Fix some typos.

This commit is contained in:
Jelmer Vernooij
2014-04-25 02:36:25 +02:00
parent 80a514219f
commit 70e43e9808
28 changed files with 47 additions and 47 deletions

View File

@@ -192,7 +192,7 @@ setpeer(int argc, char **argv)
if (overbose && if (overbose &&
!strncmp(reply_string, "215 TOPS20", 10)) !strncmp(reply_string, "215 TOPS20", 10))
printf( printf(
"Remember to set tenex mode when transfering binary files from this machine.\n"); "Remember to set tenex mode when transferring binary files from this machine.\n");
} }
verbose = overbose; verbose = overbose;
#endif /* unix */ #endif /* unix */

View File

@@ -206,7 +206,7 @@ current remote machine working directory.
Change the permission modes of the file Change the permission modes of the file
.Ar file-name .Ar file-name
on the remote on the remote
sytem to system to
.Ar mode . .Ar mode .
.It Ic close .It Ic close
Terminate the Terminate the

View File

@@ -31,7 +31,7 @@ or
.It .It
The second field is a comma separated list of users or groups for The second field is a comma separated list of users or groups for
which the current entry applies. NIS netgroups can used (if which the current entry applies. NIS netgroups can used (if
configured) if preceeded by @. The magic string ALL matches all users. configured) if preceded by @. The magic string ALL matches all users.
A group will match if the user is a member of that group, or it is the A group will match if the user is a member of that group, or it is the
user's primary group. user's primary group.
.It .It

View File

@@ -350,7 +350,7 @@ main (int argc, char **argv)
errx (1, "Only root can set an initial OTP"); errx (1, "Only root can set an initial OTP");
} else { /* Check the next OTP (RFC 1938/8.0: SHOULD) */ } else { /* Check the next OTP (RFC 1938/8.0: SHOULD) */
if (verify_user_otp(user) != 0) { if (verify_user_otp(user) != 0) {
errx (1, "User authentification failed"); errx (1, "User authentication failed");
} }
} }
} }

View File

@@ -458,7 +458,7 @@ main(int argc, char **argv)
for (j = 0; j < i; j++) { for (j = 0; j < i; j++) {
char *p = strchr(newenv[j], '='); char *p = strchr(newenv[j], '=');
if (p == NULL) if (p == NULL)
errx(1, "enviroment '%s' missing '='", newenv[j]); errx(1, "environment '%s' missing '='", newenv[j]);
*p++ = 0; *p++ = 0;
esetenv (newenv[j], p, 1); esetenv (newenv[j], p, 1);
} }

View File

@@ -108,7 +108,7 @@ SRV-record for your realm, or your Kerberos server has DNS CNAME
@cindex KRB5_CONFIG @cindex KRB5_CONFIG
If you want to use a different configuration file then the default you If you want to use a different configuration file then the default you
can point a file with the enviroment variable @samp{KRB5_CONFIG}. can point a file with the environment variable @samp{KRB5_CONFIG}.
@example @example
env KRB5_CONFIG=$HOME/etc/krb5.conf kinit user@@REALM env KRB5_CONFIG=$HOME/etc/krb5.conf kinit user@@REALM
@@ -1295,21 +1295,21 @@ the mapping in the principals entry in the kerberos database.
This and following subsection documents the requirements on the KDC This and following subsection documents the requirements on the KDC
and client certificates and the format used in the id-pkinit-san and client certificates and the format used in the id-pkinit-san
OtherName extention. OtherName extension.
On how to create certificates, you should read @ref{Use OpenSSL to On how to create certificates, you should read @ref{Use OpenSSL to
create certificates}. create certificates}.
@subsection KDC certificate @subsection KDC certificate
The certificate for the KDC has serveral requirements. The certificate for the KDC has several requirements.
First, the certificate should have an Extended Key Usage (EKU) First, the certificate should have an Extended Key Usage (EKU)
id-pkkdcekuoid (1.3.6.1.5.2.3.5) set. Second, there must be a id-pkkdcekuoid (1.3.6.1.5.2.3.5) set. Second, there must be a
subjectAltName otherName using OID id-pkinit-san (1.3.6.1.5.2.2) in subjectAltName otherName using OID id-pkinit-san (1.3.6.1.5.2.2) in
the type field and a DER encoded KRB5PrincipalName that matches the the type field and a DER encoded KRB5PrincipalName that matches the
name of the TGS of the target realm. Also, if the certificate has a name of the TGS of the target realm. Also, if the certificate has a
nameConstraints extention with a Generalname with dNSName or iPAdress, nameConstraints extension with a Generalname with dNSName or iPAdress,
it must match the hostname or adress of the KDC. it must match the hostname or adress of the KDC.
The client is not required by the standard to check the server The client is not required by the standard to check the server
@@ -1343,7 +1343,7 @@ This behavior is controlled by KDC configuration option:
@subsubsection Using KRB5PrincipalName in id-pkinit-san @subsubsection Using KRB5PrincipalName in id-pkinit-san
The OtherName extention in the GeneralName is used to do the mapping The OtherName extension in the GeneralName is used to do the mapping
between certificate and principal. For the KDC certificate, this between certificate and principal. For the KDC certificate, this
stores the krbtgt principal name for that KDC. For the client stores the krbtgt principal name for that KDC. For the client
certificate, this stores the principal for which that certificate is certificate, this stores the principal for which that certificate is

View File

@@ -95,7 +95,7 @@
is a process based credential cache. is a process based credential cache.
To use it, set the To use it, set the
.Ev KRB5CCNAME .Ev KRB5CCNAME
enviroment variable to environment variable to
.Ql KCM: Ns Ar uid .Ql KCM: Ns Ar uid
or add the stanza or add the stanza
.Bd -literal .Bd -literal

View File

@@ -554,7 +554,7 @@ the default syntax is used for all mechanism the GSS-API
implementation supports. implementation supports.
When compare the imported name of When compare the imported name of
.Dv GSS_C_NO_OID .Dv GSS_C_NO_OID
it may match serveral mechanism names (MN). it may match several mechanism names (MN).
.Pp .Pp
The resulting name from The resulting name from
.Fn gss_display_name .Fn gss_display_name
@@ -584,7 +584,7 @@ Information is available even after the context have expired.
.Fa lifetime_rec .Fa lifetime_rec
argument is set to argument is set to
.Dv GSS_C_INDEFINITE .Dv GSS_C_INDEFINITE
(dont expire) or the number of seconds that the context is still valid. (don't expire) or the number of seconds that the context is still valid.
A value of 0 means that the context is expired. A value of 0 means that the context is expired.
.Fa mech_type .Fa mech_type
argument should be considered readonly and must not be released. argument should be considered readonly and must not be released.

View File

@@ -546,7 +546,7 @@ main(int argc, char **argv)
else if (strcmp(type_string, "krb5-principal-name") == 0) else if (strcmp(type_string, "krb5-principal-name") == 0)
nameoid = GSS_KRB5_NT_PRINCIPAL_NAME; nameoid = GSS_KRB5_NT_PRINCIPAL_NAME;
else else
errx(1, "%s not suppported", type_string); errx(1, "%s not supported", type_string);
if (mech_string == NULL) if (mech_string == NULL)
mechoid = GSS_KRB5_MECHANISM; mechoid = GSS_KRB5_MECHANISM;

View File

@@ -92,7 +92,7 @@ done
# #
# Last time we run is w/o HOME and RANDFILE to make sure we can do # Last time we run is w/o HOME and RANDFILE to make sure we can do
# RAND_file_name() when the enviroment is lacking those. # RAND_file_name() when the environment is lacking those.
# #
if [ -r /dev/random -o -r /dev/urandom -o -r /dev/srandom -o -r /dev/arandom ] ; then if [ -r /dev/random -o -r /dev/urandom -o -r /dev/srandom -o -r /dev/arandom ] ; then

View File

@@ -101,7 +101,7 @@ hdb_replace_extension(krb5_context context,
ext2 = hdb_find_extension(entry, ext->data.element); ext2 = hdb_find_extension(entry, ext->data.element);
} else { } else {
/* /*
* This is an unknown extention, and we are asked to replace a * This is an unknown extension, and we are asked to replace a
* possible entry in `entry' that is of the same type. This * possible entry in `entry' that is of the same type. This
* might seem impossible, but ASN.1 CHOICE comes to our * might seem impossible, but ASN.1 CHOICE comes to our
* rescue. The first tag in each branch in the CHOICE is * rescue. The first tag in each branch in the CHOICE is
@@ -120,7 +120,7 @@ hdb_replace_extension(krb5_context context,
&size); &size);
if (ret) { if (ret) {
krb5_set_error_message(context, ret, "hdb: failed to decode " krb5_set_error_message(context, ret, "hdb: failed to decode "
"replacement hdb extention"); "replacement hdb extension");
return ret; return ret;
} }
@@ -136,7 +136,7 @@ hdb_replace_extension(krb5_context context,
&size); &size);
if (ret) { if (ret) {
krb5_set_error_message(context, ret, "hdb: failed to decode " krb5_set_error_message(context, ret, "hdb: failed to decode "
"present hdb extention"); "present hdb extension");
return ret; return ret;
} }
@@ -153,7 +153,7 @@ hdb_replace_extension(krb5_context context,
ret = copy_HDB_extension(ext, ext2); ret = copy_HDB_extension(ext, ext2);
if (ret) if (ret)
krb5_set_error_message(context, ret, "hdb: failed to copy replacement " krb5_set_error_message(context, ret, "hdb: failed to copy replacement "
"hdb extention"); "hdb extension");
return ret; return ret;
} }

View File

@@ -892,7 +892,7 @@ hx509_ca_tbs_set_unique(hx509_context context,
* *
* @param context A hx509 context. * @param context A hx509 context.
* @param tbs object to be signed. * @param tbs object to be signed.
* @param env enviroment variable to expand variables in the subject * @param env environment variable to expand variables in the subject
* name, see hx509_env_init(). * name, see hx509_env_init().
* *
* @return An hx509 error code, see hx509_get_error_string(). * @return An hx509 error code, see hx509_get_error_string().

View File

@@ -82,7 +82,7 @@ certs = .
[req] [req]
distinguished_name = req_distinguished_name distinguished_name = req_distinguished_name
x509_extensions = v3_ca # The extentions to add to the self signed cert x509_extensions = v3_ca # The extensions to add to the self signed cert
string_mask = utf8only string_mask = utf8only

View File

@@ -82,4 +82,4 @@
* See the @ref page_ca for description and examples. */ * See the @ref page_ca for description and examples. */
/** @defgroup hx509_peer hx509 certificate selecting functions */ /** @defgroup hx509_peer hx509 certificate selecting functions */
/** @defgroup hx509_print hx509 printing functions */ /** @defgroup hx509_print hx509 printing functions */
/** @defgroup hx509_env hx509 enviroment functions */ /** @defgroup hx509_env hx509 environment functions */

View File

@@ -34,7 +34,7 @@
#include "hx_locl.h" #include "hx_locl.h"
/** /**
* @page page_env Hx509 enviroment functions * @page page_env Hx509 environment functions
* *
* See the library functions here: @ref hx509_env * See the library functions here: @ref hx509_env
*/ */
@@ -43,7 +43,7 @@
* Add a new key/value pair to the hx509_env. * Add a new key/value pair to the hx509_env.
* *
* @param context A hx509 context. * @param context A hx509 context.
* @param env enviroment to add the enviroment variable too. * @param env environment to add the environment variable too.
* @param key key to add * @param key key to add
* @param value value to add * @param value value to add
* *
@@ -94,7 +94,7 @@ hx509_env_add(hx509_context context, hx509_env *env,
* Add a new key/binding pair to the hx509_env. * Add a new key/binding pair to the hx509_env.
* *
* @param context A hx509 context. * @param context A hx509 context.
* @param env enviroment to add the enviroment variable too. * @param env environment to add the environment variable too.
* @param key key to add * @param key key to add
* @param list binding list to add * @param list binding list to add
* *
@@ -141,7 +141,7 @@ hx509_env_add_binding(hx509_context context, hx509_env *env,
* Search the hx509_env for a length based key. * Search the hx509_env for a length based key.
* *
* @param context A hx509 context. * @param context A hx509 context.
* @param env enviroment to add the enviroment variable too. * @param env environment to add the environment variable too.
* @param key key to search for. * @param key key to search for.
* @param len length of key. * @param len length of key.
* *
@@ -167,7 +167,7 @@ hx509_env_lfind(hx509_context context, hx509_env env,
* Search the hx509_env for a key. * Search the hx509_env for a key.
* *
* @param context A hx509 context. * @param context A hx509 context.
* @param env enviroment to add the enviroment variable too. * @param env environment to add the environment variable too.
* @param key key to search for. * @param key key to search for.
* *
* @return the value if the key is found, NULL otherwise. * @return the value if the key is found, NULL otherwise.
@@ -190,7 +190,7 @@ hx509_env_find(hx509_context context, hx509_env env, const char *key)
* Search the hx509_env for a binding. * Search the hx509_env for a binding.
* *
* @param context A hx509 context. * @param context A hx509 context.
* @param env enviroment to add the enviroment variable too. * @param env environment to add the environment variable too.
* @param key key to search for. * @param key key to search for.
* *
* @return the binding if the key is found, NULL if not found. * @return the binding if the key is found, NULL if not found.
@@ -229,9 +229,9 @@ env_free(hx509_env b)
} }
/** /**
* Free an hx509_env enviroment context. * Free an hx509_env environment context.
* *
* @param env the enviroment to free. * @param env the environment to free.
* *
* @ingroup hx509_env * @ingroup hx509_env
*/ */

View File

@@ -107,7 +107,7 @@ command = {
option = { option = {
long = "embedded-certs" long = "embedded-certs"
type = "-flag" type = "-flag"
help = "dont embedded certficiates" help = "don't embed certificates"
} }
option = { option = {
long = "embed-leaf-only" long = "embed-leaf-only"

View File

@@ -1935,7 +1935,7 @@ hxtool_ca(struct certificate_sign_options *opt, int argc, char **argv)
else if (strcasecmp(opt->signature_algorithm_string, "rsa-with-sha256") == 0) else if (strcasecmp(opt->signature_algorithm_string, "rsa-with-sha256") == 0)
sigalg = hx509_signature_rsa_with_sha256(); sigalg = hx509_signature_rsa_with_sha256();
else else
errx(1, "unsupported sigature algorith"); errx(1, "unsupported sigature algorithm");
hx509_ca_tbs_set_signature_algorithm(context, tbs, sigalg); hx509_ca_tbs_set_signature_algorithm(context, tbs, sigalg);
} }

View File

@@ -969,7 +969,7 @@ hx509_validate_cert(hx509_context context,
} }
validate_print(ctx, validate_print(ctx,
HX509_VALIDATE_F_VALIDATE|HX509_VALIDATE_F_VERBOSE, HX509_VALIDATE_F_VALIDATE|HX509_VALIDATE_F_VERBOSE,
"checking extention: %s\n", "checking extension: %s\n",
check_extension[j].name); check_extension[j].name);
(*check_extension[j].func)(ctx, (*check_extension[j].func)(ctx,
&status, &status,
@@ -977,7 +977,7 @@ hx509_validate_cert(hx509_context context,
&t->extensions->val[i]); &t->extensions->val[i]);
} }
} else } else
validate_print(ctx, HX509_VALIDATE_F_VERBOSE, "no extentions\n"); validate_print(ctx, HX509_VALIDATE_F_VERBOSE, "no extensions\n");
if (status.isca) { if (status.isca) {
if (!status.haveSKI) if (!status.haveSKI)

View File

@@ -236,7 +236,7 @@ int krb5_dfs_getpag()
* user. * user.
* *
* And it should be called before access to the home directory * And it should be called before access to the home directory
* as this may be in DFS, not accessable by root, and require * as this may be in DFS, not accessible by root, and require
* the PAG to have been setup. * the PAG to have been setup.
* *
* The krb5_afs_pag can be called after this routine to * The krb5_afs_pag can be called after this routine to

View File

@@ -87,7 +87,7 @@ the above three. Plugins are typically invoked in no particular order
until one succeeds or fails, or all return a special return value such until one succeeds or fails, or all return a special return value such
as KRB5_PLUGIN_NO_HANDLE to indicate that the plugin was not applicable. as KRB5_PLUGIN_NO_HANDLE to indicate that the plugin was not applicable.
Most plugin types obtain deterministic plugin behavior in spite of the Most plugin types obtain deterministic plugin behavior in spite of the
non-deterministic invokation order by, for example, invoking all plugins non-deterministic invocation order by, for example, invoking all plugins
for each "rule" and passing the rule to each plugin with the expectation for each "rule" and passing the rule to each plugin with the expectation
that just one plugin will match any given rule. that just one plugin will match any given rule.
.Pp .Pp

View File

@@ -168,7 +168,7 @@ The functions starting with krb5_c are compat functions with MIT kerberos.
The The
.Li krb5_enc_data .Li krb5_enc_data
structure holds and encrypted data. structure holds and encrypted data.
There are two public accessable members of There are two public accessible members of
.Li krb5_enc_data . .Li krb5_enc_data .
.Li enctype .Li enctype
that holds the encryption type of the data encrypted and that holds the encryption type of the data encrypted and

View File

@@ -64,7 +64,7 @@
.Nm krb5_digest_get_tickets , .Nm krb5_digest_get_tickets ,
.Nm krb5_digest_get_client_binding , .Nm krb5_digest_get_client_binding ,
.Nm krb5_digest_get_a1_hash .Nm krb5_digest_get_a1_hash
.Nd remote digest (HTTP-DIGEST, SASL, CHAP) suppport .Nd remote digest (HTTP-DIGEST, SASL, CHAP) support
.Sh LIBRARY .Sh LIBRARY
Kerberos 5 Library (libkrb5, -lkrb5) Kerberos 5 Library (libkrb5, -lkrb5)
.Sh SYNOPSIS .Sh SYNOPSIS

View File

@@ -318,7 +318,7 @@ krb5_addlog_dest(krb5_context context, krb5_log_facility *f, const char *orig)
if(i < 0) { if(i < 0) {
ret = errno; ret = errno;
krb5_set_error_message(context, ret, krb5_set_error_message(context, ret,
N_("open(%s) logile: %s", ""), fn, N_("open(%s) logfile: %s", ""), fn,
strerror(ret)); strerror(ret));
free(fn); free(fn);
return ret; return ret;

View File

@@ -334,7 +334,7 @@ the options come in the correct order.
.Pp .Pp
Options with multiple arguments should be handled better. Options with multiple arguments should be handled better.
.Pp .Pp
Should be integreated with SL. Should be integrated with SL.
.Pp .Pp
It's very confusing that the struct you pass in is called getargS. It's very confusing that the struct you pass in is called getargS.
.Sh SEE ALSO .Sh SEE ALSO

View File

@@ -24892,7 +24892,7 @@ static int openDirectory(const char*, int*);
** to all overrideable system calls. ** to all overrideable system calls.
*/ */
static struct unix_syscall { static struct unix_syscall {
const char *zName; /* Name of the sytem call */ const char *zName; /* Name of the system call */
sqlite3_syscall_ptr pCurrent; /* Current value of the system call */ sqlite3_syscall_ptr pCurrent; /* Current value of the system call */
sqlite3_syscall_ptr pDefault; /* Default value */ sqlite3_syscall_ptr pDefault; /* Default value */
} aSyscall[] = { } aSyscall[] = {

View File

@@ -1144,7 +1144,7 @@ msgstr ""
#: lib/krb5/log.c:311 #: lib/krb5/log.c:311
#, c-format #, c-format
msgid "open(%s) logile: %s" msgid "open(%s) logfile: %s"
msgstr "" msgstr ""
#: lib/krb5/log.c:322 #: lib/krb5/log.c:322

View File

@@ -1126,7 +1126,7 @@ msgstr ""
#: lib/krb5/log.c:311 #: lib/krb5/log.c:311
#, c-format #, c-format
msgid "open(%s) logile: %s" msgid "open(%s) logfile: %s"
msgstr "" msgstr ""
#: lib/krb5/log.c:322 #: lib/krb5/log.c:322

View File

@@ -78,7 +78,7 @@ cmp out-current-db-sort out-current-db2-sort || exit 1
rm -f current-db* rm -f current-db*
# check with no extentions # check with no extensions
${kadmin} load ${srcdir}/text-dump-0.7 || exit 1 ${kadmin} load ${srcdir}/text-dump-0.7 || exit 1
${propdb} > db-dump.tmp|| exit 1 ${propdb} > db-dump.tmp|| exit 1
rm -f current-db* rm -f current-db*
@@ -88,7 +88,7 @@ sort < ${srcdir}/text-dump-0.7 | \
sed 's/[0-9]*$//' > out-text-dump-0.7-orig || exit 1 sed 's/[0-9]*$//' > out-text-dump-0.7-orig || exit 1
cmp out-text-dump-0.7-orig out-text-dump-0.7 || exit 1 cmp out-text-dump-0.7-orig out-text-dump-0.7 || exit 1
# check with no extentions # check with no extensions
${kadmin} load ${srcdir}/text-dump-no-ext || exit 1 ${kadmin} load ${srcdir}/text-dump-no-ext || exit 1
${propdb} > db-dump.tmp || exit 1 ${propdb} > db-dump.tmp || exit 1
${propddb} < db-dump.tmp || exit 1 ${propddb} < db-dump.tmp || exit 1
@@ -98,7 +98,7 @@ sort < ${srcdir}/text-dump-no-ext | \
awk '{$11=""; print;}' > out-text-dump-no-ext-orig || exit 1 awk '{$11=""; print;}' > out-text-dump-no-ext-orig || exit 1
cmp out-text-dump-no-ext-orig out-text-dump-no-ext || exit 1 cmp out-text-dump-no-ext-orig out-text-dump-no-ext || exit 1
# check with known extentions # check with known extensions
${kadmin} load ${srcdir}/text-dump-known-ext || exit 1 ${kadmin} load ${srcdir}/text-dump-known-ext || exit 1
${propdb} > db-dump.tmp || exit 1 ${propdb} > db-dump.tmp || exit 1
${propddb} < db-dump.tmp || exit 1 ${propddb} < db-dump.tmp || exit 1
@@ -108,7 +108,7 @@ sort < ${srcdir}/text-dump-known-ext | \
awk '{$11=""; print;}' > out-text-dump-known-ext-orig || exit 1 awk '{$11=""; print;}' > out-text-dump-known-ext-orig || exit 1
cmp out-text-dump-known-ext-orig out-text-dump-known-ext || exit 1 cmp out-text-dump-known-ext-orig out-text-dump-known-ext || exit 1
# check with unknown extentions # check with unknown extensions
${kadmin} load ${srcdir}/text-dump-unknown-ext || exit 1 ${kadmin} load ${srcdir}/text-dump-unknown-ext || exit 1
${propdb} > db-dump.tmp || exit 1 ${propdb} > db-dump.tmp || exit 1
${propddb} < db-dump.tmp || exit 1 ${propddb} < db-dump.tmp || exit 1