aboutsummaryrefslogtreecommitdiff
path: root/src/lib
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib')
-rw-r--r--src/lib/apputils/net-server.c2
-rw-r--r--src/lib/apputils/udppktinfo.c6
-rw-r--r--src/lib/crypto/builtin/des/doc/libdes.doc2
-rw-r--r--src/lib/crypto/builtin/des/t_verify.c2
-rw-r--r--src/lib/crypto/builtin/sha1/shs.c2
-rw-r--r--src/lib/crypto/builtin/sha1/t_shs3.c2
-rw-r--r--src/lib/crypto/openssl/enc_provider/rc4.c2
-rw-r--r--src/lib/gssapi/krb5/accept_sec_context.c3
-rw-r--r--src/lib/gssapi/krb5/gssapi_krb5.h2
-rw-r--r--src/lib/gssapi/krb5/util_crypt.c2
-rw-r--r--src/lib/gssapi/mechglue/g_acquire_cred_imp_name.c2
-rw-r--r--src/lib/gssapi/mechglue/g_acquire_cred_with_pw.c2
-rw-r--r--src/lib/gssapi/mechglue/g_dup_name.c2
-rw-r--r--src/lib/gssapi/mechglue/g_imp_name.c2
-rw-r--r--src/lib/gssapi/mechglue/g_oid_ops.c2
-rw-r--r--src/lib/gssapi/mechglue/mglueP.h6
-rw-r--r--src/lib/gssapi/spnego/spnego_mech.c2
-rw-r--r--src/lib/kadm5/clnt/client_init.c2
-rw-r--r--src/lib/kadm5/kadm_err.et2
-rw-r--r--src/lib/kadm5/kadm_rpc_xdr.c2
-rw-r--r--src/lib/kadm5/srv/pwqual_dict.c2
-rw-r--r--src/lib/kadm5/srv/svr_principal.c2
-rw-r--r--src/lib/kadm5/unit-test/api.current/chpass-principal.exp2
-rw-r--r--src/lib/kadm5/unit-test/api.current/crte-principal.exp24
-rw-r--r--src/lib/kadm5/unit-test/api.current/dlte-policy.exp2
-rw-r--r--src/lib/kadm5/unit-test/api.current/mod-principal.exp6
-rw-r--r--src/lib/kadm5/unit-test/config/unix.exp40
-rw-r--r--src/lib/krad/internal.h6
-rw-r--r--src/lib/krad/remote.c6
-rw-r--r--src/lib/krb5/asn.1/krbasn1.h2
-rw-r--r--src/lib/krb5/ccache/cc_memory.c2
-rw-r--r--src/lib/krb5/ccache/cc_mslsa.c4
-rw-r--r--src/lib/krb5/ccache/ccapi/stdcc.c8
-rw-r--r--src/lib/krb5/ccache/ccapi/stdcc.h2
-rw-r--r--src/lib/krb5/ccache/ccapi/stdcc_util.c8
-rw-r--r--src/lib/krb5/ccache/ccapi/stdcc_util.h2
-rw-r--r--src/lib/krb5/ccache/t_cc.c2
-rw-r--r--src/lib/krb5/ccache/t_cccol.c2
-rw-r--r--src/lib/krb5/ccache/t_cccursor.c2
-rw-r--r--src/lib/krb5/ccache/t_marshal.c2
-rw-r--r--src/lib/krb5/keytab/kt_file.c4
-rw-r--r--src/lib/krb5/keytab/t_keytab.c2
-rw-r--r--src/lib/krb5/krb/authdata.h2
-rw-r--r--src/lib/krb5/krb/conv_princ.c2
-rw-r--r--src/lib/krb5/krb/encode_kdc.c2
-rw-r--r--src/lib/krb5/krb/get_in_tkt.c2
-rw-r--r--src/lib/krb5/krb/gic_pwd.c2
-rw-r--r--src/lib/krb5/krb/in_tkt_sky.c2
-rw-r--r--src/lib/krb5/krb/rd_cred.c2
-rw-r--r--src/lib/krb5/krb/rd_safe.c2
-rw-r--r--src/lib/krb5/krb/recvauth.c2
-rw-r--r--src/lib/krb5/krb/walk_rtree.c12
-rw-r--r--src/lib/krb5/os/init_os_ctx.c2
-rw-r--r--src/lib/rpc/auth_gssapi.c2
-rw-r--r--src/lib/rpc/clnt_raw.c2
-rw-r--r--src/lib/rpc/clnt_udp.c2
-rw-r--r--src/lib/rpc/svc.c2
-rw-r--r--src/lib/rpc/svc_auth_gssapi.c2
-rw-r--r--src/lib/rpc/svc_raw.c2
-rw-r--r--src/lib/rpc/svc_tcp.c6
-rw-r--r--src/lib/rpc/xdr.c2
-rw-r--r--src/lib/rpc/xdr_rec.c6
-rw-r--r--src/lib/rpc/xdr_reference.c2
63 files changed, 121 insertions, 120 deletions
diff --git a/src/lib/apputils/net-server.c b/src/lib/apputils/net-server.c
index 6b18dfe..294dcfc 100644
--- a/src/lib/apputils/net-server.c
+++ b/src/lib/apputils/net-server.c
@@ -362,7 +362,7 @@ loop_add_address(const char *address, int port, enum bind_type type,
*
* - addresses
* A string for the addresses. Pass NULL to use the wildcard address.
- * Supported delimeters can be found in ADDRESSES_DELIM. Addresses are
+ * Supported delimiters can be found in ADDRESSES_DELIM. Addresses are
* parsed with k5_parse_host_name().
* - default_port
* What port the socket should be set to if not specified in addresses.
diff --git a/src/lib/apputils/udppktinfo.c b/src/lib/apputils/udppktinfo.c
index 9a06ae8..c6e86f6 100644
--- a/src/lib/apputils/udppktinfo.c
+++ b/src/lib/apputils/udppktinfo.c
@@ -298,8 +298,8 @@ recv_from_to(int sock, void *buf, size_t len, int flags,
if (!to || !tolen || !r)
return recvfrom(sock, buf, len, flags, from, fromlen);
- /* Clobber with something recognizeable in case we can't extract the
- * address but try to use it anyways. */
+ /* Clobber with something recognizable in case we can't extract the address
+ * but try to use it anyways. */
memset(to, 0x40, *tolen);
iov.iov_base = buf;
@@ -505,7 +505,7 @@ recv_from_to(int sock, void *buf, size_t len, int flags,
aux_addressing_info *auxaddr)
{
if (to && tolen) {
- /* Clobber with something recognizeable in case we try to use the
+ /* Clobber with something recognizable in case we try to use the
* address. */
memset(to, 0x40, *tolen);
*tolen = 0;
diff --git a/src/lib/crypto/builtin/des/doc/libdes.doc b/src/lib/crypto/builtin/des/doc/libdes.doc
index 19c03c1..6e9431e 100644
--- a/src/lib/crypto/builtin/des/doc/libdes.doc
+++ b/src/lib/crypto/builtin/des/doc/libdes.doc
@@ -149,7 +149,7 @@ int
by "*key", then after getting a new key, call the des_set_key()
routine when needed.
- No meaningfull value is returned. Void is not used for compatibility
+ No meaningful value is returned. Void is not used for compatibility
with other compilers.
diff --git a/src/lib/crypto/builtin/des/t_verify.c b/src/lib/crypto/builtin/des/t_verify.c
index f4332f5..4a19933 100644
--- a/src/lib/crypto/builtin/des/t_verify.c
+++ b/src/lib/crypto/builtin/des/t_verify.c
@@ -325,7 +325,7 @@ main(argc,argv)
printf("%02x ",cipher_text[j]);
printf("\n\n");
if ( memcmp((char *)cipher_text, (char *)checksum, 8) ) {
- printf("verify: error in CBC cheksum\n");
+ printf("verify: error in CBC checksum\n");
exit(-1);
}
else
diff --git a/src/lib/crypto/builtin/sha1/shs.c b/src/lib/crypto/builtin/sha1/shs.c
index f28a4fc..f66a753 100644
--- a/src/lib/crypto/builtin/sha1/shs.c
+++ b/src/lib/crypto/builtin/sha1/shs.c
@@ -139,7 +139,7 @@ void SHSTransform(SHS_LONG *digest, const SHS_LONG *data)
#else
- /* Heavy mangling, in 4 sub-rounds of 20 interations each. */
+ /* Heavy mangling, in 4 sub-rounds of 20 iterations each. */
subRound( A, B, C, D, E, f1, K1, eData[ 0 ] );
subRound( E, A, B, C, D, f1, K1, eData[ 1 ] );
subRound( D, E, A, B, C, f1, K1, eData[ 2 ] );
diff --git a/src/lib/crypto/builtin/sha1/t_shs3.c b/src/lib/crypto/builtin/sha1/t_shs3.c
index f7932ef..7aa0bbd 100644
--- a/src/lib/crypto/builtin/sha1/t_shs3.c
+++ b/src/lib/crypto/builtin/sha1/t_shs3.c
@@ -17,7 +17,7 @@ static void test7(void);
/* When run on a little-endian CPU we need to perform byte reversal on an
array of longwords. It is possible to make the code endianness-
- independant by fiddling around with data at the byte level, but this
+ independent by fiddling around with data at the byte level, but this
makes for very slow code, so we rely on the user to sort out endianness
at compile time */
diff --git a/src/lib/crypto/openssl/enc_provider/rc4.c b/src/lib/crypto/openssl/enc_provider/rc4.c
index a65d57b..bc87c6f 100644
--- a/src/lib/crypto/openssl/enc_provider/rc4.c
+++ b/src/lib/crypto/openssl/enc_provider/rc4.c
@@ -52,7 +52,7 @@ struct arcfour_state {
/* Interface layer to krb5 crypto layer */
/* The workhorse of the arcfour system,
- * this impliments the cipher
+ * this implements the cipher
*/
/* In-place IOV crypto */
diff --git a/src/lib/gssapi/krb5/accept_sec_context.c b/src/lib/gssapi/krb5/accept_sec_context.c
index c821cc8..3f63ab6 100644
--- a/src/lib/gssapi/krb5/accept_sec_context.c
+++ b/src/lib/gssapi/krb5/accept_sec_context.c
@@ -750,7 +750,8 @@ kg_accept_krb5(minor_status, context_handle,
goto fail;
}
- /* Always read the clients bindings - eventhough we might ignore them */
+ /* Always read the client's bindings, even though we might ignore
+ * them. */
TREAD_STR(ptr, ptr2, reqcksum.length);
if (input_chan_bindings != GSS_C_NO_CHANNEL_BINDINGS ) {
diff --git a/src/lib/gssapi/krb5/gssapi_krb5.h b/src/lib/gssapi/krb5/gssapi_krb5.h
index 84b4159..e266b59 100644
--- a/src/lib/gssapi/krb5/gssapi_krb5.h
+++ b/src/lib/gssapi/krb5/gssapi_krb5.h
@@ -124,7 +124,7 @@ typedef struct gss_krb5_lucid_key {
} gss_krb5_lucid_key_t;
typedef struct gss_krb5_rfc1964_keydata {
- OM_uint32 sign_alg; /* signing algorthm */
+ OM_uint32 sign_alg; /* signing algorithm */
OM_uint32 seal_alg; /* seal/encrypt algorithm */
gss_krb5_lucid_key_t ctx_key;
/* Context key
diff --git a/src/lib/gssapi/krb5/util_crypt.c b/src/lib/gssapi/krb5/util_crypt.c
index 80954af..c9aaafd 100644
--- a/src/lib/gssapi/krb5/util_crypt.c
+++ b/src/lib/gssapi/krb5/util_crypt.c
@@ -677,7 +677,7 @@ kg_fixup_padding_iov(OM_uint32 *minor_status, gss_iov_buffer_desc *iov,
* the padding length.
*
* If the caller manages the padding length, then relative_padlength
- * wil be zero.
+ * will be zero.
*
* eg. if the buffers are structured as follows:
*
diff --git a/src/lib/gssapi/mechglue/g_acquire_cred_imp_name.c b/src/lib/gssapi/mechglue/g_acquire_cred_imp_name.c
index 9eab25e..6ba170d 100644
--- a/src/lib/gssapi/mechglue/g_acquire_cred_imp_name.c
+++ b/src/lib/gssapi/mechglue/g_acquire_cred_imp_name.c
@@ -149,7 +149,7 @@ gss_acquire_cred_impersonate_name(OM_uint32 *minor_status,
/*
* if desired_mechs equals GSS_C_NULL_OID_SET, then pick an
* appropriate default. We use the first mechanism in the
- * mechansim list as the default. This set is created with
+ * mechanism list as the default. This set is created with
* statics thus needs not be freed
*/
if(desired_mechs == GSS_C_NULL_OID_SET) {
diff --git a/src/lib/gssapi/mechglue/g_acquire_cred_with_pw.c b/src/lib/gssapi/mechglue/g_acquire_cred_with_pw.c
index 7835d59..cc34acc 100644
--- a/src/lib/gssapi/mechglue/g_acquire_cred_with_pw.c
+++ b/src/lib/gssapi/mechglue/g_acquire_cred_with_pw.c
@@ -146,7 +146,7 @@ OM_uint32 * time_rec;
/*
* if desired_mechs equals GSS_C_NULL_OID_SET, then pick an
* appropriate default. We use the first mechanism in the
- * mechansim list as the default. This set is created with
+ * mechanism list as the default. This set is created with
* statics thus needs not be freed
*/
if(desired_mechs == GSS_C_NULL_OID_SET) {
diff --git a/src/lib/gssapi/mechglue/g_dup_name.c b/src/lib/gssapi/mechglue/g_dup_name.c
index cc824fd..ff01db2 100644
--- a/src/lib/gssapi/mechglue/g_dup_name.c
+++ b/src/lib/gssapi/mechglue/g_dup_name.c
@@ -81,7 +81,7 @@ gss_name_t *dest_name;
dest_union->name_type = 0;
dest_union->external_name = 0;
- /* Now copy the external representaion */
+ /* Now copy the external representation. */
if (gssint_create_copy_buffer(src_union->external_name,
&dest_union->external_name, 0))
goto allocation_failure;
diff --git a/src/lib/gssapi/mechglue/g_imp_name.c b/src/lib/gssapi/mechglue/g_imp_name.c
index 374965b..c3e809c 100644
--- a/src/lib/gssapi/mechglue/g_imp_name.c
+++ b/src/lib/gssapi/mechglue/g_imp_name.c
@@ -356,7 +356,7 @@ importExportName(minor, unionName, inputNameType)
* the unwrapped name. Presumably the exported name had,
* prior to being exported been obtained in such a way
* that it has been properly perpared ("canonicalized," in
- * GSS-API terms) accroding to some name type; we cannot
+ * GSS-API terms) according to some name type; we cannot
* tell what that name type was now, but the name should
* need no further preparation other than the lowest
* common denominator afforded by the mech to names
diff --git a/src/lib/gssapi/mechglue/g_oid_ops.c b/src/lib/gssapi/mechglue/g_oid_ops.c
index 1d75c63..1d7970c 100644
--- a/src/lib/gssapi/mechglue/g_oid_ops.c
+++ b/src/lib/gssapi/mechglue/g_oid_ops.c
@@ -27,7 +27,7 @@
#include "mglueP.h"
/*
- * gss_release_oid has been moved to g_initialize, becasue it requires access
+ * gss_release_oid has been moved to g_initialize, because it requires access
* to the mechanism list. All functions requiring direct access to the
* mechanism list are now in g_initialize.c
*/
diff --git a/src/lib/gssapi/mechglue/mglueP.h b/src/lib/gssapi/mechglue/mglueP.h
index f16333c..2b65939 100644
--- a/src/lib/gssapi/mechglue/mglueP.h
+++ b/src/lib/gssapi/mechglue/mglueP.h
@@ -87,7 +87,7 @@ OM_uint32 gssint_get_mech_type_oid(gss_OID OID, gss_buffer_t token);
* access mechanism specific versions of the gssapi routines through
* the routines in the glue module (gssd_mech_glue.c)
*
- * This contants all of the functions defined in gssapi.h except for
+ * This contains all of the functions defined in gssapi.h except for
* gss_release_buffer() and gss_release_oid_set(), which I am
* assuming, for now, to be equal across mechanisms.
*/
@@ -739,8 +739,8 @@ typedef struct gss_config {
* In the user space we use a wrapper structure to encompass the
* mechanism entry points. The wrapper contain the mechanism
* entry points and other data which is only relevant to the gss-api
- * layer. In the kernel we use only the gss_config strucutre because
- * the kernal does not cantain any of the extra gss-api specific data.
+ * layer. In the kernel we use only the gss_config structure because
+ * the kernel does not cantain any of the extra gss-api specific data.
*/
typedef struct gss_mech_config {
char *kmodName; /* kernel module name */
diff --git a/src/lib/gssapi/spnego/spnego_mech.c b/src/lib/gssapi/spnego/spnego_mech.c
index 8e0c3a3..c9305c7 100644
--- a/src/lib/gssapi/spnego/spnego_mech.c
+++ b/src/lib/gssapi/spnego/spnego_mech.c
@@ -3759,7 +3759,7 @@ put_negResult(unsigned char **buf_out, OM_uint32 negResult,
}
/*
- * This routine compares the recieved mechset to the mechset that
+ * This routine compares the received mechset to the mechset that
* this server can support. It looks sequentially through the mechset
* and the first one that matches what the server can support is
* chosen as the negotiated mechanism. If one is found, negResult
diff --git a/src/lib/kadm5/clnt/client_init.c b/src/lib/kadm5/clnt/client_init.c
index aa08918..ff1580e 100644
--- a/src/lib/kadm5/clnt/client_init.c
+++ b/src/lib/kadm5/clnt/client_init.c
@@ -285,7 +285,7 @@ init_any(krb5_context context, char *client_name, enum init_type init_type,
goto error;
/*
- * Bypass the remainder of the code and return straightaway
+ * Bypass the remainder of the code and return straight away
* if the gss service requested is kiprop
*/
if (iprop_enable) {
diff --git a/src/lib/kadm5/kadm_err.et b/src/lib/kadm5/kadm_err.et
index 892a6fa..fbe2e76 100644
--- a/src/lib/kadm5/kadm_err.et
+++ b/src/lib/kadm5/kadm_err.et
@@ -23,7 +23,7 @@ error_code KADM5_BAD_CLASS, "Invalid number of character classes"
error_code KADM5_BAD_LENGTH, "Invalid password length"
error_code KADM5_BAD_POLICY, "Illegal policy name"
error_code KADM5_BAD_PRINCIPAL, "Illegal principal name"
-error_code KADM5_BAD_AUX_ATTR, "Invalid auxillary attributes"
+error_code KADM5_BAD_AUX_ATTR, "Invalid auxiliary attributes"
error_code KADM5_BAD_HISTORY, "Invalid password history count"
error_code KADM5_BAD_MIN_PASS_LIFE, "Password minimum life is greater than password maximum life"
error_code KADM5_PASS_Q_TOOSHORT, "Password is too short"
diff --git a/src/lib/kadm5/kadm_rpc_xdr.c b/src/lib/kadm5/kadm_rpc_xdr.c
index 8383e4e..0411c3f 100644
--- a/src/lib/kadm5/kadm_rpc_xdr.c
+++ b/src/lib/kadm5/kadm_rpc_xdr.c
@@ -244,7 +244,7 @@ static bool_t xdr_krb5_boolean(XDR *xdrs, krb5_boolean *kbool)
bool_t xdr_krb5_key_data_nocontents(XDR *xdrs, krb5_key_data *objp)
{
/*
- * Note that this function intentionally DOES NOT tranfer key
+ * Note that this function intentionally DOES NOT transfer key
* length or contents! xdr_krb5_key_data in adb_xdr.c does, but
* that is only for use within the server-side library.
*/
diff --git a/src/lib/kadm5/srv/pwqual_dict.c b/src/lib/kadm5/srv/pwqual_dict.c
index f736eac..e3ac20e 100644
--- a/src/lib/kadm5/srv/pwqual_dict.c
+++ b/src/lib/kadm5/srv/pwqual_dict.c
@@ -87,7 +87,7 @@ word_compare(const void *s1, const void *s2)
* success.
*
* Modifies:
- * word_list to point to a chunck of allocated memory containing
+ * word_list to point to a chunk of allocated memory containing
* pointers to words
* word_block to contain the dictionary.
*
diff --git a/src/lib/kadm5/srv/svr_principal.c b/src/lib/kadm5/srv/svr_principal.c
index 53ecbe1..8a7ab6e 100644
--- a/src/lib/kadm5/srv/svr_principal.c
+++ b/src/lib/kadm5/srv/svr_principal.c
@@ -2005,7 +2005,7 @@ static int decrypt_key_data(krb5_context context,
* kvnop (w) kvno to fill in, or NULL
*
* Effects: Searches the key_data array of entry, which must have been
- * retrived with kadm5_get_principal with the KADM5_KEY_DATA mask, to
+ * retrieved with kadm5_get_principal with the KADM5_KEY_DATA mask, to
* find a key with a specified enctype, salt type, and kvno in a
* principal entry. If not found, return ENOENT. Otherwise, decrypt
* it with the master key, and return the key in keyblock, the salt
diff --git a/src/lib/kadm5/unit-test/api.current/chpass-principal.exp b/src/lib/kadm5/unit-test/api.current/chpass-principal.exp
index 53a96e5..47a19dc 100644
--- a/src/lib/kadm5/unit-test/api.current/chpass-principal.exp
+++ b/src/lib/kadm5/unit-test/api.current/chpass-principal.exp
@@ -67,7 +67,7 @@ if { $RPC } { test1805 }
#
# admin with changepw service tickets try to change other principals
-# password, failes with AUTH error
+# password, fails with AUTH error
test "chpass-principal 180.625"
proc test180625 {} {
global test
diff --git a/src/lib/kadm5/unit-test/api.current/crte-principal.exp b/src/lib/kadm5/unit-test/api.current/crte-principal.exp
index 52dda78..d6d6809 100644
--- a/src/lib/kadm5/unit-test/api.current/crte-principal.exp
+++ b/src/lib/kadm5/unit-test/api.current/crte-principal.exp
@@ -645,7 +645,7 @@ proc test28 {} {
if {! [cmd [format {
kadm5_get_principal $server_handle "%s/a" principal KADM5_PRINCIPAL_NORMAL_MASK
} $test]]} {
- fail "$test: can not retreive principal"
+ fail "$test: can not retrieve principal"
return
}
send "lindex \$principal 10\n"
@@ -689,7 +689,7 @@ proc test29 {} {
if {! [cmd [format {
kadm5_get_principal $server_handle "%s/a" principal KADM5_PRINCIPAL_NORMAL_MASK
} $test]]} {
- fail "$test: can not retreive principal"
+ fail "$test: can not retrieve principal"
return;
}
send "lindex \$principal 1\n"
@@ -733,7 +733,7 @@ proc test30 {} {
if {! [cmd [format {
kadm5_get_principal $server_handle "%s/a" principal KADM5_PRINCIPAL_NORMAL_MASK
} $test]]} {
- fail "$test: can not retreive principal"
+ fail "$test: can not retrieve principal"
return;
}
send "lindex \$principal 3\n"
@@ -778,7 +778,7 @@ proc test31 {} {
if {! [cmd [format {
kadm5_get_principal $server_handle "%s/a" principal KADM5_PRINCIPAL_NORMAL_MASK
} $test]]} {
- fail "$test: can not retreive principal"
+ fail "$test: can not retrieve principal"
return;
}
send "lindex \$principal 3\n"
@@ -823,7 +823,7 @@ proc test32 {} {
if {! [cmd [format {
kadm5_get_principal $server_handle "%s/a" principal KADM5_PRINCIPAL_NORMAL_MASK
} $test]]} {
- fail "$test: can not retreive principal"
+ fail "$test: can not retrieve principal"
return;
}
if { ! [cmd {kadm5_get_policy $server_handle test-pol policy}]} {
@@ -912,7 +912,7 @@ proc test33 {} {
if {! [cmd [format {
kadm5_get_principal $server_handle "%s/a" principal KADM5_PRINCIPAL_NORMAL_MASK
} $test]]} {
- fail "$test: can not retreive principal"
+ fail "$test: can not retrieve principal"
return;
}
send "lindex \$principal 3\n"
@@ -957,7 +957,7 @@ proc test34 {} {
if {! [cmd [format {
kadm5_get_principal $server_handle "%s/a" principal KADM5_PRINCIPAL_NORMAL_MASK
} $test]]} {
- fail "$test: can not retreive principal"
+ fail "$test: can not retrieve principal"
return;
}
send "lindex \$principal 3\n"
@@ -1002,7 +1002,7 @@ proc test35 {} {
if {! [cmd [format {
kadm5_get_principal $server_handle "%s/a" principal KADM5_PRINCIPAL_NORMAL_MASK
} $test]]} {
- fail "$test: can not retreive principal"
+ fail "$test: can not retrieve principal"
return;
}
send "lindex \$principal 3\n"
@@ -1047,7 +1047,7 @@ proc test36 {} {
if {! [cmd [format {
kadm5_get_principal $server_handle "%s/a" principal KADM5_PRINCIPAL_NORMAL_MASK
} $test]]} {
- fail "$test: can not retreive principal"
+ fail "$test: can not retrieve principal"
return;
}
if { ! [cmd {kadm5_get_policy $server_handle test-pol policy} ]} {
@@ -1135,7 +1135,7 @@ proc test37 {} {
if {! [cmd [format {
kadm5_get_principal $server_handle "%s/a" principal KADM5_PRINCIPAL_NORMAL_MASK
} $test]]} {
- fail "$test: can not retreive principal"
+ fail "$test: can not retrieve principal"
return;
}
send "lindex \$principal 3\n"
@@ -1179,7 +1179,7 @@ proc test38 {} {
if {! [cmd [format {
kadm5_get_principal $server_handle "%s/a" principal KADM5_PRINCIPAL_NORMAL_MASK
} $test]]} {
- fail "$test: can not retreive principal"
+ fail "$test: can not retrieve principal"
return;
}
send "lindex \$principal 3\n"
@@ -1308,7 +1308,7 @@ proc test40 {} {
if {! [cmd [format {
kadm5_get_principal $server_handle "%s/a" principal KADM5_PRINCIPAL_NORMAL_MASK
} $test]]} {
- fail "$test: can not retreive principal"
+ fail "$test: can not retrieve principal"
return;
}
send "lindex \$principal 4\n"
diff --git a/src/lib/kadm5/unit-test/api.current/dlte-policy.exp b/src/lib/kadm5/unit-test/api.current/dlte-policy.exp
index 4ba40fd..ad2863d 100644
--- a/src/lib/kadm5/unit-test/api.current/dlte-policy.exp
+++ b/src/lib/kadm5/unit-test/api.current/dlte-policy.exp
@@ -158,7 +158,7 @@ proc test12 {} {
$KADM5_STRUCT_VERSION $KADM5_API_VERSION_3 \
server_handle
}]} {
- perror "$test unexecpted failure in init"
+ perror "$test unexpected failure in init"
return
}
if {! [cmd [format {
diff --git a/src/lib/kadm5/unit-test/api.current/mod-principal.exp b/src/lib/kadm5/unit-test/api.current/mod-principal.exp
index 44f8548..ac9f968 100644
--- a/src/lib/kadm5/unit-test/api.current/mod-principal.exp
+++ b/src/lib/kadm5/unit-test/api.current/mod-principal.exp
@@ -493,7 +493,7 @@ proc test22 {} {
kadm5_modify_principal $server_handle [simple_principal "%s/a"] \
{KADM5_PW_EXPIRATION}
} $test]]} {
- fail "$test: modifiy failed"
+ fail "$test: modify failed"
return
}
if {! [cmd [format {
@@ -535,7 +535,7 @@ proc test23 {} {
kadm5_modify_principal $server_handle [simple_principal "%s/a"] \
{KADM5_PW_EXPIRATION}
} $test]]} {
- fail "$test: modifiy failed"
+ fail "$test: modify failed"
return
}
if {! [cmd [format {
@@ -885,7 +885,7 @@ proc test29 {} {
kadm5_modify_principal $server_handle [simple_principal "%s/a"] \
{KADM5_POLICY_CLR}
} $test]]} {
- fail "$test: modifiy failed"
+ fail "$test: modify failed"
return
}
if {! [cmd [format {
diff --git a/src/lib/kadm5/unit-test/config/unix.exp b/src/lib/kadm5/unit-test/config/unix.exp
index ca67095..d7706ec 100644
--- a/src/lib/kadm5/unit-test/config/unix.exp
+++ b/src/lib/kadm5/unit-test/config/unix.exp
@@ -156,62 +156,62 @@ proc api_start {} {
send "set current_struct_version \[expr \$KADM5_STRUCT_VERSION &~ \$KADM5_STRUCT_VERSION_MASK\]\n"
expect {
-re "$prompt$" {}
- eof { perror "EOF setting API varibles"}
- timeout { perror "timeout setting API varibles"}
+ eof { perror "EOF setting API variables"}
+ timeout { perror "timeout setting API variables"}
}
send "set current_api_version \[expr \$KADM5_API_VERSION_3 &~ \$KADM5_API_VERSION_MASK\]\n"
expect {
-re "$prompt$" {}
- eof { perror "EOF setting API varibles"}
- timeout { perror "timeout setting API varibles"}
+ eof { perror "EOF setting API variables"}
+ timeout { perror "timeout setting API variables"}
}
send "set bad_struct_version_mask \[expr 0x65432100 | \$current_struct_version\]\n"
expect {
-re "$prompt$" {}
- eof { perror "EOF setting API varibles"}
- timeout { perror "timeout setting API varibles"}
+ eof { perror "EOF setting API variables"}
+ timeout { perror "timeout setting API variables"}
}
send "set bad_api_version_mask \[expr 0x65432100 | \$current_api_version\]\n"
expect {
-re "$prompt$" {}
- eof { perror "EOF setting API varibles"}
- timeout { perror "timeout setting API varibles"}
+ eof { perror "EOF setting API variables"}
+ timeout { perror "timeout setting API variables"}
}
send "set no_api_version_mask \$current_api_version\n"
expect {
-re "$prompt$" {}
- eof { perror "EOF setting API varibles"}
- timeout { perror "timeout setting API varibles"}
+ eof { perror "EOF setting API variables"}
+ timeout { perror "timeout setting API variables"}
}
send "set no_struct_version_mask \$current_struct_version\n"
expect {
-re "$prompt$" {}
- eof { perror "EOF setting API varibles"}
- timeout { perror "timeout setting API varibles"}
+ eof { perror "EOF setting API variables"}
+ timeout { perror "timeout setting API variables"}
}
send "set old_api_version \[expr \$KADM5_API_VERSION_MASK | 0x00\]\n"
expect {
-re "$prompt$" {}
- eof { perror "EOF setting API varibles"}
- timeout { perror "timeout setting API varibles"}
+ eof { perror "EOF setting API variables"}
+ timeout { perror "timeout setting API variables"}
}
send "set old_struct_version \[expr \$KADM5_STRUCT_VERSION_MASK | 0x00\]\n"
expect {
-re "$prompt$" {}
- eof { perror "EOF setting API varibles"}
- timeout { perror "timeout setting API varibles"}
+ eof { perror "EOF setting API variables"}
+ timeout { perror "timeout setting API variables"}
}
send "set new_api_version \[expr \$KADM5_API_VERSION_MASK | 0xca\]\n"
expect {
-re "$prompt$" {}
- eof { perror "EOF setting API varibles"}
- timeout { perror "timeout setting API varibles"}
+ eof { perror "EOF setting API variables"}
+ timeout { perror "timeout setting API variables"}
}
send "set new_struct_version \[expr \$KADM5_STRUCT_VERSION_MASK | 0xca\]\n"
expect {
-re "$prompt$" {}
- eof { perror "EOF setting API varibles"}
- timeout { perror "timeout setting API varibles"}
+ eof { perror "EOF setting API variables"}
+ timeout { perror "timeout setting API variables"}
}
set api_pid $pid
diff --git a/src/lib/krad/internal.h b/src/lib/krad/internal.h
index 996a893..0143d15 100644
--- a/src/lib/krad/internal.h
+++ b/src/lib/krad/internal.h
@@ -93,9 +93,9 @@ kr_remote_free(krad_remote *rr);
* The timeout parameter is the total timeout across all retries in
* milliseconds.
*
- * If the cb is called with a retval of ETIMEDOUT it indicates that the alloted
- * time has elapsed. However, in the case of a timeout, we continue to listen
- * for the packet until krad_remote_cancel() is called or a response is
+ * If the cb is called with a retval of ETIMEDOUT it indicates that the
+ * allotted time has elapsed. However, in the case of a timeout, we continue to
+ * listen for the packet until krad_remote_cancel() is called or a response is
* received. This means that cb will always be called twice in the event of a
* timeout. This permits you to pursue other remotes while still listening for
* a response from the first one.
diff --git a/src/lib/krad/remote.c b/src/lib/krad/remote.c
index 437f7e9..c96a9b4 100644
--- a/src/lib/krad/remote.c
+++ b/src/lib/krad/remote.c
@@ -152,7 +152,7 @@ remote_disconnect(krad_remote *rr)
}
/* Add the specified flags to the remote. This automatically manages the
- * lifecyle of the underlying event. Also connects if disconnected. */
+ * lifecycle of the underlying event. Also connects if disconnected. */
static krb5_error_code
remote_add_flags(krad_remote *remote, verto_ev_flag flags)
{
@@ -198,7 +198,7 @@ remote_add_flags(krad_remote *remote, verto_ev_flag flags)
}
/* Remove the specified flags to the remote. This automatically manages the
- * lifecyle of the underlying event. */
+ * lifecycle of the underlying event. */
static void
remote_del_flags(krad_remote *remote, verto_ev_flag flags)
{
@@ -234,7 +234,7 @@ remote_shutdown(krad_remote *rr)
}
}
-/* Handle when packets receive no response within their alloted time. */
+/* Handle when packets receive no response within their allotted time. */
static void
on_timeout(verto_ctx *ctx, verto_ev *ev)
{
diff --git a/src/lib/krb5/asn.1/krbasn1.h b/src/lib/krb5/asn.1/krbasn1.h
index cfc24ad..c580335 100644
--- a/src/lib/krb5/asn.1/krbasn1.h
+++ b/src/lib/krb5/asn.1/krbasn1.h
@@ -22,7 +22,7 @@
* If KRB5_GENEROUS_LR_TYPE is defined, then we are generous about
* accepting a one byte negative lr_type - which is not sign
* extended. Prior to July 2000, we were sending a negative lr_type as
- * a positve single byte value - instead of a signed integer. This
+ * a positive single byte value - instead of a signed integer. This
* allows us to receive the old value and deal
*/
#define KRB5_GENEROUS_LR_TYPE
diff --git a/src/lib/krb5/ccache/cc_memory.c b/src/lib/krb5/ccache/cc_memory.c
index 9d13de9..610091a 100644
--- a/src/lib/krb5/ccache/cc_memory.c
+++ b/src/lib/krb5/ccache/cc_memory.c
@@ -361,7 +361,7 @@ krb5_mcc_start_seq_get(krb5_context context, krb5_ccache id,
* cursor is a krb5_cc_cursor originally obtained from
* krb5_mcc_start_seq_get.
*
- * Modifes:
+ * Modifies:
* cursor, creds
*
* Effects:
diff --git a/src/lib/krb5/ccache/cc_mslsa.c b/src/lib/krb5/ccache/cc_mslsa.c
index 7afdfc3..4931e6c 100644
--- a/src/lib/krb5/ccache/cc_mslsa.c
+++ b/src/lib/krb5/ccache/cc_mslsa.c
@@ -1512,7 +1512,7 @@ typedef struct _krb5_lcc_cursor {
* id
*
* Effects:
- * Acccess the MS Kerberos LSA cache in the current logon session
+ * Access the MS Kerberos LSA cache in the current logon session
* Ignore the residual.
*
* Returns:
@@ -1737,7 +1737,7 @@ krb5_lcc_start_seq_get(krb5_context context, krb5_ccache id, krb5_cc_cursor *cur
* cursor is a krb5_cc_cursor originally obtained from
* krb5_lcc_start_seq_get.
*
- * Modifes:
+ * Modifies:
* cursor
*
* Effects:
diff --git a/src/lib/krb5/ccache/ccapi/stdcc.c b/src/lib/krb5/ccache/ccapi/stdcc.c
index 8664f70..0dc5259 100644
--- a/src/lib/krb5/ccache/ccapi/stdcc.c
+++ b/src/lib/krb5/ccache/ccapi/stdcc.c
@@ -625,7 +625,7 @@ krb5_stdccv3_retrieve (krb5_context context,
/*
* end seq
*
- * just free up the storage assoicated with the cursor (if we can)
+ * just free up the storage associated with the cursor (if we can)
*/
krb5_error_code KRB5_CALLCONV
krb5_stdccv3_end_seq_get (krb5_context context,
@@ -1393,7 +1393,7 @@ krb5_error_code KRB5_CALLCONV krb5_stdcc_next_cred
/*
- * retreive
+ * retrieve
*
* - try to find a matching credential in the cache
*/
@@ -1412,7 +1412,7 @@ krb5_stdcc_retrieve(context, id, whichfields, mcreds, creds)
/*
* end seq
*
- * just free up the storage assoicated with the cursor (if we could)
+ * just free up the storage associated with the cursor (if we could)
*/
krb5_error_code KRB5_CALLCONV krb5_stdcc_end_seq_get
(krb5_context context, krb5_ccache id, krb5_cc_cursor *cursor)
@@ -1515,7 +1515,7 @@ krb5_stdcc_destroy (krb5_context context, krb5_ccache id)
free(id);
/* If the cache does not exist when we tried to destroy it,
- that's fine. That means someone else destryoed it since
+ that's fine. That means someone else destroyed it since
we resolved it. */
if (retval == KRB5_FCC_NOFILE)
return 0;
diff --git a/src/lib/krb5/ccache/ccapi/stdcc.h b/src/lib/krb5/ccache/ccapi/stdcc.h
index d3b6009..acb8a26 100644
--- a/src/lib/krb5/ccache/ccapi/stdcc.h
+++ b/src/lib/krb5/ccache/ccapi/stdcc.h
@@ -35,7 +35,7 @@ typedef struct _stdccCacheData {
} stdccCacheData, *stdccCacheDataPtr;
-/* function protoypes */
+/* function prototypes */
void krb5_stdcc_shutdown(void);
diff --git a/src/lib/krb5/ccache/ccapi/stdcc_util.c b/src/lib/krb5/ccache/ccapi/stdcc_util.c
index 1f2a386..c3627fe 100644
--- a/src/lib/krb5/ccache/ccapi/stdcc_util.c
+++ b/src/lib/krb5/ccache/ccapi/stdcc_util.c
@@ -367,7 +367,7 @@ copy_cc_cred_union_to_krb5_creds (krb5_context in_context,
/*
* copy_krb5_creds_to_cc_credentials
- * - analagous to above but in the reverse direction
+ * - analogous to above but in the reverse direction
*/
krb5_error_code
copy_krb5_creds_to_cc_cred_union (krb5_context in_context,
@@ -618,7 +618,7 @@ int copyCCDataArrayToK5(cc_creds *ccCreds, krb5_creds *v5Creds, char whichArray)
/*
* copyK5DataArrayToCC
- * - analagous to above, but in the other direction
+ * - analogous to above, but in the other direction
*/
int copyK5DataArrayToCC(krb5_creds *v5Creds, cc_creds *ccCreds, char whichArray)
{
@@ -759,7 +759,7 @@ void dupCCtoK5(krb5_context context, cc_creds *src, krb5_creds *dest)
/*
* dupK5toCC
- * - analagous to above but in the reverse direction
+ * - analogous to above but in the reverse direction
*/
void dupK5toCC(krb5_context context, krb5_creds *creds, cred_union **cu)
{
@@ -839,7 +839,7 @@ void dupK5toCC(krb5_context context, krb5_creds *creds, cred_union **cu)
(in dupK5toCC() above) with its own memory allocation routines - which
may be different than how the CCache allocates memory - the Kerb5 library
must have its own version of cc_free_creds() to deallocate it. These
- functions do that. The top-level function to substitue for cc_free_creds()
+ functions do that. The top-level function to substitute for cc_free_creds()
is krb5_free_cc_cred_union().
If the CCache library wants to use a cred_union structure created by
diff --git a/src/lib/krb5/ccache/ccapi/stdcc_util.h b/src/lib/krb5/ccache/ccapi/stdcc_util.h
index 2e5eecc..6836d54 100644
--- a/src/lib/krb5/ccache/ccapi/stdcc_util.h
+++ b/src/lib/krb5/ccache/ccapi/stdcc_util.h
@@ -20,7 +20,7 @@
#include "krb5.h"
-/* protoypes for private functions declared in stdcc_util.c */
+/* prototypes for private functions declared in stdcc_util.c */
#ifdef USE_CCAPI_V3
krb5_error_code
copy_cc_cred_union_to_krb5_creds (krb5_context in_context,
diff --git a/src/lib/krb5/ccache/t_cc.c b/src/lib/krb5/ccache/t_cc.c
index 06a1062..a7251e2 100644
--- a/src/lib/krb5/ccache/t_cc.c
+++ b/src/lib/krb5/ccache/t_cc.c
@@ -603,7 +603,7 @@ main(void)
if (check_registered(context, "KEYRING:process:"))
do_test(context, "KEYRING:process:");
else
- printf("Skiping KEYRING: test - unregistered type\n");
+ printf("Skipping KEYRING: test - unregistered type\n");
do_test(context, "MEMORY:");
do_test(context, "FILE:");
diff --git a/src/lib/krb5/ccache/t_cccol.c b/src/lib/krb5/ccache/t_cccol.c
index 444806e..741f955 100644
--- a/src/lib/krb5/ccache/t_cccol.c
+++ b/src/lib/krb5/ccache/t_cccol.c
@@ -235,7 +235,7 @@ main(int argc, char **argv)
* resolve to the generated caches and appear in the collection. (They
* might appear before being initialized; that's not currently considered
* important). The primary cache for the collection should remain as the
- * unitialized cache from the previous step.
+ * uninitialized cache from the previous step.
*/
typename = krb5_cc_get_type(ctx, ccinitial);
check(krb5_cc_new_unique(ctx, typename, NULL, &ccu1));
diff --git a/src/lib/krb5/ccache/t_cccursor.c b/src/lib/krb5/ccache/t_cccursor.c
index 4323b77..96ca3ae 100644
--- a/src/lib/krb5/ccache/t_cccursor.c
+++ b/src/lib/krb5/ccache/t_cccursor.c
@@ -27,7 +27,7 @@
/*
* Displays a list of caches returned by the cccol cursor. The first argument,
* if given, is set to the default cache name for the context before iterating.
- * Any remaining argments are resolved as caches and kept open during the
+ * Any remaining arguments are resolved as caches and kept open during the
* iteration. If the argument "CONTENT" is given as one of the cache names,
* immediately exit with status 0 if the collection contains credentials and 1
* if it does not.
diff --git a/src/lib/krb5/ccache/t_marshal.c b/src/lib/krb5/ccache/t_marshal.c
index 144554c..bd0284a 100644
--- a/src/lib/krb5/ccache/t_marshal.c
+++ b/src/lib/krb5/ccache/t_marshal.c
@@ -162,7 +162,7 @@ const struct test {
/* Version 4 header */
16,
"\x05\x04\x00\x0C\x00\x01\x00\x08\x00\x00\x01\x2C\x00\x00\xD4\x31",
- /* Verion 4 principal */
+ /* Version 4 principal */
37,
"\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00\x0B\x4B\x52\x42\x54"
"\x45\x53\x54\x2E\x43\x4F\x4D\x00\x00\x00\x0A\x74\x65\x73\x74\x63"
diff --git a/src/lib/krb5/keytab/kt_file.c b/src/lib/krb5/keytab/kt_file.c
index 021c943..80db117 100644
--- a/src/lib/krb5/keytab/kt_file.c
+++ b/src/lib/krb5/keytab/kt_file.c
@@ -703,7 +703,7 @@ const krb5_kt_ops krb5_kt_dfl_ops = {
* There are no separators between fields of an entry.
* A principal is a length-encoded array of length-encoded strings. The
* length is a krb5_int16 in each case. The specific format, then, is
- * multiple entries concatinated with no separators. An entry has this
+ * multiple entries concatenated with no separators. An entry has this
* exact format:
*
* sizeof(krb5_int16) bytes for number of components in the principal;
@@ -1299,7 +1299,7 @@ krb5_ktfileint_size_entry(krb5_context context, krb5_keytab_entry *entry, krb5_i
* Find and reserve a slot in the file for an entry of the needed size.
* The commit point will be set to the position in the file where the
* the length (sizeof(krb5_int32) bytes) of this node should be written
- * when commiting the write. The file position left as a result of this
+ * when committing the write. The file position left as a result of this
* call is the position where the actual data should be written.
*
* The size_needed argument may be adjusted if we find a hole that is
diff --git a/src/lib/krb5/keytab/t_keytab.c b/src/lib/krb5/keytab/t_keytab.c
index ea4ce68..aa5153c 100644
--- a/src/lib/krb5/keytab/t_keytab.c
+++ b/src/lib/krb5/keytab/t_keytab.c
@@ -219,7 +219,7 @@ kt_test(krb5_context context, const char *name)
kret = krb5_kt_get_entry(context, kt, princ, 0, 0, &kent);
- CHECK_ERR(kret, KRB5_KT_NOTFOUND, "Getting non-existant entry");
+ CHECK_ERR(kret, KRB5_KT_NOTFOUND, "Getting nonexistent entry");
krb5_free_principal(context, princ);
diff --git a/src/lib/krb5/krb/authdata.h b/src/lib/krb5/krb/authdata.h
index 74d663c..10cc2c3 100644
--- a/src/lib/krb5/krb/authdata.h
+++ b/src/lib/krb5/krb/authdata.h
@@ -43,7 +43,7 @@ krb5int_authdata_verify(krb5_context context,
/* PAC */
/*
- * A PAC consists of a sequence of PAC_INFO_BUFFERs, preceeded by
+ * A PAC consists of a sequence of PAC_INFO_BUFFERs, preceded by
* a PACTYPE header. Decoding the contents of the buffers is left
* to the application (notwithstanding signature verification).
*/
diff --git a/src/lib/krb5/krb/conv_princ.c b/src/lib/krb5/krb/conv_princ.c
index 9dc3798..9601bb4 100644
--- a/src/lib/krb5/krb/conv_princ.c
+++ b/src/lib/krb5/krb/conv_princ.c
@@ -31,7 +31,7 @@
* NOTE: This is highly site specific, and is only really necessary
* for sites who need to convert from V4 to V5. It is used by both
* the KDC and the kdb5_convert program. Since its use is highly
- * specialized, the necesary information is just going to be
+ * specialized, the necessary information is just going to be
* hard-coded in this file.
*/
diff --git a/src/lib/krb5/krb/encode_kdc.c b/src/lib/krb5/krb/encode_kdc.c
index 5e652d9..e4907da 100644
--- a/src/lib/krb5/krb/encode_kdc.c
+++ b/src/lib/krb5/krb/encode_kdc.c
@@ -79,7 +79,7 @@ krb5_encode_kdc_rep(krb5_context context, krb5_msgtype type,
* also note that the reason why we are passing it in a structure
* instead of as an argument to encode_krb5_enc_kdc_rep_part (the
* way we should) is for compatibility with the ISODE version of
- * this fuction. Ah, compatibility....
+ * this function. Ah, compatibility....
*/
tmp_encpart = *encpart;
tmp_encpart.msg_type = type;
diff --git a/src/lib/krb5/krb/get_in_tkt.c b/src/lib/krb5/krb/get_in_tkt.c
index cc0f70e..a1c4a53 100644
--- a/src/lib/krb5/krb/get_in_tkt.c
+++ b/src/lib/krb5/krb/get_in_tkt.c
@@ -439,7 +439,7 @@ sort_krb5_padata_sequence(krb5_context context, krb5_data *realm,
/* see if we can extract a number */
l = strtol(p, &q, 10);
if ((q != NULL) && (q > p)) {
- /* got a valid number; search for a matchin entry */
+ /* got a valid number; search for a matching entry */
for (i = base; padata[i] != NULL; i++) {
/* bubble the matching entry to the front of the list */
if (padata[i]->pa_type == l) {
diff --git a/src/lib/krb5/krb/gic_pwd.c b/src/lib/krb5/krb/gic_pwd.c
index 54e0a8e..cdfdb48 100644
--- a/src/lib/krb5/krb/gic_pwd.c
+++ b/src/lib/krb5/krb/gic_pwd.c
@@ -417,7 +417,7 @@ cleanup:
If password is passed as NULL, the password is read from the terminal,
and then converted into a key.
- A succesful call will place the ticket in the credentials cache ccache.
+ A successful call will place the ticket in the credentials cache ccache.
returns system errors, encryption errors
*/
diff --git a/src/lib/krb5/krb/in_tkt_sky.c b/src/lib/krb5/krb/in_tkt_sky.c
index 342fe18..4787fa0 100644
--- a/src/lib/krb5/krb/in_tkt_sky.c
+++ b/src/lib/krb5/krb/in_tkt_sky.c
@@ -60,7 +60,7 @@ get_as_key_skey(krb5_context context, krb5_principal client,
the system key store (e.g. /etc/krb5.keytab). If keyblock is non-NULL, it
is used as the decryption key.
- A succesful call will place the ticket in the credentials cache ccache.
+ A successful call will place the ticket in the credentials cache ccache.
returns system errors, encryption errors
diff --git a/src/lib/krb5/krb/rd_cred.c b/src/lib/krb5/krb/rd_cred.c
index 720147c..d89a98a 100644
--- a/src/lib/krb5/krb/rd_cred.c
+++ b/src/lib/krb5/krb/rd_cred.c
@@ -90,7 +90,7 @@ make_cred_list(krb5_context context, krb5_cred *krbcred,
if (list == NULL)
goto cleanup;
- /* For each credential, create a strcture in the list of credentials and
+ /* For each credential, create a structure in the list of credentials and
* copy the information. */
for (i = 0; i < count; i++) {
list[i] = k5alloc(sizeof(*list[i]), &ret);
diff --git a/src/lib/krb5/krb/rd_safe.c b/src/lib/krb5/krb/rd_safe.c
index 7b7a30c..6e5c97aa 100644
--- a/src/lib/krb5/krb/rd_safe.c
+++ b/src/lib/krb5/krb/rd_safe.c
@@ -92,7 +92,7 @@ read_krbsafe(krb5_context context, krb5_auth_context ac,
if (ret)
goto cleanup;
- /* Verify the checkum over the re-encoded message. */
+ /* Verify the checksum over the re-encoded message. */
ret = krb5_k_verify_checksum(context, key, KRB5_KEYUSAGE_KRB_SAFE_CKSUM,
der_zerosafe, safe_cksum, &valid);
if (!valid) {
diff --git a/src/lib/krb5/krb/recvauth.c b/src/lib/krb5/krb/recvauth.c
index 570fede..f784fa3 100644
--- a/src/lib/krb5/krb/recvauth.c
+++ b/src/lib/krb5/krb/recvauth.c
@@ -144,7 +144,7 @@ recvauth_common(krb5_context context,
/*
* If there was a problem, send back a krb5_error message,
- * preceeded by the length of the krb5_error message. If
+ * preceded by the length of the krb5_error message. If
* everything's ok, send back 0 for the length.
*/
if (problem) {
diff --git a/src/lib/krb5/krb/walk_rtree.c b/src/lib/krb5/krb/walk_rtree.c
index 4074fe8..bb5ca08 100644
--- a/src/lib/krb5/krb/walk_rtree.c
+++ b/src/lib/krb5/krb/walk_rtree.c
@@ -174,7 +174,7 @@ cleanup:
/* ANL - Modified to allow Configurable Authentication Paths.
* This modification removes the restriction on the choice of realm
* names, i.e. they nolonger have to be hierarchical. This
- * is allowed by RFC 1510: "If a hierarchical orginization is not used
+ * is allowed by RFC 1510: "If a hierarchical organization is not used
* it may be necessary to consult some database in order to construct
* an authentication path between realms." The database is contained
* in the [capaths] section of the krb5.conf file.
@@ -184,8 +184,8 @@ cleanup:
* entries if the same krb5.conf is used for clients and servers)
*
* for example: ESnet will be running a KDC which will share
- * inter-realm keys with its many orginizations which include among
- * other ANL, NERSC and PNL. Each of these orginizations wants to
+ * inter-realm keys with its many organizations which include among
+ * other ANL, NERSC and PNL. Each of these organizations wants to
* use its DNS name in the realm, ANL.GOV. In addition ANL wants
* to authenticatite to HAL.COM via a K5.MOON and K5.JUPITER
* A [capaths] section of the krb5.conf file for the ANL.GOV clients
@@ -221,9 +221,9 @@ cleanup:
*
* This version of the Configurable Authentication Path modification
* differs from the previous versions prior to K5 beta 5 in that
- * the profile routines are used, and the explicite path from
- * client's realm to server's realm must be given. The modifications
- * will work together.
+ * the profile routines are used, and the explicit path from client's
+ * realm to server's realm must be given. The modifications will work
+ * together.
* DEE - 5/23/95
*/
diff --git a/src/lib/krb5/os/init_os_ctx.c b/src/lib/krb5/os/init_os_ctx.c
index 3aa86f4..2be266f 100644
--- a/src/lib/krb5/os/init_os_ctx.c
+++ b/src/lib/krb5/os/init_os_ctx.c
@@ -369,7 +369,7 @@ add_kdc_config_file(profile_filespec_t **pfiles)
/* Set the profile paths in the context. If secure is set to TRUE
then do not include user paths (from environment variables, etc).
- If kdc is TRUE, include kdc.conf from whereever we expect to find
+ If kdc is TRUE, include kdc.conf from wherever we expect to find
it. */
static krb5_error_code
os_init_paths(krb5_context ctx, krb5_boolean kdc)
diff --git a/src/lib/rpc/auth_gssapi.c b/src/lib/rpc/auth_gssapi.c
index 568ec6d..8ab7ab5 100644
--- a/src/lib/rpc/auth_gssapi.c
+++ b/src/lib/rpc/auth_gssapi.c
@@ -383,7 +383,7 @@ next_token:
} else {
PRINTF(("gssapi_create: processing signed isn\n"));
- /* don't check conf (integ only) or qop (accpet default) */
+ /* don't check conf (integ only) or qop (accept default) */
*gssstat = gss_unseal(minor_stat,
AUTH_PRIVATE(auth)->context,
&call_res.signed_isn,
diff --git a/src/lib/rpc/clnt_raw.c b/src/lib/rpc/clnt_raw.c
index 515086b..dcbb5cf 100644
--- a/src/lib/rpc/clnt_raw.c
+++ b/src/lib/rpc/clnt_raw.c
@@ -41,7 +41,7 @@ static char sccsid[] = "@(#)clnt_raw.c 1.22 87/08/11 Copyr 1984 Sun Micro";
* Memory based rpc for simple testing and timing.
* Interface to create an rpc client and server in the same process.
* This lets us similate rpc and get round trip overhead, without
- * any interference from the kernal.
+ * any interference from the kernel.
*/
#include <gssrpc/rpc.h>
diff --git a/src/lib/rpc/clnt_udp.c b/src/lib/rpc/clnt_udp.c
index 49b09e0..2503a38 100644
--- a/src/lib/rpc/clnt_udp.c
+++ b/src/lib/rpc/clnt_udp.c
@@ -109,7 +109,7 @@ struct cu_data {
* Caller may wish to set this something more useful.
*
* wait is the amount of time used between retransmitting a call if
- * no response has been heard; retransmition occurs until the actual
+ * no response has been heard; retransmission occurs until the actual
* rpc call times out.
*
* sendsz and recvsz are the maximum allowable packet sizes that can be
diff --git a/src/lib/rpc/svc.c b/src/lib/rpc/svc.c
index c171ecc..cfbc7aa 100644
--- a/src/lib/rpc/svc.c
+++ b/src/lib/rpc/svc.c
@@ -74,7 +74,7 @@ static SVCXPRT *xports[NOFILE];
* The services list
* Each entry represents a set of procedures (an rpc program).
* The dispatch routine takes request structs and runs the
- * apropriate procedure.
+ * appropriate procedure.
*/
static struct svc_callout {
struct svc_callout *sc_next;
diff --git a/src/lib/rpc/svc_auth_gssapi.c b/src/lib/rpc/svc_auth_gssapi.c
index 4831b00..b7ffee4 100644
--- a/src/lib/rpc/svc_auth_gssapi.c
+++ b/src/lib/rpc/svc_auth_gssapi.c
@@ -373,7 +373,7 @@ enum auth_stat gssrpc__svcauth_gssapi(
/*
* If the client's server_creds is already set, use it.
* Otherwise, try each credential in server_creds_list until
- * one of them succeedes, then set the client server_creds
+ * one of them succeeds, then set the client server_creds
* to that. If all fail, the client's server_creds isn't
* set (which is fine, because the client will be gc'ed
* anyway).
diff --git a/src/lib/rpc/svc_raw.c b/src/lib/rpc/svc_raw.c
index dba6c29..dd453cf 100644
--- a/src/lib/rpc/svc_raw.c
+++ b/src/lib/rpc/svc_raw.c
@@ -39,7 +39,7 @@ static char sccsid[] = "@(#)svc_raw.c 1.15 87/08/11 Copyr 1984 Sun Micro";
* svc_raw.c, This a toy for simple testing and timing.
* Interface to create an rpc client and server in the same UNIX process.
* This lets us similate rpc and get rpc (round trip) overhead, without
- * any interference from the kernal.
+ * any interference from the kernel.
*/
#include <gssrpc/rpc.h>
diff --git a/src/lib/rpc/svc_tcp.c b/src/lib/rpc/svc_tcp.c
index 54ce70e..56fe7b6 100644
--- a/src/lib/rpc/svc_tcp.c
+++ b/src/lib/rpc/svc_tcp.c
@@ -39,7 +39,7 @@ static char sccsid[] = "@(#)svc_tcp.c 1.21 87/08/11 Copyr 1984 Sun Micro";
* svc_tcp.c, Server side for TCP/IP based RPC.
*
* Actually implements two flavors of transporter -
- * a tcp rendezvouser (a listner and connection establisher)
+ * a tcp rendezvouser (a listener and connection establisher)
* and a record/tcp stream.
*/
@@ -262,7 +262,7 @@ makefd_xprt(
xprt->xp_verf.oa_base = cd->verf_body;
xprt->xp_addrlen = 0;
xprt->xp_laddrlen = 0;
- xprt->xp_ops = &svctcp_op; /* truely deals with calls */
+ xprt->xp_ops = &svctcp_op; /* truly deals with calls */
xprt->xp_port = 0; /* this is a connection, not a rendezvouser */
xprt->xp_sock = fd;
xprt_register(xprt);
@@ -344,7 +344,7 @@ svctcp_destroy(SVCXPRT *xprt)
static struct timeval wait_per_try = { 35, 0 };
/*
- * reads data from the tcp conection.
+ * reads data from the tcp connection.
* any error is fatal and the connection is closed.
* (And a read of zero bytes is a half closed stream => error.)
*/
diff --git a/src/lib/rpc/xdr.c b/src/lib/rpc/xdr.c
index 8c14ddc..24c3de4 100644
--- a/src/lib/rpc/xdr.c
+++ b/src/lib/rpc/xdr.c
@@ -544,7 +544,7 @@ xdr_u_int32(XDR *xdrs, uint32_t *up)
}
/*
- * XDR a descriminated union
+ * XDR a discriminated union
* Support routine for discriminated unions.
* You create an array of xdrdiscrim structures, terminated with
* an entry with a null procedure pointer. The routine gets
diff --git a/src/lib/rpc/xdr_rec.c b/src/lib/rpc/xdr_rec.c
index 28894f3..1f6a776 100644
--- a/src/lib/rpc/xdr_rec.c
+++ b/src/lib/rpc/xdr_rec.c
@@ -418,7 +418,7 @@ xdrrec_skiprecord(XDR *xdrs)
}
/*
- * Look ahead fuction.
+ * Look ahead function.
* Returns TRUE iff there is no more input in the buffer
* after consuming the rest of the current record.
*/
@@ -442,8 +442,8 @@ xdrrec_eof(XDR *xdrs)
/*
* The client must tell the package when an end-of-record has occurred.
* The second paraemters tells whether the record should be flushed to the
- * (output) tcp stream. (This let's the package support batched or
- * pipelined procedure calls.) TRUE => immmediate flush to tcp connection.
+ * (output) tcp stream. (This lets the package support batched or
+ * pipelined procedure calls.) TRUE => immediate flush to tcp connection.
*/
bool_t
xdrrec_endofrecord(XDR *xdrs, bool_t sendnow)
diff --git a/src/lib/rpc/xdr_reference.c b/src/lib/rpc/xdr_reference.c
index eab7d2d..eff279d 100644
--- a/src/lib/rpc/xdr_reference.c
+++ b/src/lib/rpc/xdr_reference.c
@@ -55,7 +55,7 @@ static char sccsid[] = "@(#)xdr_reference.c 1.11 87/08/11 SMI";
* referenced by a pointer inside the structure that is currently being
* translated. pp references a pointer to storage. If *pp is null
* the necessary storage is allocated.
- * size is the sizeof the referneced structure.
+ * size is the sizeof the referenced structure.
* proc is the routine to handle the referenced structure.
*/
bool_t