diff options
author | Greg Hudson <ghudson@mit.edu> | 2020-04-02 13:56:58 -0400 |
---|---|---|
committer | Greg Hudson <ghudson@mit.edu> | 2020-04-08 15:10:30 -0400 |
commit | db245c0d98c8e38a78a2e0b4af40ee23a18aaa96 (patch) | |
tree | 8453c1707733d0cdc3d9c2c6b0e3c0c9a825490d /src/plugins | |
parent | 022f2cbc7f5abc9fbefa0d68b6025216c1b59353 (diff) | |
download | krb5-db245c0d98c8e38a78a2e0b4af40ee23a18aaa96.zip krb5-db245c0d98c8e38a78a2e0b4af40ee23a18aaa96.tar.gz krb5-db245c0d98c8e38a78a2e0b4af40ee23a18aaa96.tar.bz2 |
Fix typos in comments
Correct comment spelling errors detected using codespell.
Reported by Jens Schleusener.
Diffstat (limited to 'src/plugins')
-rw-r--r-- | src/plugins/kdb/db2/adb_policy.c | 2 | ||||
-rw-r--r-- | src/plugins/kdb/db2/kdb_db2.c | 4 | ||||
-rw-r--r-- | src/plugins/kdb/db2/kdb_xdr.c | 5 | ||||
-rw-r--r-- | src/plugins/kdb/ldap/ldap_util/kdb5_ldap_list.c | 4 | ||||
-rw-r--r-- | src/plugins/kdb/ldap/ldap_util/kdb5_ldap_policy.c | 2 | ||||
-rw-r--r-- | src/plugins/kdb/ldap/ldap_util/kdb5_ldap_services.c | 2 | ||||
-rw-r--r-- | src/plugins/kdb/ldap/ldap_util/kdb5_ldap_util.c | 2 | ||||
-rw-r--r-- | src/plugins/kdb/ldap/libkdb_ldap/ldap_handle.c | 2 | ||||
-rw-r--r-- | src/plugins/kdb/ldap/libkdb_ldap/ldap_krbcontainer.c | 4 | ||||
-rw-r--r-- | src/plugins/kdb/ldap/libkdb_ldap/ldap_principal.c | 6 | ||||
-rw-r--r-- | src/plugins/kdb/ldap/libkdb_ldap/ldap_realm.c | 2 | ||||
-rw-r--r-- | src/plugins/kdb/ldap/libkdb_ldap/ldap_tkt_policy.c | 2 | ||||
-rw-r--r-- | src/plugins/preauth/pkinit/pkinit_clnt.c | 2 | ||||
-rw-r--r-- | src/plugins/preauth/pkinit/pkinit_crypto.h | 2 | ||||
-rw-r--r-- | src/plugins/preauth/pkinit/pkinit_matching.c | 2 | ||||
-rw-r--r-- | src/plugins/preauth/securid_sam2/securid2.c | 4 |
16 files changed, 24 insertions, 23 deletions
diff --git a/src/plugins/kdb/db2/adb_policy.c b/src/plugins/kdb/db2/adb_policy.c index 5e046ab..9bf1931 100644 --- a/src/plugins/kdb/db2/adb_policy.c +++ b/src/plugins/kdb/db2/adb_policy.c @@ -310,7 +310,7 @@ error: * * Arguments: * db (input) db handle - * func (input) fucntion pointer to call + * func (input) function pointer to call * data opaque data type * <return value> 0 on success error code on failure * diff --git a/src/plugins/kdb/db2/kdb_db2.c b/src/plugins/kdb/db2/kdb_db2.c index 5106a5c..1a476b5 100644 --- a/src/plugins/kdb/db2/kdb_db2.c +++ b/src/plugins/kdb/db2/kdb_db2.c @@ -95,7 +95,7 @@ * time of this file is the "version number" of the database. * At the start of a read operation, the reader checks the version * number; at the end of the read operation, it checks again. If the - * version number changed, or if the semaphore was nonexistant at + * version number changed, or if the semaphore was nonexistent at * either time, the reader sleeps for a second to let things * stabilize, and then tries again; if it does not succeed after * KRB5_DBM_MAX_RETRY attempts, it gives up. @@ -107,7 +107,7 @@ * * If the system crashes in the middle of an update, the semaphore * file is not automatically created on reboot; this is a feature, not - * a bug, since the database may be inconsistant. Note that the + * a bug, since the database may be inconsistent. Note that the * absence of a semaphore file does not prevent another _update_ from * taking place later. Database replacements take place automatically * only on replica servers; a crash in the middle of an update will be diff --git a/src/plugins/kdb/db2/kdb_xdr.c b/src/plugins/kdb/db2/kdb_xdr.c index aae5343..054a87a 100644 --- a/src/plugins/kdb/db2/kdb_xdr.c +++ b/src/plugins/kdb/db2/kdb_xdr.c @@ -182,7 +182,7 @@ krb5_encode_princ_entry(krb5_context context, krb5_data *content, (void) memcpy(nextloc, unparse_princ, unparse_princ_size); nextloc += unparse_princ_size; - /* tl_data is a linked list, of type, legth, contents */ + /* tl_data is a linked list, of type, length, contents */ for (tl_data = entry->tl_data; tl_data; tl_data = tl_data->tl_data_next) { krb5_kdb_encode_int16(tl_data->tl_data_type, nextloc); nextloc += 2; @@ -399,7 +399,8 @@ krb5_decode_princ_entry(krb5_context context, krb5_data *content, krb5_kdb_decode_int16(nextloc, key_data->key_data_kvno); nextloc += 2; - /* key_data_ver determins number of elements and how to unparse them. */ + /* key_data_ver determines number of elements and how to unparse + * them. */ if (key_data->key_data_ver >= 0 && key_data->key_data_ver <= KRB5_KDB_V1_KEY_DATA_ARRAY) { for (j = 0; j < key_data->key_data_ver; j++) { diff --git a/src/plugins/kdb/ldap/ldap_util/kdb5_ldap_list.c b/src/plugins/kdb/ldap/ldap_util/kdb5_ldap_list.c index 9402813..52375a2 100644 --- a/src/plugins/kdb/ldap/ldap_util/kdb5_ldap_list.c +++ b/src/plugins/kdb/ldap/ldap_util/kdb5_ldap_list.c @@ -163,7 +163,7 @@ list_modify_str_array(char ***destlist, const char **sourcelist, int mode) /* We need to add every entry present in the source list to * the destination list */ if (mode == LIST_MODE_ADD) { - /* Traverse throught the end of destlist for appending */ + /* Traverse through the end of destlist for appending */ for (dlist = *destlist, dcount = 0; *dlist != NULL; dlist++, dcount++) { ; /* NULL statement */ @@ -227,7 +227,7 @@ list_modify_int_array(int *destlist, const int *sourcelist, int mode) /* We need to add every entry present in the source list to the * destination list */ if (mode == LIST_MODE_ADD) { - /* Traverse throught the end of destlist for appending */ + /* Traverse through the end of destlist for appending */ for (dlist = destlist, dcount = 0; *dlist != END_OF_LIST; dlist++, dcount++) ; /* NULL statement */ diff --git a/src/plugins/kdb/ldap/ldap_util/kdb5_ldap_policy.c b/src/plugins/kdb/ldap/ldap_util/kdb5_ldap_policy.c index 02cb059..c642e17 100644 --- a/src/plugins/kdb/ldap/ldap_util/kdb5_ldap_policy.c +++ b/src/plugins/kdb/ldap/ldap_util/kdb5_ldap_policy.c @@ -432,7 +432,7 @@ kdb5_ldap_modify_policy(int argc, char *argv[]) int i = 0; /* Check for number of arguments -- minimum is 3 - since atleast one parameter should be given in + since at least one parameter should be given in addition to 'modify_policy' and policy DN */ if ((argc < 3) || (argc > 16)) { goto err_usage; diff --git a/src/plugins/kdb/ldap/ldap_util/kdb5_ldap_services.c b/src/plugins/kdb/ldap/ldap_util/kdb5_ldap_services.c index b92cb58..e87688d 100644 --- a/src/plugins/kdb/ldap/ldap_util/kdb5_ldap_services.c +++ b/src/plugins/kdb/ldap/ldap_util/kdb5_ldap_services.c @@ -284,7 +284,7 @@ kdb5_ldap_stash_service_password(int argc, char **argv) goto cleanup; } - /* TODO: file lock for the service passowrd file */ + /* TODO: file lock for the service password file */ fclose(pfile); fclose(newfile); diff --git a/src/plugins/kdb/ldap/ldap_util/kdb5_ldap_util.c b/src/plugins/kdb/ldap/ldap_util/kdb5_ldap_util.c index d233106..0b56ba8 100644 --- a/src/plugins/kdb/ldap/ldap_util/kdb5_ldap_util.c +++ b/src/plugins/kdb/ldap/ldap_util/kdb5_ldap_util.c @@ -432,7 +432,7 @@ main(int argc, char *argv[]) &global_params, &global_params); if (retval) { com_err(progname, retval, - _("while retreiving configuration parameters")); + _("while retrieving configuration parameters")); exit_status++; goto cleanup; } diff --git a/src/plugins/kdb/ldap/libkdb_ldap/ldap_handle.c b/src/plugins/kdb/ldap/libkdb_ldap/ldap_handle.c index 2f5d3d9..49d684e 100644 --- a/src/plugins/kdb/ldap/libkdb_ldap/ldap_handle.c +++ b/src/plugins/kdb/ldap/libkdb_ldap/ldap_handle.c @@ -57,7 +57,7 @@ krb5_get_ldap_handle(krb5_ldap_context *ldap_context) } /* - * This is called incase krb5_get_ldap_handle returns NULL. + * This is called in case krb5_get_ldap_handle returns NULL. * Try getting a single connection (handle) and return the same by * calling krb5_get_ldap_handle function. * Do not lock the mutex here. The caller should lock it diff --git a/src/plugins/kdb/ldap/libkdb_ldap/ldap_krbcontainer.c b/src/plugins/kdb/ldap/libkdb_ldap/ldap_krbcontainer.c index 7668ee5..a810e63 100644 --- a/src/plugins/kdb/ldap/libkdb_ldap/ldap_krbcontainer.c +++ b/src/plugins/kdb/ldap/libkdb_ldap/ldap_krbcontainer.c @@ -48,7 +48,7 @@ krb5_ldap_read_krbcontainer_dn(krb5_context context, char **container_dn) *container_dn = NULL; SETUP_CONTEXT(); - /* read kerberos containter location from [dbmodules] section of krb5.conf file */ + /* read kerberos container location from [dbmodules] section of krb5.conf file */ if (ldap_context->conf_section) { if ((st=profile_get_string(context->profile, KDB_MODULE_SECTION, ldap_context->conf_section, KRB5_CONF_LDAP_KERBEROS_CONTAINER_DN, NULL, @@ -59,7 +59,7 @@ krb5_ldap_read_krbcontainer_dn(krb5_context context, char **container_dn) } } - /* read kerberos containter location from [dbdefaults] section of krb5.conf file */ + /* read kerberos container location from [dbdefaults] section of krb5.conf file */ if (dn == NULL) { if ((st=profile_get_string(context->profile, KDB_MODULE_DEF_SECTION, KRB5_CONF_LDAP_KERBEROS_CONTAINER_DN, NULL, diff --git a/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal.c b/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal.c index a5180c7..ce28bf6 100644 --- a/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal.c +++ b/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal.c @@ -291,7 +291,7 @@ krb5_ldap_delete_principal(krb5_context context, * From the attrsetmask value, identify the attributes set on the directory user * object and delete them. * NOTE: krbsecretkey attribute has per principal entries. There can be chances that the - * other principals' keys are exisiting/left-over. So delete all the values. + * other principals' keys are existing/left-over. So delete all the values. */ while (attrsetmask) { if (attrsetmask & 1) { @@ -565,7 +565,7 @@ cleanup: /* * Function: krb5_ldap_unparse_principal_name * - * Purpose: Removes '\\' that comes before every occurence of '@' + * Purpose: Removes '\\' that comes before every occurrence of '@' * in the principal name component. * * Arguments: @@ -593,7 +593,7 @@ krb5_ldap_unparse_principal_name(char *user_name) /* * Function: krb5_ldap_parse_principal_name * - * Purpose: Inserts '\\' before every occurence of '@' + * Purpose: Inserts '\\' before every occurrence of '@' * in the principal name component. * * Arguments: diff --git a/src/plugins/kdb/ldap/libkdb_ldap/ldap_realm.c b/src/plugins/kdb/ldap/libkdb_ldap/ldap_realm.c index f6d00be..3daf524 100644 --- a/src/plugins/kdb/ldap/libkdb_ldap/ldap_realm.c +++ b/src/plugins/kdb/ldap/libkdb_ldap/ldap_realm.c @@ -444,7 +444,7 @@ krb5_ldap_modify_realm(krb5_context context, krb5_ldap_realm_params *rparams, } - /* Realm modify opearation */ + /* Realm modify operation */ if (mods != NULL) { if ((st=ldap_modify_ext_s(ld, rparams->realmdn, mods, NULL, NULL)) != LDAP_SUCCESS) { st = set_ldap_error (context, st, OP_MOD); diff --git a/src/plugins/kdb/ldap/libkdb_ldap/ldap_tkt_policy.c b/src/plugins/kdb/ldap/libkdb_ldap/ldap_tkt_policy.c index 4193b4a..4f48fd6 100644 --- a/src/plugins/kdb/ldap/libkdb_ldap/ldap_tkt_policy.c +++ b/src/plugins/kdb/ldap/libkdb_ldap/ldap_tkt_policy.c @@ -286,7 +286,7 @@ cleanup: * check the existence of the object. This serves one major purpose, * i.e., if the object to be is anything other than the ticket policy * object then the krb5_ldap_read_policy returns an error and thus is - * not accidently deleted in this function. + * not accidentally deleted in this function. * * NOTE: Other kerberos objects (user/realm object) might be having * references to the policy object to be deleted. This situation is diff --git a/src/plugins/preauth/pkinit/pkinit_clnt.c b/src/plugins/preauth/pkinit/pkinit_clnt.c index 4d47f73..2817cc2 100644 --- a/src/plugins/preauth/pkinit/pkinit_clnt.c +++ b/src/plugins/preauth/pkinit/pkinit_clnt.c @@ -758,7 +758,7 @@ pkinit_as_rep_parse(krb5_context context, break; default: - pkiDebug("unknow as_rep type %d\n", kdc_reply->choice); + pkiDebug("unknown as_rep type %d\n", kdc_reply->choice); goto cleanup; } diff --git a/src/plugins/preauth/pkinit/pkinit_crypto.h b/src/plugins/preauth/pkinit/pkinit_crypto.h index 8064a07..77d5c61 100644 --- a/src/plugins/preauth/pkinit/pkinit_crypto.h +++ b/src/plugins/preauth/pkinit/pkinit_crypto.h @@ -356,7 +356,7 @@ krb5_error_code server_check_dh krb5_data *dh_params, /* IN ???? */ int minbits); /* IN - the mininum number of key bits acceptable */ + the minimum number of key bits acceptable */ /* * this function completes the KDC's DH protocol. The KDC generates diff --git a/src/plugins/preauth/pkinit/pkinit_matching.c b/src/plugins/preauth/pkinit/pkinit_matching.c index afcce3f..b042c74 100644 --- a/src/plugins/preauth/pkinit/pkinit_matching.c +++ b/src/plugins/preauth/pkinit/pkinit_matching.c @@ -296,7 +296,7 @@ parse_rule_component(krb5_context context, rc->kwval_type = kwval_type; /* - * Before procesing the value for this keyword, + * Before processing the value for this keyword, * (compiling the regular expression or processing the list) * we need to find the end of it. That means parsing for the * beginning of the next keyword (or the end of the rule). diff --git a/src/plugins/preauth/securid_sam2/securid2.c b/src/plugins/preauth/securid_sam2/securid2.c index 363e17a..ef7a8bf 100644 --- a/src/plugins/preauth/securid_sam2/securid2.c +++ b/src/plugins/preauth/securid_sam2/securid2.c @@ -77,7 +77,7 @@ static char PIN_message[64]; /* Max length should be 50 chars */ * returns: 0 on success * KRB5 error codes otherwise * - * builds pricipal name with final instance of "SECURID" and + * builds principal name with final instance of "SECURID" and * finds the database entry, decrypts the key out of the database * and passes the key back to the calling process */ @@ -436,7 +436,7 @@ verify_securid_data_2(krb5_context context, krb5_db_entry *client, (memcmp(passcode, trackp->passcode, pin1_len) != 0)) { retval = KRB5KDC_ERR_PREAUTH_FAILED; krb5_klog_syslog(LOG_INFO, "New SecurID PIN Failed for user " - "%s: PIN mis-match", user); + "%s: PIN mismatch", user); break; } retval = SD_Pin(trackp->handle, passcode); |