krb5: Fix code spelling

Signed-off-by: Joseph Sutton <josephsutton@catalyst.net.nz>
This commit is contained in:
Joseph Sutton
2023-06-21 16:21:55 +12:00
committed by Jeffrey Altman
parent 7369cbd11c
commit a4b4e982f3
4 changed files with 40 additions and 40 deletions

View File

@@ -3120,8 +3120,8 @@ krb5_crypto_prfplus(krb5_context context,
* @param context Kerberos 5 context * @param context Kerberos 5 context
* @param crypto1 first key to combine * @param crypto1 first key to combine
* @param crypto2 second key to combine * @param crypto2 second key to combine
* @param pepper1 factor to combine with first key to garante uniqueness * @param pepper1 factor to combine with first key to guarantee uniqueness
* @param pepper2 factor to combine with second key to garante uniqueness * @param pepper2 factor to combine with second key to guarantee uniqueness
* @param enctype the encryption type of the resulting key * @param enctype the encryption type of the resulting key
* @param res allocated key, free with krb5_free_keyblock_contents() * @param res allocated key, free with krb5_free_keyblock_contents()
* *
@@ -3184,7 +3184,7 @@ _krb5_crypto_set_flags(krb5_context context,
#ifndef HEIMDAL_SMALLER #ifndef HEIMDAL_SMALLER
/** /**
* Deprecated: keytypes doesn't exists, they are really enctypes. * Deprecated: keytypes don't exist, they are really enctypes.
* *
* @ingroup krb5_deprecated * @ingroup krb5_deprecated
*/ */
@@ -3228,7 +3228,7 @@ krb5_keytype_to_enctypes (krb5_context context,
} }
/** /**
* Deprecated: keytypes doesn't exists, they are really enctypes. * Deprecated: keytypes don't exist, they are really enctypes.
* *
* @ingroup krb5_deprecated * @ingroup krb5_deprecated
*/ */

View File

@@ -1602,9 +1602,9 @@ enc_chal_step(krb5_context context, krb5_init_creds_context ctx, void *pa_ctx, P
ppaid = process_pa_info(context, ctx->cred.client, a, &paid, in_md); ppaid = process_pa_info(context, ctx->cred.client, a, &paid, in_md);
/* /*
* If we don't have ppaid, ts because the KDC have not sent any * If we don't have ppaid, it's because the KDC has not sent any
* salt info, lets to the first roundtrip so the KDC have a chance * salt info. Let's do the first roundtrip so the KDC has a chance
* to send any. * to send some.
*/ */
if (ppaid == NULL) { if (ppaid == NULL) {
_krb5_debug(context, 5, "no ppaid found"); _krb5_debug(context, 5, "no ppaid found");
@@ -1760,7 +1760,7 @@ enc_ts_step(krb5_context context, krb5_init_creds_context ctx, void *pa_ctx, PA_
if (rep) { if (rep) {
/* /*
* Some KDC's don't send salt info in the reply when there is * Some KDC's don't send salt info in the reply when there is
* success pre-auth happned before, so use cached copy (or * success pre-auth happened before, so use cached copy (or
* even better, if there is just one pre-auth, save reply-key). * even better, if there is just one pre-auth, save reply-key).
*/ */
if (ppaid == NULL && ctx->paid.etype != KRB5_ENCTYPE_NULL) { if (ppaid == NULL && ctx->paid.etype != KRB5_ENCTYPE_NULL) {
@@ -1779,15 +1779,15 @@ enc_ts_step(krb5_context context, krb5_init_creds_context ctx, void *pa_ctx, PA_
} }
/* /*
* If we don't have ppaid, ts because the KDC have not sent any * If we don't have ppaid, it's because the KDC has not sent any
* salt info, lets to the first roundtrip so the KDC have a chance * salt info. Let's do the first roundtrip so the KDC has a chance
* to send any. * to send some.
* *
* Don't bother guessing, it sounds like a good idea until you run * Don't bother guessing, it sounds like a good idea until you run
* into KDCs that are doing failed auth counting based on the * into KDCs that are doing failed auth counting based on the
* ENC_TS tries. * ENC_TS tries.
* *
* Stashing the salt for the next run is a diffrent issue and * Stashing the salt for the next run is a different issue and
* could be considered in the future. * could be considered in the future.
*/ */
@@ -1805,10 +1805,10 @@ enc_ts_step(krb5_context context, krb5_init_creds_context ctx, void *pa_ctx, PA_
/* /*
* We have to allow the KDC to re-negotiate the PA-TS data * We have to allow the KDC to re-negotiate the PA-TS data
* once, this is since the in the case of a windows read only * once, this is since a windows read only
* KDC that doesn't have the keys simply guesses what the * KDC that doesn't have the keys simply guesses what the
* master is supposed to support. In the case where this * master is supposed to support. The case where this
* breaks in when the RO-KDC is a newer version the the RW-KDC * breaks is when the RO-KDC is a newer version than the RW-KDC
* and the RO-KDC announced a enctype that the older doesn't * and the RO-KDC announced a enctype that the older doesn't
* support. * support.
*/ */
@@ -1958,7 +1958,7 @@ static const struct patype {
*/ */
pa_restart_f restart; pa_restart_f restart;
/** /**
* Return 0 if the when complete, HEIM_ERR_PA_CONTINUE_NEEDED if more steps are require * Return 0 when complete, HEIM_ERR_PA_CONTINUE_NEEDED if more steps are required
*/ */
pa_step_f step; pa_step_f step;
pa_release_f release; pa_release_f release;
@@ -2522,7 +2522,7 @@ krb5_init_creds_init(krb5_context context,
/* FIXME should generate a new nonce for each AS-REQ */ /* FIXME should generate a new nonce for each AS-REQ */
krb5_generate_random_block (&ctx->nonce, sizeof(ctx->nonce)); krb5_generate_random_block (&ctx->nonce, sizeof(ctx->nonce));
ctx->nonce &= 0x7fffffff; ctx->nonce &= 0x7fffffff;
/* XXX these just needs to be the same when using Windows PK-INIT */ /* XXX these just need to be the same when using Windows PK-INIT */
ctx->pk_nonce = ctx->nonce; ctx->pk_nonce = ctx->nonce;
ctx->prompter = prompter; ctx->prompter = prompter;
@@ -2748,8 +2748,8 @@ krb5_init_creds_set_keytab(krb5_context context,
ctx->keyproc = keytab_key_proc; ctx->keyproc = keytab_key_proc;
/* /*
* We need to the KDC what enctypes we support for this keytab, * We need to tell the KDC what enctypes we support for this keytab,
* esp if the keytab is really a password based entry, then the * especially if the keytab is really a password based entry, then the
* KDC might have more enctypes in the database then what we have * KDC might have more enctypes in the database then what we have
* in the keytab. * in the keytab.
*/ */
@@ -2766,7 +2766,7 @@ krb5_init_creds_set_keytab(krb5_context context,
found = 1; found = 1;
/* check if we ahve this kvno already */ /* check if we have this kvno already */
if (entry.vno > kvno) { if (entry.vno > kvno) {
/* remove old list of etype */ /* remove old list of etype */
if (etypes) if (etypes)
@@ -3239,7 +3239,7 @@ init_creds_step(krb5_context context,
ref_realm); ref_realm);
/* /*
* If its a krbtgt, lets updat the requested krbtgt too * If its a krbtgt, lets update the requested krbtgt too
*/ */
if (krb5_principal_is_krbtgt(context, ctx->cred.server)) { if (krb5_principal_is_krbtgt(context, ctx->cred.server)) {

View File

@@ -151,7 +151,7 @@ static const struct heim_type_data pac_object = {
/* /*
* Returns the size of the PACTYPE header + the PAC_INFO_BUFFER array. This is * Returns the size of the PACTYPE header + the PAC_INFO_BUFFER array. This is
* also the end of the whole thing, and any offsets to buffers from * also the end of the whole thing, and any offsets to buffers from
* thePAC_INFO_BUFFER[] entries have to be beyond it. * the PAC_INFO_BUFFER[] entries have to be beyond it.
*/ */
static krb5_error_code static krb5_error_code
pac_header_size(krb5_context context, uint32_t num_buffers, uint32_t *result) pac_header_size(krb5_context context, uint32_t num_buffers, uint32_t *result)
@@ -724,7 +724,7 @@ verify_checksum(krb5_context context,
* http://comments.gmane.org/gmane.comp.encryption.kerberos.devel/8743 * http://comments.gmane.org/gmane.comp.encryption.kerberos.devel/8743
* for the same issue in MIT, and * for the same issue in MIT, and
* http://blogs.msdn.com/b/openspecification/archive/2010/01/01/verifying-the-server-signature-in-kerberos-privilege-account-certificate.aspx * http://blogs.msdn.com/b/openspecification/archive/2010/01/01/verifying-the-server-signature-in-kerberos-privilege-account-certificate.aspx
* for Microsoft's explaination */ * for Microsoft's explanation */
if (cksum.cksumtype == CKSUMTYPE_HMAC_MD5) { if (cksum.cksumtype == CKSUMTYPE_HMAC_MD5) {
Checksum local_checksum; Checksum local_checksum;

View File

@@ -178,7 +178,7 @@ krb5_storage_seek(krb5_storage *sp, off_t offset, int whence)
* Truncate the storage buffer in sp to offset. * Truncate the storage buffer in sp to offset.
* *
* @param sp the storage buffer to truncate. * @param sp the storage buffer to truncate.
* @param offset the offset to truncate too. * @param offset the offset to truncate to.
* *
* @return An Kerberos 5 error code. * @return An Kerberos 5 error code.
* *
@@ -440,7 +440,7 @@ krb5_store_int(krb5_storage *sp,
* Store a int32 to storage, byte order is controlled by the settings * Store a int32 to storage, byte order is controlled by the settings
* on the storage, see krb5_storage_set_byteorder(). * on the storage, see krb5_storage_set_byteorder().
* *
* @param sp the storage to write too * @param sp the storage to write to
* @param value the value to store * @param value the value to store
* *
* @return 0 for success, or a Kerberos 5 error code on failure. * @return 0 for success, or a Kerberos 5 error code on failure.
@@ -463,7 +463,7 @@ krb5_store_int32(krb5_storage *sp,
* Store a int64 to storage, byte order is controlled by the settings * Store a int64 to storage, byte order is controlled by the settings
* on the storage, see krb5_storage_set_byteorder(). * on the storage, see krb5_storage_set_byteorder().
* *
* @param sp the storage to write too * @param sp the storage to write to
* @param value the value to store * @param value the value to store
* *
* @return 0 for success, or a Kerberos 5 error code on failure. * @return 0 for success, or a Kerberos 5 error code on failure.
@@ -490,7 +490,7 @@ krb5_store_int64(krb5_storage *sp,
* Store a uint32 to storage, byte order is controlled by the settings * Store a uint32 to storage, byte order is controlled by the settings
* on the storage, see krb5_storage_set_byteorder(). * on the storage, see krb5_storage_set_byteorder().
* *
* @param sp the storage to write too * @param sp the storage to write to
* @param value the value to store * @param value the value to store
* *
* @return 0 for success, or a Kerberos 5 error code on failure. * @return 0 for success, or a Kerberos 5 error code on failure.
@@ -509,7 +509,7 @@ krb5_store_uint32(krb5_storage *sp,
* Store a uint64 to storage, byte order is controlled by the settings * Store a uint64 to storage, byte order is controlled by the settings
* on the storage, see krb5_storage_set_byteorder(). * on the storage, see krb5_storage_set_byteorder().
* *
* @param sp the storage to write too * @param sp the storage to write to
* @param value the value to store * @param value the value to store
* *
* @return 0 for success, or a Kerberos 5 error code on failure. * @return 0 for success, or a Kerberos 5 error code on failure.
@@ -570,7 +570,7 @@ krb5_ret_int(krb5_storage *sp,
* Read a int64 from storage, byte order is controlled by the settings * Read a int64 from storage, byte order is controlled by the settings
* on the storage, see krb5_storage_set_byteorder(). * on the storage, see krb5_storage_set_byteorder().
* *
* @param sp the storage to write too * @param sp the storage to write to
* @param value the value read from the buffer * @param value the value read from the buffer
* *
* @return 0 for success, or a Kerberos 5 error code on failure. * @return 0 for success, or a Kerberos 5 error code on failure.
@@ -600,7 +600,7 @@ krb5_ret_int64(krb5_storage *sp,
* Read a uint64 from storage, byte order is controlled by the settings * Read a uint64 from storage, byte order is controlled by the settings
* on the storage, see krb5_storage_set_byteorder(). * on the storage, see krb5_storage_set_byteorder().
* *
* @param sp the storage to write too * @param sp the storage to write to
* @param value the value read from the buffer * @param value the value read from the buffer
* *
* @return 0 for success, or a Kerberos 5 error code on failure. * @return 0 for success, or a Kerberos 5 error code on failure.
@@ -626,7 +626,7 @@ krb5_ret_uint64(krb5_storage *sp,
* Read a int32 from storage, byte order is controlled by the settings * Read a int32 from storage, byte order is controlled by the settings
* on the storage, see krb5_storage_set_byteorder(). * on the storage, see krb5_storage_set_byteorder().
* *
* @param sp the storage to write too * @param sp the storage to write to
* @param value the value read from the buffer * @param value the value read from the buffer
* *
* @return 0 for success, or a Kerberos 5 error code on failure. * @return 0 for success, or a Kerberos 5 error code on failure.
@@ -655,7 +655,7 @@ krb5_ret_int32(krb5_storage *sp,
* Read a uint32 from storage, byte order is controlled by the settings * Read a uint32 from storage, byte order is controlled by the settings
* on the storage, see krb5_storage_set_byteorder(). * on the storage, see krb5_storage_set_byteorder().
* *
* @param sp the storage to write too * @param sp the storage to write to
* @param value the value read from the buffer * @param value the value read from the buffer
* *
* @return 0 for success, or a Kerberos 5 error code on failure. * @return 0 for success, or a Kerberos 5 error code on failure.
@@ -680,7 +680,7 @@ krb5_ret_uint32(krb5_storage *sp, uint32_t *value)
* Store a int16 to storage, byte order is controlled by the settings * Store a int16 to storage, byte order is controlled by the settings
* on the storage, see krb5_storage_set_byteorder(). * on the storage, see krb5_storage_set_byteorder().
* *
* @param sp the storage to write too * @param sp the storage to write to
* @param value the value to store * @param value the value to store
* *
* @return 0 for success, or a Kerberos 5 error code on failure. * @return 0 for success, or a Kerberos 5 error code on failure.
@@ -703,7 +703,7 @@ krb5_store_int16(krb5_storage *sp,
* Store a uint16 to storage, byte order is controlled by the settings * Store a uint16 to storage, byte order is controlled by the settings
* on the storage, see krb5_storage_set_byteorder(). * on the storage, see krb5_storage_set_byteorder().
* *
* @param sp the storage to write too * @param sp the storage to write to
* @param value the value to store * @param value the value to store
* *
* @return 0 for success, or a Kerberos 5 error code on failure. * @return 0 for success, or a Kerberos 5 error code on failure.
@@ -722,7 +722,7 @@ krb5_store_uint16(krb5_storage *sp,
* Read a int16 from storage, byte order is controlled by the settings * Read a int16 from storage, byte order is controlled by the settings
* on the storage, see krb5_storage_set_byteorder(). * on the storage, see krb5_storage_set_byteorder().
* *
* @param sp the storage to write too * @param sp the storage to write to
* @param value the value read from the buffer * @param value the value read from the buffer
* *
* @return 0 for success, or a Kerberos 5 error code on failure. * @return 0 for success, or a Kerberos 5 error code on failure.
@@ -751,7 +751,7 @@ krb5_ret_int16(krb5_storage *sp,
* Read a int16 from storage, byte order is controlled by the settings * Read a int16 from storage, byte order is controlled by the settings
* on the storage, see krb5_storage_set_byteorder(). * on the storage, see krb5_storage_set_byteorder().
* *
* @param sp the storage to write too * @param sp the storage to write to
* @param value the value read from the buffer * @param value the value read from the buffer
* *
* @return 0 for success, or a Kerberos 5 error code on failure. * @return 0 for success, or a Kerberos 5 error code on failure.
@@ -776,7 +776,7 @@ krb5_ret_uint16(krb5_storage *sp,
/** /**
* Store a int8 to storage. * Store a int8 to storage.
* *
* @param sp the storage to write too * @param sp the storage to write to
* @param value the value to store * @param value the value to store
* *
* @return 0 for success, or a Kerberos 5 error code on failure. * @return 0 for success, or a Kerberos 5 error code on failure.
@@ -799,7 +799,7 @@ krb5_store_int8(krb5_storage *sp,
/** /**
* Store a uint8 to storage. * Store a uint8 to storage.
* *
* @param sp the storage to write too * @param sp the storage to write to
* @param value the value to store * @param value the value to store
* *
* @return 0 for success, or a Kerberos 5 error code on failure. * @return 0 for success, or a Kerberos 5 error code on failure.
@@ -817,7 +817,7 @@ krb5_store_uint8(krb5_storage *sp,
/** /**
* Read a int8 from storage * Read a int8 from storage
* *
* @param sp the storage to write too * @param sp the storage to write to
* @param value the value read from the buffer * @param value the value read from the buffer
* *
* @return 0 for success, or a Kerberos 5 error code on failure. * @return 0 for success, or a Kerberos 5 error code on failure.
@@ -840,7 +840,7 @@ krb5_ret_int8(krb5_storage *sp,
/** /**
* Read a uint8 from storage * Read a uint8 from storage
* *
* @param sp the storage to write too * @param sp the storage to write to
* @param value the value read from the buffer * @param value the value read from the buffer
* *
* @return 0 for success, or a Kerberos 5 error code on failure. * @return 0 for success, or a Kerberos 5 error code on failure.