diff options
Diffstat (limited to 'src/lib')
63 files changed, 121 insertions, 120 deletions
diff --git a/src/lib/apputils/net-server.c b/src/lib/apputils/net-server.c index 6b18dfe..294dcfc 100644 --- a/src/lib/apputils/net-server.c +++ b/src/lib/apputils/net-server.c @@ -362,7 +362,7 @@ loop_add_address(const char *address, int port, enum bind_type type, * * - addresses * A string for the addresses. Pass NULL to use the wildcard address. - * Supported delimeters can be found in ADDRESSES_DELIM. Addresses are + * Supported delimiters can be found in ADDRESSES_DELIM. Addresses are * parsed with k5_parse_host_name(). * - default_port * What port the socket should be set to if not specified in addresses. diff --git a/src/lib/apputils/udppktinfo.c b/src/lib/apputils/udppktinfo.c index 9a06ae8..c6e86f6 100644 --- a/src/lib/apputils/udppktinfo.c +++ b/src/lib/apputils/udppktinfo.c @@ -298,8 +298,8 @@ recv_from_to(int sock, void *buf, size_t len, int flags, if (!to || !tolen || !r) return recvfrom(sock, buf, len, flags, from, fromlen); - /* Clobber with something recognizeable in case we can't extract the - * address but try to use it anyways. */ + /* Clobber with something recognizable in case we can't extract the address + * but try to use it anyways. */ memset(to, 0x40, *tolen); iov.iov_base = buf; @@ -505,7 +505,7 @@ recv_from_to(int sock, void *buf, size_t len, int flags, aux_addressing_info *auxaddr) { if (to && tolen) { - /* Clobber with something recognizeable in case we try to use the + /* Clobber with something recognizable in case we try to use the * address. */ memset(to, 0x40, *tolen); *tolen = 0; diff --git a/src/lib/crypto/builtin/des/doc/libdes.doc b/src/lib/crypto/builtin/des/doc/libdes.doc index 19c03c1..6e9431e 100644 --- a/src/lib/crypto/builtin/des/doc/libdes.doc +++ b/src/lib/crypto/builtin/des/doc/libdes.doc @@ -149,7 +149,7 @@ int by "*key", then after getting a new key, call the des_set_key() routine when needed. - No meaningfull value is returned. Void is not used for compatibility + No meaningful value is returned. Void is not used for compatibility with other compilers. diff --git a/src/lib/crypto/builtin/des/t_verify.c b/src/lib/crypto/builtin/des/t_verify.c index f4332f5..4a19933 100644 --- a/src/lib/crypto/builtin/des/t_verify.c +++ b/src/lib/crypto/builtin/des/t_verify.c @@ -325,7 +325,7 @@ main(argc,argv) printf("%02x ",cipher_text[j]); printf("\n\n"); if ( memcmp((char *)cipher_text, (char *)checksum, 8) ) { - printf("verify: error in CBC cheksum\n"); + printf("verify: error in CBC checksum\n"); exit(-1); } else diff --git a/src/lib/crypto/builtin/sha1/shs.c b/src/lib/crypto/builtin/sha1/shs.c index f28a4fc..f66a753 100644 --- a/src/lib/crypto/builtin/sha1/shs.c +++ b/src/lib/crypto/builtin/sha1/shs.c @@ -139,7 +139,7 @@ void SHSTransform(SHS_LONG *digest, const SHS_LONG *data) #else - /* Heavy mangling, in 4 sub-rounds of 20 interations each. */ + /* Heavy mangling, in 4 sub-rounds of 20 iterations each. */ subRound( A, B, C, D, E, f1, K1, eData[ 0 ] ); subRound( E, A, B, C, D, f1, K1, eData[ 1 ] ); subRound( D, E, A, B, C, f1, K1, eData[ 2 ] ); diff --git a/src/lib/crypto/builtin/sha1/t_shs3.c b/src/lib/crypto/builtin/sha1/t_shs3.c index f7932ef..7aa0bbd 100644 --- a/src/lib/crypto/builtin/sha1/t_shs3.c +++ b/src/lib/crypto/builtin/sha1/t_shs3.c @@ -17,7 +17,7 @@ static void test7(void); /* When run on a little-endian CPU we need to perform byte reversal on an array of longwords. It is possible to make the code endianness- - independant by fiddling around with data at the byte level, but this + independent by fiddling around with data at the byte level, but this makes for very slow code, so we rely on the user to sort out endianness at compile time */ diff --git a/src/lib/crypto/openssl/enc_provider/rc4.c b/src/lib/crypto/openssl/enc_provider/rc4.c index a65d57b..bc87c6f 100644 --- a/src/lib/crypto/openssl/enc_provider/rc4.c +++ b/src/lib/crypto/openssl/enc_provider/rc4.c @@ -52,7 +52,7 @@ struct arcfour_state { /* Interface layer to krb5 crypto layer */ /* The workhorse of the arcfour system, - * this impliments the cipher + * this implements the cipher */ /* In-place IOV crypto */ diff --git a/src/lib/gssapi/krb5/accept_sec_context.c b/src/lib/gssapi/krb5/accept_sec_context.c index c821cc8..3f63ab6 100644 --- a/src/lib/gssapi/krb5/accept_sec_context.c +++ b/src/lib/gssapi/krb5/accept_sec_context.c @@ -750,7 +750,8 @@ kg_accept_krb5(minor_status, context_handle, goto fail; } - /* Always read the clients bindings - eventhough we might ignore them */ + /* Always read the client's bindings, even though we might ignore + * them. */ TREAD_STR(ptr, ptr2, reqcksum.length); if (input_chan_bindings != GSS_C_NO_CHANNEL_BINDINGS ) { diff --git a/src/lib/gssapi/krb5/gssapi_krb5.h b/src/lib/gssapi/krb5/gssapi_krb5.h index 84b4159..e266b59 100644 --- a/src/lib/gssapi/krb5/gssapi_krb5.h +++ b/src/lib/gssapi/krb5/gssapi_krb5.h @@ -124,7 +124,7 @@ typedef struct gss_krb5_lucid_key { } gss_krb5_lucid_key_t; typedef struct gss_krb5_rfc1964_keydata { - OM_uint32 sign_alg; /* signing algorthm */ + OM_uint32 sign_alg; /* signing algorithm */ OM_uint32 seal_alg; /* seal/encrypt algorithm */ gss_krb5_lucid_key_t ctx_key; /* Context key diff --git a/src/lib/gssapi/krb5/util_crypt.c b/src/lib/gssapi/krb5/util_crypt.c index 80954af..c9aaafd 100644 --- a/src/lib/gssapi/krb5/util_crypt.c +++ b/src/lib/gssapi/krb5/util_crypt.c @@ -677,7 +677,7 @@ kg_fixup_padding_iov(OM_uint32 *minor_status, gss_iov_buffer_desc *iov, * the padding length. * * If the caller manages the padding length, then relative_padlength - * wil be zero. + * will be zero. * * eg. if the buffers are structured as follows: * diff --git a/src/lib/gssapi/mechglue/g_acquire_cred_imp_name.c b/src/lib/gssapi/mechglue/g_acquire_cred_imp_name.c index 9eab25e..6ba170d 100644 --- a/src/lib/gssapi/mechglue/g_acquire_cred_imp_name.c +++ b/src/lib/gssapi/mechglue/g_acquire_cred_imp_name.c @@ -149,7 +149,7 @@ gss_acquire_cred_impersonate_name(OM_uint32 *minor_status, /* * if desired_mechs equals GSS_C_NULL_OID_SET, then pick an * appropriate default. We use the first mechanism in the - * mechansim list as the default. This set is created with + * mechanism list as the default. This set is created with * statics thus needs not be freed */ if(desired_mechs == GSS_C_NULL_OID_SET) { diff --git a/src/lib/gssapi/mechglue/g_acquire_cred_with_pw.c b/src/lib/gssapi/mechglue/g_acquire_cred_with_pw.c index 7835d59..cc34acc 100644 --- a/src/lib/gssapi/mechglue/g_acquire_cred_with_pw.c +++ b/src/lib/gssapi/mechglue/g_acquire_cred_with_pw.c @@ -146,7 +146,7 @@ OM_uint32 * time_rec; /* * if desired_mechs equals GSS_C_NULL_OID_SET, then pick an * appropriate default. We use the first mechanism in the - * mechansim list as the default. This set is created with + * mechanism list as the default. This set is created with * statics thus needs not be freed */ if(desired_mechs == GSS_C_NULL_OID_SET) { diff --git a/src/lib/gssapi/mechglue/g_dup_name.c b/src/lib/gssapi/mechglue/g_dup_name.c index cc824fd..ff01db2 100644 --- a/src/lib/gssapi/mechglue/g_dup_name.c +++ b/src/lib/gssapi/mechglue/g_dup_name.c @@ -81,7 +81,7 @@ gss_name_t *dest_name; dest_union->name_type = 0; dest_union->external_name = 0; - /* Now copy the external representaion */ + /* Now copy the external representation. */ if (gssint_create_copy_buffer(src_union->external_name, &dest_union->external_name, 0)) goto allocation_failure; diff --git a/src/lib/gssapi/mechglue/g_imp_name.c b/src/lib/gssapi/mechglue/g_imp_name.c index 374965b..c3e809c 100644 --- a/src/lib/gssapi/mechglue/g_imp_name.c +++ b/src/lib/gssapi/mechglue/g_imp_name.c @@ -356,7 +356,7 @@ importExportName(minor, unionName, inputNameType) * the unwrapped name. Presumably the exported name had, * prior to being exported been obtained in such a way * that it has been properly perpared ("canonicalized," in - * GSS-API terms) accroding to some name type; we cannot + * GSS-API terms) according to some name type; we cannot * tell what that name type was now, but the name should * need no further preparation other than the lowest * common denominator afforded by the mech to names diff --git a/src/lib/gssapi/mechglue/g_oid_ops.c b/src/lib/gssapi/mechglue/g_oid_ops.c index 1d75c63..1d7970c 100644 --- a/src/lib/gssapi/mechglue/g_oid_ops.c +++ b/src/lib/gssapi/mechglue/g_oid_ops.c @@ -27,7 +27,7 @@ #include "mglueP.h" /* - * gss_release_oid has been moved to g_initialize, becasue it requires access + * gss_release_oid has been moved to g_initialize, because it requires access * to the mechanism list. All functions requiring direct access to the * mechanism list are now in g_initialize.c */ diff --git a/src/lib/gssapi/mechglue/mglueP.h b/src/lib/gssapi/mechglue/mglueP.h index f16333c..2b65939 100644 --- a/src/lib/gssapi/mechglue/mglueP.h +++ b/src/lib/gssapi/mechglue/mglueP.h @@ -87,7 +87,7 @@ OM_uint32 gssint_get_mech_type_oid(gss_OID OID, gss_buffer_t token); * access mechanism specific versions of the gssapi routines through * the routines in the glue module (gssd_mech_glue.c) * - * This contants all of the functions defined in gssapi.h except for + * This contains all of the functions defined in gssapi.h except for * gss_release_buffer() and gss_release_oid_set(), which I am * assuming, for now, to be equal across mechanisms. */ @@ -739,8 +739,8 @@ typedef struct gss_config { * In the user space we use a wrapper structure to encompass the * mechanism entry points. The wrapper contain the mechanism * entry points and other data which is only relevant to the gss-api - * layer. In the kernel we use only the gss_config strucutre because - * the kernal does not cantain any of the extra gss-api specific data. + * layer. In the kernel we use only the gss_config structure because + * the kernel does not cantain any of the extra gss-api specific data. */ typedef struct gss_mech_config { char *kmodName; /* kernel module name */ diff --git a/src/lib/gssapi/spnego/spnego_mech.c b/src/lib/gssapi/spnego/spnego_mech.c index 8e0c3a3..c9305c7 100644 --- a/src/lib/gssapi/spnego/spnego_mech.c +++ b/src/lib/gssapi/spnego/spnego_mech.c @@ -3759,7 +3759,7 @@ put_negResult(unsigned char **buf_out, OM_uint32 negResult, } /* - * This routine compares the recieved mechset to the mechset that + * This routine compares the received mechset to the mechset that * this server can support. It looks sequentially through the mechset * and the first one that matches what the server can support is * chosen as the negotiated mechanism. If one is found, negResult diff --git a/src/lib/kadm5/clnt/client_init.c b/src/lib/kadm5/clnt/client_init.c index aa08918..ff1580e 100644 --- a/src/lib/kadm5/clnt/client_init.c +++ b/src/lib/kadm5/clnt/client_init.c @@ -285,7 +285,7 @@ init_any(krb5_context context, char *client_name, enum init_type init_type, goto error; /* - * Bypass the remainder of the code and return straightaway + * Bypass the remainder of the code and return straight away * if the gss service requested is kiprop */ if (iprop_enable) { diff --git a/src/lib/kadm5/kadm_err.et b/src/lib/kadm5/kadm_err.et index 892a6fa..fbe2e76 100644 --- a/src/lib/kadm5/kadm_err.et +++ b/src/lib/kadm5/kadm_err.et @@ -23,7 +23,7 @@ error_code KADM5_BAD_CLASS, "Invalid number of character classes" error_code KADM5_BAD_LENGTH, "Invalid password length" error_code KADM5_BAD_POLICY, "Illegal policy name" error_code KADM5_BAD_PRINCIPAL, "Illegal principal name" -error_code KADM5_BAD_AUX_ATTR, "Invalid auxillary attributes" +error_code KADM5_BAD_AUX_ATTR, "Invalid auxiliary attributes" error_code KADM5_BAD_HISTORY, "Invalid password history count" error_code KADM5_BAD_MIN_PASS_LIFE, "Password minimum life is greater than password maximum life" error_code KADM5_PASS_Q_TOOSHORT, "Password is too short" diff --git a/src/lib/kadm5/kadm_rpc_xdr.c b/src/lib/kadm5/kadm_rpc_xdr.c index 8383e4e..0411c3f 100644 --- a/src/lib/kadm5/kadm_rpc_xdr.c +++ b/src/lib/kadm5/kadm_rpc_xdr.c @@ -244,7 +244,7 @@ static bool_t xdr_krb5_boolean(XDR *xdrs, krb5_boolean *kbool) bool_t xdr_krb5_key_data_nocontents(XDR *xdrs, krb5_key_data *objp) { /* - * Note that this function intentionally DOES NOT tranfer key + * Note that this function intentionally DOES NOT transfer key * length or contents! xdr_krb5_key_data in adb_xdr.c does, but * that is only for use within the server-side library. */ diff --git a/src/lib/kadm5/srv/pwqual_dict.c b/src/lib/kadm5/srv/pwqual_dict.c index f736eac..e3ac20e 100644 --- a/src/lib/kadm5/srv/pwqual_dict.c +++ b/src/lib/kadm5/srv/pwqual_dict.c @@ -87,7 +87,7 @@ word_compare(const void *s1, const void *s2) * success. * * Modifies: - * word_list to point to a chunck of allocated memory containing + * word_list to point to a chunk of allocated memory containing * pointers to words * word_block to contain the dictionary. * diff --git a/src/lib/kadm5/srv/svr_principal.c b/src/lib/kadm5/srv/svr_principal.c index 53ecbe1..8a7ab6e 100644 --- a/src/lib/kadm5/srv/svr_principal.c +++ b/src/lib/kadm5/srv/svr_principal.c @@ -2005,7 +2005,7 @@ static int decrypt_key_data(krb5_context context, * kvnop (w) kvno to fill in, or NULL * * Effects: Searches the key_data array of entry, which must have been - * retrived with kadm5_get_principal with the KADM5_KEY_DATA mask, to + * retrieved with kadm5_get_principal with the KADM5_KEY_DATA mask, to * find a key with a specified enctype, salt type, and kvno in a * principal entry. If not found, return ENOENT. Otherwise, decrypt * it with the master key, and return the key in keyblock, the salt diff --git a/src/lib/kadm5/unit-test/api.current/chpass-principal.exp b/src/lib/kadm5/unit-test/api.current/chpass-principal.exp index 53a96e5..47a19dc 100644 --- a/src/lib/kadm5/unit-test/api.current/chpass-principal.exp +++ b/src/lib/kadm5/unit-test/api.current/chpass-principal.exp @@ -67,7 +67,7 @@ if { $RPC } { test1805 } # # admin with changepw service tickets try to change other principals -# password, failes with AUTH error +# password, fails with AUTH error test "chpass-principal 180.625" proc test180625 {} { global test diff --git a/src/lib/kadm5/unit-test/api.current/crte-principal.exp b/src/lib/kadm5/unit-test/api.current/crte-principal.exp index 52dda78..d6d6809 100644 --- a/src/lib/kadm5/unit-test/api.current/crte-principal.exp +++ b/src/lib/kadm5/unit-test/api.current/crte-principal.exp @@ -645,7 +645,7 @@ proc test28 {} { if {! [cmd [format { kadm5_get_principal $server_handle "%s/a" principal KADM5_PRINCIPAL_NORMAL_MASK } $test]]} { - fail "$test: can not retreive principal" + fail "$test: can not retrieve principal" return } send "lindex \$principal 10\n" @@ -689,7 +689,7 @@ proc test29 {} { if {! [cmd [format { kadm5_get_principal $server_handle "%s/a" principal KADM5_PRINCIPAL_NORMAL_MASK } $test]]} { - fail "$test: can not retreive principal" + fail "$test: can not retrieve principal" return; } send "lindex \$principal 1\n" @@ -733,7 +733,7 @@ proc test30 {} { if {! [cmd [format { kadm5_get_principal $server_handle "%s/a" principal KADM5_PRINCIPAL_NORMAL_MASK } $test]]} { - fail "$test: can not retreive principal" + fail "$test: can not retrieve principal" return; } send "lindex \$principal 3\n" @@ -778,7 +778,7 @@ proc test31 {} { if {! [cmd [format { kadm5_get_principal $server_handle "%s/a" principal KADM5_PRINCIPAL_NORMAL_MASK } $test]]} { - fail "$test: can not retreive principal" + fail "$test: can not retrieve principal" return; } send "lindex \$principal 3\n" @@ -823,7 +823,7 @@ proc test32 {} { if {! [cmd [format { kadm5_get_principal $server_handle "%s/a" principal KADM5_PRINCIPAL_NORMAL_MASK } $test]]} { - fail "$test: can not retreive principal" + fail "$test: can not retrieve principal" return; } if { ! [cmd {kadm5_get_policy $server_handle test-pol policy}]} { @@ -912,7 +912,7 @@ proc test33 {} { if {! [cmd [format { kadm5_get_principal $server_handle "%s/a" principal KADM5_PRINCIPAL_NORMAL_MASK } $test]]} { - fail "$test: can not retreive principal" + fail "$test: can not retrieve principal" return; } send "lindex \$principal 3\n" @@ -957,7 +957,7 @@ proc test34 {} { if {! [cmd [format { kadm5_get_principal $server_handle "%s/a" principal KADM5_PRINCIPAL_NORMAL_MASK } $test]]} { - fail "$test: can not retreive principal" + fail "$test: can not retrieve principal" return; } send "lindex \$principal 3\n" @@ -1002,7 +1002,7 @@ proc test35 {} { if {! [cmd [format { kadm5_get_principal $server_handle "%s/a" principal KADM5_PRINCIPAL_NORMAL_MASK } $test]]} { - fail "$test: can not retreive principal" + fail "$test: can not retrieve principal" return; } send "lindex \$principal 3\n" @@ -1047,7 +1047,7 @@ proc test36 {} { if {! [cmd [format { kadm5_get_principal $server_handle "%s/a" principal KADM5_PRINCIPAL_NORMAL_MASK } $test]]} { - fail "$test: can not retreive principal" + fail "$test: can not retrieve principal" return; } if { ! [cmd {kadm5_get_policy $server_handle test-pol policy} ]} { @@ -1135,7 +1135,7 @@ proc test37 {} { if {! [cmd [format { kadm5_get_principal $server_handle "%s/a" principal KADM5_PRINCIPAL_NORMAL_MASK } $test]]} { - fail "$test: can not retreive principal" + fail "$test: can not retrieve principal" return; } send "lindex \$principal 3\n" @@ -1179,7 +1179,7 @@ proc test38 {} { if {! [cmd [format { kadm5_get_principal $server_handle "%s/a" principal KADM5_PRINCIPAL_NORMAL_MASK } $test]]} { - fail "$test: can not retreive principal" + fail "$test: can not retrieve principal" return; } send "lindex \$principal 3\n" @@ -1308,7 +1308,7 @@ proc test40 {} { if {! [cmd [format { kadm5_get_principal $server_handle "%s/a" principal KADM5_PRINCIPAL_NORMAL_MASK } $test]]} { - fail "$test: can not retreive principal" + fail "$test: can not retrieve principal" return; } send "lindex \$principal 4\n" diff --git a/src/lib/kadm5/unit-test/api.current/dlte-policy.exp b/src/lib/kadm5/unit-test/api.current/dlte-policy.exp index 4ba40fd..ad2863d 100644 --- a/src/lib/kadm5/unit-test/api.current/dlte-policy.exp +++ b/src/lib/kadm5/unit-test/api.current/dlte-policy.exp @@ -158,7 +158,7 @@ proc test12 {} { $KADM5_STRUCT_VERSION $KADM5_API_VERSION_3 \ server_handle }]} { - perror "$test unexecpted failure in init" + perror "$test unexpected failure in init" return } if {! [cmd [format { diff --git a/src/lib/kadm5/unit-test/api.current/mod-principal.exp b/src/lib/kadm5/unit-test/api.current/mod-principal.exp index 44f8548..ac9f968 100644 --- a/src/lib/kadm5/unit-test/api.current/mod-principal.exp +++ b/src/lib/kadm5/unit-test/api.current/mod-principal.exp @@ -493,7 +493,7 @@ proc test22 {} { kadm5_modify_principal $server_handle [simple_principal "%s/a"] \ {KADM5_PW_EXPIRATION} } $test]]} { - fail "$test: modifiy failed" + fail "$test: modify failed" return } if {! [cmd [format { @@ -535,7 +535,7 @@ proc test23 {} { kadm5_modify_principal $server_handle [simple_principal "%s/a"] \ {KADM5_PW_EXPIRATION} } $test]]} { - fail "$test: modifiy failed" + fail "$test: modify failed" return } if {! [cmd [format { @@ -885,7 +885,7 @@ proc test29 {} { kadm5_modify_principal $server_handle [simple_principal "%s/a"] \ {KADM5_POLICY_CLR} } $test]]} { - fail "$test: modifiy failed" + fail "$test: modify failed" return } if {! [cmd [format { diff --git a/src/lib/kadm5/unit-test/config/unix.exp b/src/lib/kadm5/unit-test/config/unix.exp index ca67095..d7706ec 100644 --- a/src/lib/kadm5/unit-test/config/unix.exp +++ b/src/lib/kadm5/unit-test/config/unix.exp @@ -156,62 +156,62 @@ proc api_start {} { send "set current_struct_version \[expr \$KADM5_STRUCT_VERSION &~ \$KADM5_STRUCT_VERSION_MASK\]\n" expect { -re "$prompt$" {} - eof { perror "EOF setting API varibles"} - timeout { perror "timeout setting API varibles"} + eof { perror "EOF setting API variables"} + timeout { perror "timeout setting API variables"} } send "set current_api_version \[expr \$KADM5_API_VERSION_3 &~ \$KADM5_API_VERSION_MASK\]\n" expect { -re "$prompt$" {} - eof { perror "EOF setting API varibles"} - timeout { perror "timeout setting API varibles"} + eof { perror "EOF setting API variables"} + timeout { perror "timeout setting API variables"} } send "set bad_struct_version_mask \[expr 0x65432100 | \$current_struct_version\]\n" expect { -re "$prompt$" {} - eof { perror "EOF setting API varibles"} - timeout { perror "timeout setting API varibles"} + eof { perror "EOF setting API variables"} + timeout { perror "timeout setting API variables"} } send "set bad_api_version_mask \[expr 0x65432100 | \$current_api_version\]\n" expect { -re "$prompt$" {} - eof { perror "EOF setting API varibles"} - timeout { perror "timeout setting API varibles"} + eof { perror "EOF setting API variables"} + timeout { perror "timeout setting API variables"} } send "set no_api_version_mask \$current_api_version\n" expect { -re "$prompt$" {} - eof { perror "EOF setting API varibles"} - timeout { perror "timeout setting API varibles"} + eof { perror "EOF setting API variables"} + timeout { perror "timeout setting API variables"} } send "set no_struct_version_mask \$current_struct_version\n" expect { -re "$prompt$" {} - eof { perror "EOF setting API varibles"} - timeout { perror "timeout setting API varibles"} + eof { perror "EOF setting API variables"} + timeout { perror "timeout setting API variables"} } send "set old_api_version \[expr \$KADM5_API_VERSION_MASK | 0x00\]\n" expect { -re "$prompt$" {} - eof { perror "EOF setting API varibles"} - timeout { perror "timeout setting API varibles"} + eof { perror "EOF setting API variables"} + timeout { perror "timeout setting API variables"} } send "set old_struct_version \[expr \$KADM5_STRUCT_VERSION_MASK | 0x00\]\n" expect { -re "$prompt$" {} - eof { perror "EOF setting API varibles"} - timeout { perror "timeout setting API varibles"} + eof { perror "EOF setting API variables"} + timeout { perror "timeout setting API variables"} } send "set new_api_version \[expr \$KADM5_API_VERSION_MASK | 0xca\]\n" expect { -re "$prompt$" {} - eof { perror "EOF setting API varibles"} - timeout { perror "timeout setting API varibles"} + eof { perror "EOF setting API variables"} + timeout { perror "timeout setting API variables"} } send "set new_struct_version \[expr \$KADM5_STRUCT_VERSION_MASK | 0xca\]\n" expect { -re "$prompt$" {} - eof { perror "EOF setting API varibles"} - timeout { perror "timeout setting API varibles"} + eof { perror "EOF setting API variables"} + timeout { perror "timeout setting API variables"} } set api_pid $pid diff --git a/src/lib/krad/internal.h b/src/lib/krad/internal.h index 996a893..0143d15 100644 --- a/src/lib/krad/internal.h +++ b/src/lib/krad/internal.h @@ -93,9 +93,9 @@ kr_remote_free(krad_remote *rr); * The timeout parameter is the total timeout across all retries in * milliseconds. * - * If the cb is called with a retval of ETIMEDOUT it indicates that the alloted - * time has elapsed. However, in the case of a timeout, we continue to listen - * for the packet until krad_remote_cancel() is called or a response is + * If the cb is called with a retval of ETIMEDOUT it indicates that the + * allotted time has elapsed. However, in the case of a timeout, we continue to + * listen for the packet until krad_remote_cancel() is called or a response is * received. This means that cb will always be called twice in the event of a * timeout. This permits you to pursue other remotes while still listening for * a response from the first one. diff --git a/src/lib/krad/remote.c b/src/lib/krad/remote.c index 437f7e9..c96a9b4 100644 --- a/src/lib/krad/remote.c +++ b/src/lib/krad/remote.c @@ -152,7 +152,7 @@ remote_disconnect(krad_remote *rr) } /* Add the specified flags to the remote. This automatically manages the - * lifecyle of the underlying event. Also connects if disconnected. */ + * lifecycle of the underlying event. Also connects if disconnected. */ static krb5_error_code remote_add_flags(krad_remote *remote, verto_ev_flag flags) { @@ -198,7 +198,7 @@ remote_add_flags(krad_remote *remote, verto_ev_flag flags) } /* Remove the specified flags to the remote. This automatically manages the - * lifecyle of the underlying event. */ + * lifecycle of the underlying event. */ static void remote_del_flags(krad_remote *remote, verto_ev_flag flags) { @@ -234,7 +234,7 @@ remote_shutdown(krad_remote *rr) } } -/* Handle when packets receive no response within their alloted time. */ +/* Handle when packets receive no response within their allotted time. */ static void on_timeout(verto_ctx *ctx, verto_ev *ev) { diff --git a/src/lib/krb5/asn.1/krbasn1.h b/src/lib/krb5/asn.1/krbasn1.h index cfc24ad..c580335 100644 --- a/src/lib/krb5/asn.1/krbasn1.h +++ b/src/lib/krb5/asn.1/krbasn1.h @@ -22,7 +22,7 @@ * If KRB5_GENEROUS_LR_TYPE is defined, then we are generous about * accepting a one byte negative lr_type - which is not sign * extended. Prior to July 2000, we were sending a negative lr_type as - * a positve single byte value - instead of a signed integer. This + * a positive single byte value - instead of a signed integer. This * allows us to receive the old value and deal */ #define KRB5_GENEROUS_LR_TYPE diff --git a/src/lib/krb5/ccache/cc_memory.c b/src/lib/krb5/ccache/cc_memory.c index 9d13de9..610091a 100644 --- a/src/lib/krb5/ccache/cc_memory.c +++ b/src/lib/krb5/ccache/cc_memory.c @@ -361,7 +361,7 @@ krb5_mcc_start_seq_get(krb5_context context, krb5_ccache id, * cursor is a krb5_cc_cursor originally obtained from * krb5_mcc_start_seq_get. * - * Modifes: + * Modifies: * cursor, creds * * Effects: diff --git a/src/lib/krb5/ccache/cc_mslsa.c b/src/lib/krb5/ccache/cc_mslsa.c index 7afdfc3..4931e6c 100644 --- a/src/lib/krb5/ccache/cc_mslsa.c +++ b/src/lib/krb5/ccache/cc_mslsa.c @@ -1512,7 +1512,7 @@ typedef struct _krb5_lcc_cursor { * id * * Effects: - * Acccess the MS Kerberos LSA cache in the current logon session + * Access the MS Kerberos LSA cache in the current logon session * Ignore the residual. * * Returns: @@ -1737,7 +1737,7 @@ krb5_lcc_start_seq_get(krb5_context context, krb5_ccache id, krb5_cc_cursor *cur * cursor is a krb5_cc_cursor originally obtained from * krb5_lcc_start_seq_get. * - * Modifes: + * Modifies: * cursor * * Effects: diff --git a/src/lib/krb5/ccache/ccapi/stdcc.c b/src/lib/krb5/ccache/ccapi/stdcc.c index 8664f70..0dc5259 100644 --- a/src/lib/krb5/ccache/ccapi/stdcc.c +++ b/src/lib/krb5/ccache/ccapi/stdcc.c @@ -625,7 +625,7 @@ krb5_stdccv3_retrieve (krb5_context context, /* * end seq * - * just free up the storage assoicated with the cursor (if we can) + * just free up the storage associated with the cursor (if we can) */ krb5_error_code KRB5_CALLCONV krb5_stdccv3_end_seq_get (krb5_context context, @@ -1393,7 +1393,7 @@ krb5_error_code KRB5_CALLCONV krb5_stdcc_next_cred /* - * retreive + * retrieve * * - try to find a matching credential in the cache */ @@ -1412,7 +1412,7 @@ krb5_stdcc_retrieve(context, id, whichfields, mcreds, creds) /* * end seq * - * just free up the storage assoicated with the cursor (if we could) + * just free up the storage associated with the cursor (if we could) */ krb5_error_code KRB5_CALLCONV krb5_stdcc_end_seq_get (krb5_context context, krb5_ccache id, krb5_cc_cursor *cursor) @@ -1515,7 +1515,7 @@ krb5_stdcc_destroy (krb5_context context, krb5_ccache id) free(id); /* If the cache does not exist when we tried to destroy it, - that's fine. That means someone else destryoed it since + that's fine. That means someone else destroyed it since we resolved it. */ if (retval == KRB5_FCC_NOFILE) return 0; diff --git a/src/lib/krb5/ccache/ccapi/stdcc.h b/src/lib/krb5/ccache/ccapi/stdcc.h index d3b6009..acb8a26 100644 --- a/src/lib/krb5/ccache/ccapi/stdcc.h +++ b/src/lib/krb5/ccache/ccapi/stdcc.h @@ -35,7 +35,7 @@ typedef struct _stdccCacheData { } stdccCacheData, *stdccCacheDataPtr; -/* function protoypes */ +/* function prototypes */ void krb5_stdcc_shutdown(void); diff --git a/src/lib/krb5/ccache/ccapi/stdcc_util.c b/src/lib/krb5/ccache/ccapi/stdcc_util.c index 1f2a386..c3627fe 100644 --- a/src/lib/krb5/ccache/ccapi/stdcc_util.c +++ b/src/lib/krb5/ccache/ccapi/stdcc_util.c @@ -367,7 +367,7 @@ copy_cc_cred_union_to_krb5_creds (krb5_context in_context, /* * copy_krb5_creds_to_cc_credentials - * - analagous to above but in the reverse direction + * - analogous to above but in the reverse direction */ krb5_error_code copy_krb5_creds_to_cc_cred_union (krb5_context in_context, @@ -618,7 +618,7 @@ int copyCCDataArrayToK5(cc_creds *ccCreds, krb5_creds *v5Creds, char whichArray) /* * copyK5DataArrayToCC - * - analagous to above, but in the other direction + * - analogous to above, but in the other direction */ int copyK5DataArrayToCC(krb5_creds *v5Creds, cc_creds *ccCreds, char whichArray) { @@ -759,7 +759,7 @@ void dupCCtoK5(krb5_context context, cc_creds *src, krb5_creds *dest) /* * dupK5toCC - * - analagous to above but in the reverse direction + * - analogous to above but in the reverse direction */ void dupK5toCC(krb5_context context, krb5_creds *creds, cred_union **cu) { @@ -839,7 +839,7 @@ void dupK5toCC(krb5_context context, krb5_creds *creds, cred_union **cu) (in dupK5toCC() above) with its own memory allocation routines - which may be different than how the CCache allocates memory - the Kerb5 library must have its own version of cc_free_creds() to deallocate it. These - functions do that. The top-level function to substitue for cc_free_creds() + functions do that. The top-level function to substitute for cc_free_creds() is krb5_free_cc_cred_union(). If the CCache library wants to use a cred_union structure created by diff --git a/src/lib/krb5/ccache/ccapi/stdcc_util.h b/src/lib/krb5/ccache/ccapi/stdcc_util.h index 2e5eecc..6836d54 100644 --- a/src/lib/krb5/ccache/ccapi/stdcc_util.h +++ b/src/lib/krb5/ccache/ccapi/stdcc_util.h @@ -20,7 +20,7 @@ #include "krb5.h" -/* protoypes for private functions declared in stdcc_util.c */ +/* prototypes for private functions declared in stdcc_util.c */ #ifdef USE_CCAPI_V3 krb5_error_code copy_cc_cred_union_to_krb5_creds (krb5_context in_context, diff --git a/src/lib/krb5/ccache/t_cc.c b/src/lib/krb5/ccache/t_cc.c index 06a1062..a7251e2 100644 --- a/src/lib/krb5/ccache/t_cc.c +++ b/src/lib/krb5/ccache/t_cc.c @@ -603,7 +603,7 @@ main(void) if (check_registered(context, "KEYRING:process:")) do_test(context, "KEYRING:process:"); else - printf("Skiping KEYRING: test - unregistered type\n"); + printf("Skipping KEYRING: test - unregistered type\n"); do_test(context, "MEMORY:"); do_test(context, "FILE:"); diff --git a/src/lib/krb5/ccache/t_cccol.c b/src/lib/krb5/ccache/t_cccol.c index 444806e..741f955 100644 --- a/src/lib/krb5/ccache/t_cccol.c +++ b/src/lib/krb5/ccache/t_cccol.c @@ -235,7 +235,7 @@ main(int argc, char **argv) * resolve to the generated caches and appear in the collection. (They * might appear before being initialized; that's not currently considered * important). The primary cache for the collection should remain as the - * unitialized cache from the previous step. + * uninitialized cache from the previous step. */ typename = krb5_cc_get_type(ctx, ccinitial); check(krb5_cc_new_unique(ctx, typename, NULL, &ccu1)); diff --git a/src/lib/krb5/ccache/t_cccursor.c b/src/lib/krb5/ccache/t_cccursor.c index 4323b77..96ca3ae 100644 --- a/src/lib/krb5/ccache/t_cccursor.c +++ b/src/lib/krb5/ccache/t_cccursor.c @@ -27,7 +27,7 @@ /* * Displays a list of caches returned by the cccol cursor. The first argument, * if given, is set to the default cache name for the context before iterating. - * Any remaining argments are resolved as caches and kept open during the + * Any remaining arguments are resolved as caches and kept open during the * iteration. If the argument "CONTENT" is given as one of the cache names, * immediately exit with status 0 if the collection contains credentials and 1 * if it does not. diff --git a/src/lib/krb5/ccache/t_marshal.c b/src/lib/krb5/ccache/t_marshal.c index 144554c..bd0284a 100644 --- a/src/lib/krb5/ccache/t_marshal.c +++ b/src/lib/krb5/ccache/t_marshal.c @@ -162,7 +162,7 @@ const struct test { /* Version 4 header */ 16, "\x05\x04\x00\x0C\x00\x01\x00\x08\x00\x00\x01\x2C\x00\x00\xD4\x31", - /* Verion 4 principal */ + /* Version 4 principal */ 37, "\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00\x0B\x4B\x52\x42\x54" "\x45\x53\x54\x2E\x43\x4F\x4D\x00\x00\x00\x0A\x74\x65\x73\x74\x63" diff --git a/src/lib/krb5/keytab/kt_file.c b/src/lib/krb5/keytab/kt_file.c index 021c943..80db117 100644 --- a/src/lib/krb5/keytab/kt_file.c +++ b/src/lib/krb5/keytab/kt_file.c @@ -703,7 +703,7 @@ const krb5_kt_ops krb5_kt_dfl_ops = { * There are no separators between fields of an entry. * A principal is a length-encoded array of length-encoded strings. The * length is a krb5_int16 in each case. The specific format, then, is - * multiple entries concatinated with no separators. An entry has this + * multiple entries concatenated with no separators. An entry has this * exact format: * * sizeof(krb5_int16) bytes for number of components in the principal; @@ -1299,7 +1299,7 @@ krb5_ktfileint_size_entry(krb5_context context, krb5_keytab_entry *entry, krb5_i * Find and reserve a slot in the file for an entry of the needed size. * The commit point will be set to the position in the file where the * the length (sizeof(krb5_int32) bytes) of this node should be written - * when commiting the write. The file position left as a result of this + * when committing the write. The file position left as a result of this * call is the position where the actual data should be written. * * The size_needed argument may be adjusted if we find a hole that is diff --git a/src/lib/krb5/keytab/t_keytab.c b/src/lib/krb5/keytab/t_keytab.c index ea4ce68..aa5153c 100644 --- a/src/lib/krb5/keytab/t_keytab.c +++ b/src/lib/krb5/keytab/t_keytab.c @@ -219,7 +219,7 @@ kt_test(krb5_context context, const char *name) kret = krb5_kt_get_entry(context, kt, princ, 0, 0, &kent); - CHECK_ERR(kret, KRB5_KT_NOTFOUND, "Getting non-existant entry"); + CHECK_ERR(kret, KRB5_KT_NOTFOUND, "Getting nonexistent entry"); krb5_free_principal(context, princ); diff --git a/src/lib/krb5/krb/authdata.h b/src/lib/krb5/krb/authdata.h index 74d663c..10cc2c3 100644 --- a/src/lib/krb5/krb/authdata.h +++ b/src/lib/krb5/krb/authdata.h @@ -43,7 +43,7 @@ krb5int_authdata_verify(krb5_context context, /* PAC */ /* - * A PAC consists of a sequence of PAC_INFO_BUFFERs, preceeded by + * A PAC consists of a sequence of PAC_INFO_BUFFERs, preceded by * a PACTYPE header. Decoding the contents of the buffers is left * to the application (notwithstanding signature verification). */ diff --git a/src/lib/krb5/krb/conv_princ.c b/src/lib/krb5/krb/conv_princ.c index 9dc3798..9601bb4 100644 --- a/src/lib/krb5/krb/conv_princ.c +++ b/src/lib/krb5/krb/conv_princ.c @@ -31,7 +31,7 @@ * NOTE: This is highly site specific, and is only really necessary * for sites who need to convert from V4 to V5. It is used by both * the KDC and the kdb5_convert program. Since its use is highly - * specialized, the necesary information is just going to be + * specialized, the necessary information is just going to be * hard-coded in this file. */ diff --git a/src/lib/krb5/krb/encode_kdc.c b/src/lib/krb5/krb/encode_kdc.c index 5e652d9..e4907da 100644 --- a/src/lib/krb5/krb/encode_kdc.c +++ b/src/lib/krb5/krb/encode_kdc.c @@ -79,7 +79,7 @@ krb5_encode_kdc_rep(krb5_context context, krb5_msgtype type, * also note that the reason why we are passing it in a structure * instead of as an argument to encode_krb5_enc_kdc_rep_part (the * way we should) is for compatibility with the ISODE version of - * this fuction. Ah, compatibility.... + * this function. Ah, compatibility.... */ tmp_encpart = *encpart; tmp_encpart.msg_type = type; diff --git a/src/lib/krb5/krb/get_in_tkt.c b/src/lib/krb5/krb/get_in_tkt.c index cc0f70e..a1c4a53 100644 --- a/src/lib/krb5/krb/get_in_tkt.c +++ b/src/lib/krb5/krb/get_in_tkt.c @@ -439,7 +439,7 @@ sort_krb5_padata_sequence(krb5_context context, krb5_data *realm, /* see if we can extract a number */ l = strtol(p, &q, 10); if ((q != NULL) && (q > p)) { - /* got a valid number; search for a matchin entry */ + /* got a valid number; search for a matching entry */ for (i = base; padata[i] != NULL; i++) { /* bubble the matching entry to the front of the list */ if (padata[i]->pa_type == l) { diff --git a/src/lib/krb5/krb/gic_pwd.c b/src/lib/krb5/krb/gic_pwd.c index 54e0a8e..cdfdb48 100644 --- a/src/lib/krb5/krb/gic_pwd.c +++ b/src/lib/krb5/krb/gic_pwd.c @@ -417,7 +417,7 @@ cleanup: If password is passed as NULL, the password is read from the terminal, and then converted into a key. - A succesful call will place the ticket in the credentials cache ccache. + A successful call will place the ticket in the credentials cache ccache. returns system errors, encryption errors */ diff --git a/src/lib/krb5/krb/in_tkt_sky.c b/src/lib/krb5/krb/in_tkt_sky.c index 342fe18..4787fa0 100644 --- a/src/lib/krb5/krb/in_tkt_sky.c +++ b/src/lib/krb5/krb/in_tkt_sky.c @@ -60,7 +60,7 @@ get_as_key_skey(krb5_context context, krb5_principal client, the system key store (e.g. /etc/krb5.keytab). If keyblock is non-NULL, it is used as the decryption key. - A succesful call will place the ticket in the credentials cache ccache. + A successful call will place the ticket in the credentials cache ccache. returns system errors, encryption errors diff --git a/src/lib/krb5/krb/rd_cred.c b/src/lib/krb5/krb/rd_cred.c index 720147c..d89a98a 100644 --- a/src/lib/krb5/krb/rd_cred.c +++ b/src/lib/krb5/krb/rd_cred.c @@ -90,7 +90,7 @@ make_cred_list(krb5_context context, krb5_cred *krbcred, if (list == NULL) goto cleanup; - /* For each credential, create a strcture in the list of credentials and + /* For each credential, create a structure in the list of credentials and * copy the information. */ for (i = 0; i < count; i++) { list[i] = k5alloc(sizeof(*list[i]), &ret); diff --git a/src/lib/krb5/krb/rd_safe.c b/src/lib/krb5/krb/rd_safe.c index 7b7a30c..6e5c97aa 100644 --- a/src/lib/krb5/krb/rd_safe.c +++ b/src/lib/krb5/krb/rd_safe.c @@ -92,7 +92,7 @@ read_krbsafe(krb5_context context, krb5_auth_context ac, if (ret) goto cleanup; - /* Verify the checkum over the re-encoded message. */ + /* Verify the checksum over the re-encoded message. */ ret = krb5_k_verify_checksum(context, key, KRB5_KEYUSAGE_KRB_SAFE_CKSUM, der_zerosafe, safe_cksum, &valid); if (!valid) { diff --git a/src/lib/krb5/krb/recvauth.c b/src/lib/krb5/krb/recvauth.c index 570fede..f784fa3 100644 --- a/src/lib/krb5/krb/recvauth.c +++ b/src/lib/krb5/krb/recvauth.c @@ -144,7 +144,7 @@ recvauth_common(krb5_context context, /* * If there was a problem, send back a krb5_error message, - * preceeded by the length of the krb5_error message. If + * preceded by the length of the krb5_error message. If * everything's ok, send back 0 for the length. */ if (problem) { diff --git a/src/lib/krb5/krb/walk_rtree.c b/src/lib/krb5/krb/walk_rtree.c index 4074fe8..bb5ca08 100644 --- a/src/lib/krb5/krb/walk_rtree.c +++ b/src/lib/krb5/krb/walk_rtree.c @@ -174,7 +174,7 @@ cleanup: /* ANL - Modified to allow Configurable Authentication Paths. * This modification removes the restriction on the choice of realm * names, i.e. they nolonger have to be hierarchical. This - * is allowed by RFC 1510: "If a hierarchical orginization is not used + * is allowed by RFC 1510: "If a hierarchical organization is not used * it may be necessary to consult some database in order to construct * an authentication path between realms." The database is contained * in the [capaths] section of the krb5.conf file. @@ -184,8 +184,8 @@ cleanup: * entries if the same krb5.conf is used for clients and servers) * * for example: ESnet will be running a KDC which will share - * inter-realm keys with its many orginizations which include among - * other ANL, NERSC and PNL. Each of these orginizations wants to + * inter-realm keys with its many organizations which include among + * other ANL, NERSC and PNL. Each of these organizations wants to * use its DNS name in the realm, ANL.GOV. In addition ANL wants * to authenticatite to HAL.COM via a K5.MOON and K5.JUPITER * A [capaths] section of the krb5.conf file for the ANL.GOV clients @@ -221,9 +221,9 @@ cleanup: * * This version of the Configurable Authentication Path modification * differs from the previous versions prior to K5 beta 5 in that - * the profile routines are used, and the explicite path from - * client's realm to server's realm must be given. The modifications - * will work together. + * the profile routines are used, and the explicit path from client's + * realm to server's realm must be given. The modifications will work + * together. * DEE - 5/23/95 */ diff --git a/src/lib/krb5/os/init_os_ctx.c b/src/lib/krb5/os/init_os_ctx.c index 3aa86f4..2be266f 100644 --- a/src/lib/krb5/os/init_os_ctx.c +++ b/src/lib/krb5/os/init_os_ctx.c @@ -369,7 +369,7 @@ add_kdc_config_file(profile_filespec_t **pfiles) /* Set the profile paths in the context. If secure is set to TRUE then do not include user paths (from environment variables, etc). - If kdc is TRUE, include kdc.conf from whereever we expect to find + If kdc is TRUE, include kdc.conf from wherever we expect to find it. */ static krb5_error_code os_init_paths(krb5_context ctx, krb5_boolean kdc) diff --git a/src/lib/rpc/auth_gssapi.c b/src/lib/rpc/auth_gssapi.c index 568ec6d..8ab7ab5 100644 --- a/src/lib/rpc/auth_gssapi.c +++ b/src/lib/rpc/auth_gssapi.c @@ -383,7 +383,7 @@ next_token: } else { PRINTF(("gssapi_create: processing signed isn\n")); - /* don't check conf (integ only) or qop (accpet default) */ + /* don't check conf (integ only) or qop (accept default) */ *gssstat = gss_unseal(minor_stat, AUTH_PRIVATE(auth)->context, &call_res.signed_isn, diff --git a/src/lib/rpc/clnt_raw.c b/src/lib/rpc/clnt_raw.c index 515086b..dcbb5cf 100644 --- a/src/lib/rpc/clnt_raw.c +++ b/src/lib/rpc/clnt_raw.c @@ -41,7 +41,7 @@ static char sccsid[] = "@(#)clnt_raw.c 1.22 87/08/11 Copyr 1984 Sun Micro"; * Memory based rpc for simple testing and timing. * Interface to create an rpc client and server in the same process. * This lets us similate rpc and get round trip overhead, without - * any interference from the kernal. + * any interference from the kernel. */ #include <gssrpc/rpc.h> diff --git a/src/lib/rpc/clnt_udp.c b/src/lib/rpc/clnt_udp.c index 49b09e0..2503a38 100644 --- a/src/lib/rpc/clnt_udp.c +++ b/src/lib/rpc/clnt_udp.c @@ -109,7 +109,7 @@ struct cu_data { * Caller may wish to set this something more useful. * * wait is the amount of time used between retransmitting a call if - * no response has been heard; retransmition occurs until the actual + * no response has been heard; retransmission occurs until the actual * rpc call times out. * * sendsz and recvsz are the maximum allowable packet sizes that can be diff --git a/src/lib/rpc/svc.c b/src/lib/rpc/svc.c index c171ecc..cfbc7aa 100644 --- a/src/lib/rpc/svc.c +++ b/src/lib/rpc/svc.c @@ -74,7 +74,7 @@ static SVCXPRT *xports[NOFILE]; * The services list * Each entry represents a set of procedures (an rpc program). * The dispatch routine takes request structs and runs the - * apropriate procedure. + * appropriate procedure. */ static struct svc_callout { struct svc_callout *sc_next; diff --git a/src/lib/rpc/svc_auth_gssapi.c b/src/lib/rpc/svc_auth_gssapi.c index 4831b00..b7ffee4 100644 --- a/src/lib/rpc/svc_auth_gssapi.c +++ b/src/lib/rpc/svc_auth_gssapi.c @@ -373,7 +373,7 @@ enum auth_stat gssrpc__svcauth_gssapi( /* * If the client's server_creds is already set, use it. * Otherwise, try each credential in server_creds_list until - * one of them succeedes, then set the client server_creds + * one of them succeeds, then set the client server_creds * to that. If all fail, the client's server_creds isn't * set (which is fine, because the client will be gc'ed * anyway). diff --git a/src/lib/rpc/svc_raw.c b/src/lib/rpc/svc_raw.c index dba6c29..dd453cf 100644 --- a/src/lib/rpc/svc_raw.c +++ b/src/lib/rpc/svc_raw.c @@ -39,7 +39,7 @@ static char sccsid[] = "@(#)svc_raw.c 1.15 87/08/11 Copyr 1984 Sun Micro"; * svc_raw.c, This a toy for simple testing and timing. * Interface to create an rpc client and server in the same UNIX process. * This lets us similate rpc and get rpc (round trip) overhead, without - * any interference from the kernal. + * any interference from the kernel. */ #include <gssrpc/rpc.h> diff --git a/src/lib/rpc/svc_tcp.c b/src/lib/rpc/svc_tcp.c index 54ce70e..56fe7b6 100644 --- a/src/lib/rpc/svc_tcp.c +++ b/src/lib/rpc/svc_tcp.c @@ -39,7 +39,7 @@ static char sccsid[] = "@(#)svc_tcp.c 1.21 87/08/11 Copyr 1984 Sun Micro"; * svc_tcp.c, Server side for TCP/IP based RPC. * * Actually implements two flavors of transporter - - * a tcp rendezvouser (a listner and connection establisher) + * a tcp rendezvouser (a listener and connection establisher) * and a record/tcp stream. */ @@ -262,7 +262,7 @@ makefd_xprt( xprt->xp_verf.oa_base = cd->verf_body; xprt->xp_addrlen = 0; xprt->xp_laddrlen = 0; - xprt->xp_ops = &svctcp_op; /* truely deals with calls */ + xprt->xp_ops = &svctcp_op; /* truly deals with calls */ xprt->xp_port = 0; /* this is a connection, not a rendezvouser */ xprt->xp_sock = fd; xprt_register(xprt); @@ -344,7 +344,7 @@ svctcp_destroy(SVCXPRT *xprt) static struct timeval wait_per_try = { 35, 0 }; /* - * reads data from the tcp conection. + * reads data from the tcp connection. * any error is fatal and the connection is closed. * (And a read of zero bytes is a half closed stream => error.) */ diff --git a/src/lib/rpc/xdr.c b/src/lib/rpc/xdr.c index 8c14ddc..24c3de4 100644 --- a/src/lib/rpc/xdr.c +++ b/src/lib/rpc/xdr.c @@ -544,7 +544,7 @@ xdr_u_int32(XDR *xdrs, uint32_t *up) } /* - * XDR a descriminated union + * XDR a discriminated union * Support routine for discriminated unions. * You create an array of xdrdiscrim structures, terminated with * an entry with a null procedure pointer. The routine gets diff --git a/src/lib/rpc/xdr_rec.c b/src/lib/rpc/xdr_rec.c index 28894f3..1f6a776 100644 --- a/src/lib/rpc/xdr_rec.c +++ b/src/lib/rpc/xdr_rec.c @@ -418,7 +418,7 @@ xdrrec_skiprecord(XDR *xdrs) } /* - * Look ahead fuction. + * Look ahead function. * Returns TRUE iff there is no more input in the buffer * after consuming the rest of the current record. */ @@ -442,8 +442,8 @@ xdrrec_eof(XDR *xdrs) /* * The client must tell the package when an end-of-record has occurred. * The second paraemters tells whether the record should be flushed to the - * (output) tcp stream. (This let's the package support batched or - * pipelined procedure calls.) TRUE => immmediate flush to tcp connection. + * (output) tcp stream. (This lets the package support batched or + * pipelined procedure calls.) TRUE => immediate flush to tcp connection. */ bool_t xdrrec_endofrecord(XDR *xdrs, bool_t sendnow) diff --git a/src/lib/rpc/xdr_reference.c b/src/lib/rpc/xdr_reference.c index eab7d2d..eff279d 100644 --- a/src/lib/rpc/xdr_reference.c +++ b/src/lib/rpc/xdr_reference.c @@ -55,7 +55,7 @@ static char sccsid[] = "@(#)xdr_reference.c 1.11 87/08/11 SMI"; * referenced by a pointer inside the structure that is currently being * translated. pp references a pointer to storage. If *pp is null * the necessary storage is allocated. - * size is the sizeof the referneced structure. + * size is the sizeof the referenced structure. * proc is the routine to handle the referenced structure. */ bool_t |