ldap/libkdb_ldap/ldap_realm.c
@@ -444,7 +444,7 @@ krb5_ldap_modify_realm(krb5_context context, krb5_ldap_realm_params *rparams,
}
- /* Realm modify opearation */
+ /* Realm modify operation */
if (mods != NULL) {
if ((st=ldap_modify_ext_s(ld, rparams->realmdn, mods, NULL, NULL)) != LDAP_SUCCESS) {
st = set_ldap_error (context, st, OP_MOD);
diff --git a/src/plugins/kdb/ldap/libkdb_ldap/ldap_tkt_policy.c b/src/plugins/kdb/ldap/libkdb_ldap/ldap_tkt_policy.c
index 4193b4a..4f48fd6 100644
--- a/src/plugins/kdb/ldap/libkdb_ldap/ldap_tkt_policy.c
+++ b/src/plugins/kdb/ldap/libkdb_ldap/ldap_tkt_policy.c
@@ -286,7 +286,7 @@ cleanup:
* check the existence of the object. This serves one major purpose,
* i.e., if the object to be is anything other than the ticket policy
* object then the krb5_ldap_read_policy returns an error and thus is
- * not accidently deleted in this function.
+ * not accidentally deleted in this function.
*
* NOTE: Other kerberos objects (user/realm object) might be having
* references to the policy object to be deleted. This situation is
diff --git a/src/plugins/preauth/pkinit/pkinit_clnt.c b/src/plugins/preauth/pkinit/pkinit_clnt.c
index 4d47f73..2817cc2 100644
--- a/src/plugins/preauth/pkinit/pkinit_clnt.c
+++ b/src/plugins/preauth/pkinit/pkinit_clnt.c
@@ -758,7 +758,7 @@ pkinit_as_rep_parse(krb5_context context,
break;
default:
- pkiDebug("unknow as_rep type %d\n", kdc_reply->choice);
+ pkiDebug("unknown as_rep type %d\n", kdc_reply->choice);
goto cleanup;
}
diff --git a/src/plugins/preauth/pkinit/pkinit_crypto.h b/src/plugins/preauth/pkinit/pkinit_crypto.h
index 8064a07..77d5c61 100644
--- a/src/plugins/preauth/pkinit/pkinit_crypto.h
+++ b/src/plugins/preauth/pkinit/pkinit_crypto.h
@@ -356,7 +356,7 @@ krb5_error_code server_check_dh
krb5_data *dh_params, /* IN
???? */
int minbits); /* IN
- the mininum number of key bits acceptable */
+ the minimum number of key bits acceptable */
/*
* this function completes the KDC's DH protocol. The KDC generates
diff --git a/src/plugins/preauth/pkinit/pkinit_matching.c b/src/plugins/preauth/pkinit/pkinit_matching.c
index afcce3f..b042c74 100644
--- a/src/plugins/preauth/pkinit/pkinit_matching.c
+++ b/src/plugins/preauth/pkinit/pkinit_matching.c
@@ -296,7 +296,7 @@ parse_rule_component(krb5_context context,
rc->kwval_type = kwval_type;
/*
- * Before procesing the value for this keyword,
+ * Before processing the value for this keyword,
* (compiling the regular expression or processing the list)
* we need to find the end of it. That means parsing for the
* beginning of the next keyword (or the end of the rule).
diff --git a/src/plugins/preauth/securid_sam2/securid2.c b/src/plugins/preauth/securid_sam2/securid2.c
index 363e17a..ef7a8bf 100644
--- a/src/plugins/preauth/securid_sam2/securid2.c
+++ b/src/plugins/preauth/securid_sam2/securid2.c
@@ -77,7 +77,7 @@ static char PIN_message[64]; /* Max length should be 50 chars */
* returns: 0 on success
* KRB5 error codes otherwise
*
- * builds pricipal name with final instance of "SECURID" and
+ * builds principal name with final instance of "SECURID" and
* finds the database entry, decrypts the key out of the database
* and passes the key back to the calling process
*/
@@ -436,7 +436,7 @@ verify_securid_data_2(krb5_context context, krb5_db_entry *client,
(memcmp(passcode, trackp->passcode, pin1_len) != 0)) {
retval = KRB5KDC_ERR_PREAUTH_FAILED;
krb5_klog_syslog(LOG_INFO, "New SecurID PIN Failed for user "
- "%s: PIN mis-match", user);
+ "%s: PIN mismatch", user);
break;
}
retval = SD_Pin(trackp->handle, passcode);