krb5: Fix code spelling

Signed-off-by: Joseph Sutton <josephsutton@catalyst.net.nz>
This commit is contained in:
Joseph Sutton
2023-06-21 16:21:55 +12:00
committed by Jeffrey Altman
parent 7369cbd11c
commit a4b4e982f3
4 changed files with 40 additions and 40 deletions

View File

@@ -3120,8 +3120,8 @@ krb5_crypto_prfplus(krb5_context context,
* @param context Kerberos 5 context
* @param crypto1 first key to combine
* @param crypto2 second key to combine
* @param pepper1 factor to combine with first key to garante uniqueness
* @param pepper2 factor to combine with second key to garante uniqueness
* @param pepper1 factor to combine with first key to guarantee uniqueness
* @param pepper2 factor to combine with second key to guarantee uniqueness
* @param enctype the encryption type of the resulting key
* @param res allocated key, free with krb5_free_keyblock_contents()
*
@@ -3184,7 +3184,7 @@ _krb5_crypto_set_flags(krb5_context context,
#ifndef HEIMDAL_SMALLER
/**
* Deprecated: keytypes doesn't exists, they are really enctypes.
* Deprecated: keytypes don't exist, they are really enctypes.
*
* @ingroup krb5_deprecated
*/
@@ -3228,7 +3228,7 @@ krb5_keytype_to_enctypes (krb5_context context,
}
/**
* Deprecated: keytypes doesn't exists, they are really enctypes.
* Deprecated: keytypes don't exist, they are really enctypes.
*
* @ingroup krb5_deprecated
*/

View File

@@ -1602,9 +1602,9 @@ enc_chal_step(krb5_context context, krb5_init_creds_context ctx, void *pa_ctx, P
ppaid = process_pa_info(context, ctx->cred.client, a, &paid, in_md);
/*
* If we don't have ppaid, ts because the KDC have not sent any
* salt info, lets to the first roundtrip so the KDC have a chance
* to send any.
* If we don't have ppaid, it's because the KDC has not sent any
* salt info. Let's do the first roundtrip so the KDC has a chance
* to send some.
*/
if (ppaid == NULL) {
_krb5_debug(context, 5, "no ppaid found");
@@ -1760,7 +1760,7 @@ enc_ts_step(krb5_context context, krb5_init_creds_context ctx, void *pa_ctx, PA_
if (rep) {
/*
* Some KDC's don't send salt info in the reply when there is
* success pre-auth happned before, so use cached copy (or
* success pre-auth happened before, so use cached copy (or
* even better, if there is just one pre-auth, save reply-key).
*/
if (ppaid == NULL && ctx->paid.etype != KRB5_ENCTYPE_NULL) {
@@ -1779,15 +1779,15 @@ enc_ts_step(krb5_context context, krb5_init_creds_context ctx, void *pa_ctx, PA_
}
/*
* If we don't have ppaid, ts because the KDC have not sent any
* salt info, lets to the first roundtrip so the KDC have a chance
* to send any.
* If we don't have ppaid, it's because the KDC has not sent any
* salt info. Let's do the first roundtrip so the KDC has a chance
* to send some.
*
* Don't bother guessing, it sounds like a good idea until you run
* into KDCs that are doing failed auth counting based on the
* ENC_TS tries.
*
* Stashing the salt for the next run is a diffrent issue and
* Stashing the salt for the next run is a different issue and
* could be considered in the future.
*/
@@ -1805,10 +1805,10 @@ enc_ts_step(krb5_context context, krb5_init_creds_context ctx, void *pa_ctx, PA_
/*
* We have to allow the KDC to re-negotiate the PA-TS data
* once, this is since the in the case of a windows read only
* once, this is since a windows read only
* KDC that doesn't have the keys simply guesses what the
* master is supposed to support. In the case where this
* breaks in when the RO-KDC is a newer version the the RW-KDC
* master is supposed to support. The case where this
* breaks is when the RO-KDC is a newer version than the RW-KDC
* and the RO-KDC announced a enctype that the older doesn't
* support.
*/
@@ -1958,7 +1958,7 @@ static const struct patype {
*/
pa_restart_f restart;
/**
* Return 0 if the when complete, HEIM_ERR_PA_CONTINUE_NEEDED if more steps are require
* Return 0 when complete, HEIM_ERR_PA_CONTINUE_NEEDED if more steps are required
*/
pa_step_f step;
pa_release_f release;
@@ -2522,7 +2522,7 @@ krb5_init_creds_init(krb5_context context,
/* FIXME should generate a new nonce for each AS-REQ */
krb5_generate_random_block (&ctx->nonce, sizeof(ctx->nonce));
ctx->nonce &= 0x7fffffff;
/* XXX these just needs to be the same when using Windows PK-INIT */
/* XXX these just need to be the same when using Windows PK-INIT */
ctx->pk_nonce = ctx->nonce;
ctx->prompter = prompter;
@@ -2748,8 +2748,8 @@ krb5_init_creds_set_keytab(krb5_context context,
ctx->keyproc = keytab_key_proc;
/*
* We need to the KDC what enctypes we support for this keytab,
* esp if the keytab is really a password based entry, then the
* We need to tell the KDC what enctypes we support for this keytab,
* especially if the keytab is really a password based entry, then the
* KDC might have more enctypes in the database then what we have
* in the keytab.
*/
@@ -2766,7 +2766,7 @@ krb5_init_creds_set_keytab(krb5_context context,
found = 1;
/* check if we ahve this kvno already */
/* check if we have this kvno already */
if (entry.vno > kvno) {
/* remove old list of etype */
if (etypes)
@@ -3239,7 +3239,7 @@ init_creds_step(krb5_context context,
ref_realm);
/*
* If its a krbtgt, lets updat the requested krbtgt too
* If its a krbtgt, lets update the requested krbtgt too
*/
if (krb5_principal_is_krbtgt(context, ctx->cred.server)) {

View File

@@ -151,7 +151,7 @@ static const struct heim_type_data pac_object = {
/*
* Returns the size of the PACTYPE header + the PAC_INFO_BUFFER array. This is
* also the end of the whole thing, and any offsets to buffers from
* thePAC_INFO_BUFFER[] entries have to be beyond it.
* the PAC_INFO_BUFFER[] entries have to be beyond it.
*/
static krb5_error_code
pac_header_size(krb5_context context, uint32_t num_buffers, uint32_t *result)
@@ -724,7 +724,7 @@ verify_checksum(krb5_context context,
* http://comments.gmane.org/gmane.comp.encryption.kerberos.devel/8743
* for the same issue in MIT, and
* http://blogs.msdn.com/b/openspecification/archive/2010/01/01/verifying-the-server-signature-in-kerberos-privilege-account-certificate.aspx
* for Microsoft's explaination */
* for Microsoft's explanation */
if (cksum.cksumtype == CKSUMTYPE_HMAC_MD5) {
Checksum local_checksum;

View File

@@ -178,7 +178,7 @@ krb5_storage_seek(krb5_storage *sp, off_t offset, int whence)
* Truncate the storage buffer in sp to offset.
*
* @param sp the storage buffer to truncate.
* @param offset the offset to truncate too.
* @param offset the offset to truncate to.
*
* @return An Kerberos 5 error code.
*
@@ -440,7 +440,7 @@ krb5_store_int(krb5_storage *sp,
* Store a int32 to storage, byte order is controlled by the settings
* on the storage, see krb5_storage_set_byteorder().
*
* @param sp the storage to write too
* @param sp the storage to write to
* @param value the value to store
*
* @return 0 for success, or a Kerberos 5 error code on failure.
@@ -463,7 +463,7 @@ krb5_store_int32(krb5_storage *sp,
* Store a int64 to storage, byte order is controlled by the settings
* on the storage, see krb5_storage_set_byteorder().
*
* @param sp the storage to write too
* @param sp the storage to write to
* @param value the value to store
*
* @return 0 for success, or a Kerberos 5 error code on failure.
@@ -490,7 +490,7 @@ krb5_store_int64(krb5_storage *sp,
* Store a uint32 to storage, byte order is controlled by the settings
* on the storage, see krb5_storage_set_byteorder().
*
* @param sp the storage to write too
* @param sp the storage to write to
* @param value the value to store
*
* @return 0 for success, or a Kerberos 5 error code on failure.
@@ -509,7 +509,7 @@ krb5_store_uint32(krb5_storage *sp,
* Store a uint64 to storage, byte order is controlled by the settings
* on the storage, see krb5_storage_set_byteorder().
*
* @param sp the storage to write too
* @param sp the storage to write to
* @param value the value to store
*
* @return 0 for success, or a Kerberos 5 error code on failure.
@@ -570,7 +570,7 @@ krb5_ret_int(krb5_storage *sp,
* Read a int64 from storage, byte order is controlled by the settings
* on the storage, see krb5_storage_set_byteorder().
*
* @param sp the storage to write too
* @param sp the storage to write to
* @param value the value read from the buffer
*
* @return 0 for success, or a Kerberos 5 error code on failure.
@@ -600,7 +600,7 @@ krb5_ret_int64(krb5_storage *sp,
* Read a uint64 from storage, byte order is controlled by the settings
* on the storage, see krb5_storage_set_byteorder().
*
* @param sp the storage to write too
* @param sp the storage to write to
* @param value the value read from the buffer
*
* @return 0 for success, or a Kerberos 5 error code on failure.
@@ -626,7 +626,7 @@ krb5_ret_uint64(krb5_storage *sp,
* Read a int32 from storage, byte order is controlled by the settings
* on the storage, see krb5_storage_set_byteorder().
*
* @param sp the storage to write too
* @param sp the storage to write to
* @param value the value read from the buffer
*
* @return 0 for success, or a Kerberos 5 error code on failure.
@@ -655,7 +655,7 @@ krb5_ret_int32(krb5_storage *sp,
* Read a uint32 from storage, byte order is controlled by the settings
* on the storage, see krb5_storage_set_byteorder().
*
* @param sp the storage to write too
* @param sp the storage to write to
* @param value the value read from the buffer
*
* @return 0 for success, or a Kerberos 5 error code on failure.
@@ -680,7 +680,7 @@ krb5_ret_uint32(krb5_storage *sp, uint32_t *value)
* Store a int16 to storage, byte order is controlled by the settings
* on the storage, see krb5_storage_set_byteorder().
*
* @param sp the storage to write too
* @param sp the storage to write to
* @param value the value to store
*
* @return 0 for success, or a Kerberos 5 error code on failure.
@@ -703,7 +703,7 @@ krb5_store_int16(krb5_storage *sp,
* Store a uint16 to storage, byte order is controlled by the settings
* on the storage, see krb5_storage_set_byteorder().
*
* @param sp the storage to write too
* @param sp the storage to write to
* @param value the value to store
*
* @return 0 for success, or a Kerberos 5 error code on failure.
@@ -722,7 +722,7 @@ krb5_store_uint16(krb5_storage *sp,
* Read a int16 from storage, byte order is controlled by the settings
* on the storage, see krb5_storage_set_byteorder().
*
* @param sp the storage to write too
* @param sp the storage to write to
* @param value the value read from the buffer
*
* @return 0 for success, or a Kerberos 5 error code on failure.
@@ -751,7 +751,7 @@ krb5_ret_int16(krb5_storage *sp,
* Read a int16 from storage, byte order is controlled by the settings
* on the storage, see krb5_storage_set_byteorder().
*
* @param sp the storage to write too
* @param sp the storage to write to
* @param value the value read from the buffer
*
* @return 0 for success, or a Kerberos 5 error code on failure.
@@ -776,7 +776,7 @@ krb5_ret_uint16(krb5_storage *sp,
/**
* Store a int8 to storage.
*
* @param sp the storage to write too
* @param sp the storage to write to
* @param value the value to store
*
* @return 0 for success, or a Kerberos 5 error code on failure.
@@ -799,7 +799,7 @@ krb5_store_int8(krb5_storage *sp,
/**
* Store a uint8 to storage.
*
* @param sp the storage to write too
* @param sp the storage to write to
* @param value the value to store
*
* @return 0 for success, or a Kerberos 5 error code on failure.
@@ -817,7 +817,7 @@ krb5_store_uint8(krb5_storage *sp,
/**
* Read a int8 from storage
*
* @param sp the storage to write too
* @param sp the storage to write to
* @param value the value read from the buffer
*
* @return 0 for success, or a Kerberos 5 error code on failure.
@@ -840,7 +840,7 @@ krb5_ret_int8(krb5_storage *sp,
/**
* Read a uint8 from storage
*
* @param sp the storage to write too
* @param sp the storage to write to
* @param value the value read from the buffer
*
* @return 0 for success, or a Kerberos 5 error code on failure.