its vs it\'s etc. From Bjorn Sandell

git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@22071 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
Love Hörnquist Åstrand
2007-11-14 20:04:50 +00:00
parent 21948a6f08
commit 5fed824f37
46 changed files with 74 additions and 74 deletions

View File

@@ -198,7 +198,7 @@ krb5_cc_gen_new(krb5_context context,
* the library chooses the default credential cache type. The supplied
* `hint' (that can be NULL) is a string that the credential cache
* type can use to base the name of the credential on, this is to make
* its easier for the user to differentiate the credentials.
* it easier for the user to differentiate the credentials.
*
* @return Returns 0 or an error code.
*

View File

@@ -361,7 +361,7 @@ add_file(char ***pfilenames, int *len, char *file)
}
/*
* `pq' isn't free, its up the the caller
* `pq' isn't free, it's up the the caller
*/
krb5_error_code KRB5_LIB_FUNCTION

View File

@@ -184,7 +184,7 @@ krb5_DES_schedule(krb5_context context,
#ifdef ENABLE_AFS_STRING_TO_KEY
/* This defines the Andrew string_to_key function. It accepts a password
* string as input and converts its via a one-way encryption algorithm to a DES
* string as input and converts it via a one-way encryption algorithm to a DES
* encryption key. It is compatible with the original Andrew authentication
* service password database.
*/

View File

@@ -51,7 +51,7 @@ Kerberos 5 Library (libkrb5, -lkrb5)
.Sh DESCRIPTION
This function takes a principal
.Fa name ,
verifies its in the local realm (using
verifies that it is in the local realm (using
.Fn krb5_get_default_realms )
and then returns the local name of the principal.
.Pp

View File

@@ -302,7 +302,7 @@ The supplied
(that can be
.Dv NULL )
is a string that the credential cache type can use to base the name of
the credential on, this is to make its easier for the user to
the credential on, this is to make it easier for the user to
differentiate the credentials.
The returned credential cache
.Fa id
@@ -421,7 +421,7 @@ to
.Fn krb5_cc_clear_mcred
clears the
.Fa mcreds
argument so its reset and can be used with
argument so it is reset and can be used with
.Fa krb5_cc_retrieve_cred .
.Pp
.Fn krb5_cc_retrieve_cred ,

View File

@@ -197,7 +197,7 @@ If the encryption type supports using derived keys,
.Fa usage
should be the appropriate key-usage.
.Fa ivec
is a pointer to a initial IV, its modified to the end IV at the end of
is a pointer to a initial IV, it is modified to the end IV at the end of
the round.
Ivec should be the size of
If

View File

@@ -132,7 +132,7 @@ This option doesn't store the resulting user to user credential in
the
.Fa ccache .
.It KRB5_GC_EXPIRED_OK
returns the credential even if its expired, default behavior is trying
returns the credential even if it is expired, default behavior is trying
to refetch the credential from the KDC.
.El
.Pp

View File

@@ -147,7 +147,7 @@ This options doesn't store the resulting user to user credential in
the
.Fa ccache .
.It KRB5_GC_EXPIRED_OK
returns the credential even if its expired, default behavior is trying
returns the credential even if it is expired, default behavior is trying
to refetch the credential from the KDC.
.It KRB5_GC_NO_STORE
Do not store the resulting credentials in the

View File

@@ -54,7 +54,7 @@ gets the port number for
.Fa service /
.Fa proto
pair from the global service table for and returns it in network order.
If its not found in the global table, the
If it isn't found in the global table, the
.Fa default_port
(given in host order)
is returned.

View File

@@ -475,7 +475,7 @@ Heimdal 0.7. The behavior is possible to change in with the option
.Li [libdefaults]fcc-mit-ticketflags .
Heimdal 0.7 also code to detech that ticket flags was in the wrong
order and correct them. This matters when doing delegation in GSS-API
because the client code looks at the flag to determin if its possible
because the client code looks at the flag to determin if it is possible
to do delegation if the user requested it.
.Sh SEE ALSO
.Xr krb5.conf 5 ,

View File

@@ -93,7 +93,7 @@ cleans the the structure, must be used before trying to pass it in to
.Fn krb5_verify_init_creds_opt_set_ap_req_nofail
controls controls the behavior if
.Fa ap_req_server
doesn't exists in the local keytab or in the KDC's database, if its
doesn't exists in the local keytab or in the KDC's database, if it's
true, the error will be ignored. Note that this use is possible
insecure.
.Sh SEE ALSO

View File

@@ -139,7 +139,7 @@ structure wont be exported.
resets all opt to default values.
.Pp
None of the krb5_verify_opt_set function makes a copy of the data
structure that they are called with. Its up the caller to free them
structure that they are called with. It's up the caller to free them
after the
.Fn krb5_verify_user_opt
is called.

View File

@@ -137,7 +137,7 @@ check_transited(krb5_context context, Ticket *ticket, EncTicketPart *enc)
krb5_error_code ret;
/*
* Windows 2000 and 2003 uses this inside their TGT so its normaly
* Windows 2000 and 2003 uses this inside their TGT so it's normaly
* not seen by others, however, samba4 joined with a Windows AD as
* a Domain Controller gets exposed to this.
*/

View File

@@ -838,8 +838,8 @@ krb5_ret_creds(krb5_storage *sp, krb5_creds *creds)
if(ret) goto cleanup;
/*
* Runtime detect the what is the higher bits of the bitfield. If
* any of the higher bits are set in the input data, its either a
* new ticket flag (and this code need to be removed), or its a
* any of the higher bits are set in the input data, it's either a
* new ticket flag (and this code need to be removed), or it's a
* MIT cache (or new Heimdal cache), lets change it to our current
* format.
*/
@@ -993,8 +993,8 @@ krb5_ret_creds_tag(krb5_storage *sp,
if(ret) goto cleanup;
/*
* Runtime detect the what is the higher bits of the bitfield. If
* any of the higher bits are set in the input data, its either a
* new ticket flag (and this code need to be removed), or its a
* any of the higher bits are set in the input data, it's either a
* new ticket flag (and this code need to be removed), or it's a
* MIT cache (or new Heimdal cache), lets change it to our current
* format.
*/

View File

@@ -82,8 +82,8 @@ test_default_name(krb5_context context)
}
/*
* Check that a closed cc still keeps it data and that its no longer
* there when its destroyed.
* Check that a closed cc still keeps it data and that it's no longer
* there when it's destroyed.
*/
static void

View File

@@ -36,8 +36,8 @@
RCSID("$Id$");
/*
* Check that a closed cc still keeps it data and that its no longer
* there when its destroyed.
* Check that a closed cc still keeps it data and that it's no longer
* there when it's destroyed.
*/
static void

View File

@@ -599,7 +599,7 @@ _krb5_krb_cr_err_reply(krb5_context context,
RCHECK(ret, krb5_store_int8(sp, AUTH_MSG_ERR_REPLY), error);
RCHECK(ret, put_nir(sp, name, inst, realm), error);
RCHECK(ret, krb5_store_int32(sp, time_ws), error);
/* If its a Kerberos 4 error-code, remove the et BASE */
/* If it is a Kerberos 4 error-code, remove the et BASE */
if (e >= ERROR_TABLE_BASE_krb && e <= ERROR_TABLE_BASE_krb + 255)
e -= ERROR_TABLE_BASE_krb;
RCHECK(ret, krb5_store_int32(sp, e), error);