its vs it\'s etc. From Bjorn Sandell
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@22071 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
@@ -198,7 +198,7 @@ krb5_cc_gen_new(krb5_context context,
|
||||
* the library chooses the default credential cache type. The supplied
|
||||
* `hint' (that can be NULL) is a string that the credential cache
|
||||
* type can use to base the name of the credential on, this is to make
|
||||
* its easier for the user to differentiate the credentials.
|
||||
* it easier for the user to differentiate the credentials.
|
||||
*
|
||||
* @return Returns 0 or an error code.
|
||||
*
|
||||
|
@@ -361,7 +361,7 @@ add_file(char ***pfilenames, int *len, char *file)
|
||||
}
|
||||
|
||||
/*
|
||||
* `pq' isn't free, its up the the caller
|
||||
* `pq' isn't free, it's up the the caller
|
||||
*/
|
||||
|
||||
krb5_error_code KRB5_LIB_FUNCTION
|
||||
|
@@ -184,7 +184,7 @@ krb5_DES_schedule(krb5_context context,
|
||||
#ifdef ENABLE_AFS_STRING_TO_KEY
|
||||
|
||||
/* This defines the Andrew string_to_key function. It accepts a password
|
||||
* string as input and converts its via a one-way encryption algorithm to a DES
|
||||
* string as input and converts it via a one-way encryption algorithm to a DES
|
||||
* encryption key. It is compatible with the original Andrew authentication
|
||||
* service password database.
|
||||
*/
|
||||
|
@@ -51,7 +51,7 @@ Kerberos 5 Library (libkrb5, -lkrb5)
|
||||
.Sh DESCRIPTION
|
||||
This function takes a principal
|
||||
.Fa name ,
|
||||
verifies its in the local realm (using
|
||||
verifies that it is in the local realm (using
|
||||
.Fn krb5_get_default_realms )
|
||||
and then returns the local name of the principal.
|
||||
.Pp
|
||||
|
@@ -302,7 +302,7 @@ The supplied
|
||||
(that can be
|
||||
.Dv NULL )
|
||||
is a string that the credential cache type can use to base the name of
|
||||
the credential on, this is to make its easier for the user to
|
||||
the credential on, this is to make it easier for the user to
|
||||
differentiate the credentials.
|
||||
The returned credential cache
|
||||
.Fa id
|
||||
@@ -421,7 +421,7 @@ to
|
||||
.Fn krb5_cc_clear_mcred
|
||||
clears the
|
||||
.Fa mcreds
|
||||
argument so its reset and can be used with
|
||||
argument so it is reset and can be used with
|
||||
.Fa krb5_cc_retrieve_cred .
|
||||
.Pp
|
||||
.Fn krb5_cc_retrieve_cred ,
|
||||
|
@@ -197,7 +197,7 @@ If the encryption type supports using derived keys,
|
||||
.Fa usage
|
||||
should be the appropriate key-usage.
|
||||
.Fa ivec
|
||||
is a pointer to a initial IV, its modified to the end IV at the end of
|
||||
is a pointer to a initial IV, it is modified to the end IV at the end of
|
||||
the round.
|
||||
Ivec should be the size of
|
||||
If
|
||||
|
@@ -132,7 +132,7 @@ This option doesn't store the resulting user to user credential in
|
||||
the
|
||||
.Fa ccache .
|
||||
.It KRB5_GC_EXPIRED_OK
|
||||
returns the credential even if its expired, default behavior is trying
|
||||
returns the credential even if it is expired, default behavior is trying
|
||||
to refetch the credential from the KDC.
|
||||
.El
|
||||
.Pp
|
||||
|
@@ -147,7 +147,7 @@ This options doesn't store the resulting user to user credential in
|
||||
the
|
||||
.Fa ccache .
|
||||
.It KRB5_GC_EXPIRED_OK
|
||||
returns the credential even if its expired, default behavior is trying
|
||||
returns the credential even if it is expired, default behavior is trying
|
||||
to refetch the credential from the KDC.
|
||||
.It KRB5_GC_NO_STORE
|
||||
Do not store the resulting credentials in the
|
||||
|
@@ -54,7 +54,7 @@ gets the port number for
|
||||
.Fa service /
|
||||
.Fa proto
|
||||
pair from the global service table for and returns it in network order.
|
||||
If its not found in the global table, the
|
||||
If it isn't found in the global table, the
|
||||
.Fa default_port
|
||||
(given in host order)
|
||||
is returned.
|
||||
|
@@ -475,7 +475,7 @@ Heimdal 0.7. The behavior is possible to change in with the option
|
||||
.Li [libdefaults]fcc-mit-ticketflags .
|
||||
Heimdal 0.7 also code to detech that ticket flags was in the wrong
|
||||
order and correct them. This matters when doing delegation in GSS-API
|
||||
because the client code looks at the flag to determin if its possible
|
||||
because the client code looks at the flag to determin if it is possible
|
||||
to do delegation if the user requested it.
|
||||
.Sh SEE ALSO
|
||||
.Xr krb5.conf 5 ,
|
||||
|
@@ -93,7 +93,7 @@ cleans the the structure, must be used before trying to pass it in to
|
||||
.Fn krb5_verify_init_creds_opt_set_ap_req_nofail
|
||||
controls controls the behavior if
|
||||
.Fa ap_req_server
|
||||
doesn't exists in the local keytab or in the KDC's database, if its
|
||||
doesn't exists in the local keytab or in the KDC's database, if it's
|
||||
true, the error will be ignored. Note that this use is possible
|
||||
insecure.
|
||||
.Sh SEE ALSO
|
||||
|
@@ -139,7 +139,7 @@ structure wont be exported.
|
||||
resets all opt to default values.
|
||||
.Pp
|
||||
None of the krb5_verify_opt_set function makes a copy of the data
|
||||
structure that they are called with. Its up the caller to free them
|
||||
structure that they are called with. It's up the caller to free them
|
||||
after the
|
||||
.Fn krb5_verify_user_opt
|
||||
is called.
|
||||
|
@@ -137,7 +137,7 @@ check_transited(krb5_context context, Ticket *ticket, EncTicketPart *enc)
|
||||
krb5_error_code ret;
|
||||
|
||||
/*
|
||||
* Windows 2000 and 2003 uses this inside their TGT so its normaly
|
||||
* Windows 2000 and 2003 uses this inside their TGT so it's normaly
|
||||
* not seen by others, however, samba4 joined with a Windows AD as
|
||||
* a Domain Controller gets exposed to this.
|
||||
*/
|
||||
|
@@ -838,8 +838,8 @@ krb5_ret_creds(krb5_storage *sp, krb5_creds *creds)
|
||||
if(ret) goto cleanup;
|
||||
/*
|
||||
* Runtime detect the what is the higher bits of the bitfield. If
|
||||
* any of the higher bits are set in the input data, its either a
|
||||
* new ticket flag (and this code need to be removed), or its a
|
||||
* any of the higher bits are set in the input data, it's either a
|
||||
* new ticket flag (and this code need to be removed), or it's a
|
||||
* MIT cache (or new Heimdal cache), lets change it to our current
|
||||
* format.
|
||||
*/
|
||||
@@ -993,8 +993,8 @@ krb5_ret_creds_tag(krb5_storage *sp,
|
||||
if(ret) goto cleanup;
|
||||
/*
|
||||
* Runtime detect the what is the higher bits of the bitfield. If
|
||||
* any of the higher bits are set in the input data, its either a
|
||||
* new ticket flag (and this code need to be removed), or its a
|
||||
* any of the higher bits are set in the input data, it's either a
|
||||
* new ticket flag (and this code need to be removed), or it's a
|
||||
* MIT cache (or new Heimdal cache), lets change it to our current
|
||||
* format.
|
||||
*/
|
||||
|
@@ -82,8 +82,8 @@ test_default_name(krb5_context context)
|
||||
}
|
||||
|
||||
/*
|
||||
* Check that a closed cc still keeps it data and that its no longer
|
||||
* there when its destroyed.
|
||||
* Check that a closed cc still keeps it data and that it's no longer
|
||||
* there when it's destroyed.
|
||||
*/
|
||||
|
||||
static void
|
||||
|
@@ -36,8 +36,8 @@
|
||||
RCSID("$Id$");
|
||||
|
||||
/*
|
||||
* Check that a closed cc still keeps it data and that its no longer
|
||||
* there when its destroyed.
|
||||
* Check that a closed cc still keeps it data and that it's no longer
|
||||
* there when it's destroyed.
|
||||
*/
|
||||
|
||||
static void
|
||||
|
@@ -599,7 +599,7 @@ _krb5_krb_cr_err_reply(krb5_context context,
|
||||
RCHECK(ret, krb5_store_int8(sp, AUTH_MSG_ERR_REPLY), error);
|
||||
RCHECK(ret, put_nir(sp, name, inst, realm), error);
|
||||
RCHECK(ret, krb5_store_int32(sp, time_ws), error);
|
||||
/* If its a Kerberos 4 error-code, remove the et BASE */
|
||||
/* If it is a Kerberos 4 error-code, remove the et BASE */
|
||||
if (e >= ERROR_TABLE_BASE_krb && e <= ERROR_TABLE_BASE_krb + 255)
|
||||
e -= ERROR_TABLE_BASE_krb;
|
||||
RCHECK(ret, krb5_store_int32(sp, e), error);
|
||||
|
Reference in New Issue
Block a user