krb5 commit: Minor spelling and grammar fixes

Greg Hudson ghudson at mit.edu
Mon Aug 10 12:36:04 EDT 2015


https://github.com/krb5/krb5/commit/5aa4127760b3e49821971550193669a80509e5eb
commit 5aa4127760b3e49821971550193669a80509e5eb
Author: Michael Mattioli <mmattioli at users.noreply.github.com>
Date:   Sun Aug 9 01:25:08 2015 -0400

    Minor spelling and grammar fixes
    
    Fix minor spelling and grammar errors in documentation and comments,
    and remove some trailing whitespace.
    
    [ghudson at mit.edu: remove a new trailing whitespace character; edit
    commit message and k5unseal.c comment change; omit an out-of-scope
    change]

 src/lib/gssapi/krb5/gssapi_krb5.h |    2 +-
 src/lib/gssapi/krb5/k5unseal.c    |    2 +-
 src/windows/README                |   54 ++++++++++++++++++------------------
 3 files changed, 29 insertions(+), 29 deletions(-)

diff --git a/src/lib/gssapi/krb5/gssapi_krb5.h b/src/lib/gssapi/krb5/gssapi_krb5.h
index f72efd0..48ceb99 100644
--- a/src/lib/gssapi/krb5/gssapi_krb5.h
+++ b/src/lib/gssapi/krb5/gssapi_krb5.h
@@ -111,7 +111,7 @@ typedef struct gss_krb5_lucid_key {
 
 typedef struct gss_krb5_rfc1964_keydata {
     OM_uint32       sign_alg;       /* signing algorthm */
-    OM_uint32       seal_alg;       /* seal/encrypt algorthm */
+    OM_uint32       seal_alg;       /* seal/encrypt algorithm */
     gss_krb5_lucid_key_t    ctx_key;
     /* Context key
        (Kerberos session key or subkey) */
diff --git a/src/lib/gssapi/krb5/k5unseal.c b/src/lib/gssapi/krb5/k5unseal.c
index 673c883..26a2d33 100644
--- a/src/lib/gssapi/krb5/k5unseal.c
+++ b/src/lib/gssapi/krb5/k5unseal.c
@@ -436,7 +436,7 @@ kg_unseal_v1(context, minor_status, ctx, ptr, bodysize, message_buffer,
     }
 
 
-    /* it got through unscathed.  Make sure the context is unexpired */
+    /* It got through unscathed.  Make sure the context is unexpired. */
 
     if (toktype == KG_TOK_SEAL_MSG)
         *message_buffer = token;
diff --git a/src/windows/README b/src/windows/README
index c622c86..02f149c 100644
--- a/src/windows/README
+++ b/src/windows/README
@@ -166,7 +166,7 @@ In brief:
   4. Specify the password change service host for the realm with:
      *KSETUP /AddKpasswd <realm> <Kpwdhost>*
   5. Assign the realm of the local machine with: *KSETUP /SetRealm
-     <realm>* where realm must be all upper case.   
+     <realm>* where realm must be all upper case.
   6. Assign the local machine's password with: *KSETUP
      /SetComputerPassword <Password>
      *
@@ -176,9 +176,9 @@ In brief:
   8. Map principal names to local accounts with: *KSETUP /MapUser
      <principal> <account>*
 
-On the MIT KDC, you must then create service principals using the "Password" 
-assigned to the machine.  So far the minimum list of principals required appear 
-to be for a machine named "mymachine" in the realm "EXAMPLE.COM" with a 
+On the MIT KDC, you must then create service principals using the "Password"
+assigned to the machine.  So far the minimum list of principals required appear
+to be for a machine named "mymachine" in the realm "EXAMPLE.COM" with a
 domain name of "example.com":
 
    * host/mymachine at EXAMPLE.COM
@@ -186,12 +186,12 @@ domain name of "example.com":
    * cifs/mymachine at EXAMPLE.COM
    * cifs/mymachine.example.com at EXAMPLE.COM
 
-There may very well be other serivces for which principals must be created depending 
+There may very well be other services for which principals must be created depending
 on what services are being executed on the machine.
 
-It is very important to note that while you can successfully log into a Windows 
-workstation by authenticating to the KDC without creating a host key; the logon 
-session you receive will not be a Kerberos Logon Session.  There will be no Kerberos 
+It is very important to note that while you can successfully log into a Windows
+workstation by authenticating to the KDC without creating a host key; the logon
+session you receive will not be a Kerberos Logon Session.  There will be no Kerberos
 principal and no LSA cache to access.
 
 The result of a real KSETUP configuration looks like this:
@@ -238,7 +238,7 @@ On server platforms the key is specified as:
   HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Parameters
     AllowTGTSessionKey = 0x01 (DWORD)
 
-On workstation platforms the key is specified as: 
+On workstation platforms the key is specified as:
 
   HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos
     AllowTGTSessionKey = 0x01 (DWORD)
@@ -246,32 +246,32 @@ On workstation platforms the key is specified as:
 The Kerberos for Windows installer automatically sets this key on installation
 and unsets it on uninstall, allowing the MSLSA: cache type to be used.
 
-It has been noted that the Microsoft Kerberos LSA does not provide enough 
+It has been noted that the Microsoft Kerberos LSA does not provide enough
 information within its KERB_EXTERNAL_TICKET structure to properly construct
 the Client Principal simply by examining a single ticket. From the MSDN
 Library:
 
-  ClientName 
-    KERB_EXTERNAL_NAME structure that contains the client name in the ticket. 
-    This name is relative to the current domain. 
+  ClientName
+    KERB_EXTERNAL_NAME structure that contains the client name in the ticket.
+    This name is relative to the current domain.
 
-  DomainName 
-    UNICODE_STRING that contains the name of the domain that corresponds to 
-    the ServiceName member. This is the domain that issued the ticket. 
+  DomainName
+    UNICODE_STRING that contains the name of the domain that corresponds to
+    the ServiceName member. This is the domain that issued the ticket.
 
-  TargetDomainName 
+  TargetDomainName
     UNICODE_STRING that contains the name of the domain in which the ticket is
-    valid. For an interdomain ticket, this is the destination domain. 
+    valid. For an interdomain ticket, this is the destination domain.
 
-  AltTargetDomainName 
-    UNICODE_STRING that contains a synonym for the destination domain. Every 
-    domain has two names: a DNS name and a NetBIOS name. If the name returned 
-    in the ticket is different from the name used to request the ticket (the 
-    Kerberos Key Distribution Center (KDC) may do name mapping), this string 
-    contains the original name. 
+  AltTargetDomainName
+    UNICODE_STRING that contains a synonym for the destination domain. Every
+    domain has two names: a DNS name and a NetBIOS name. If the name returned
+    in the ticket is different from the name used to request the ticket (the
+    Kerberos Key Distribution Center (KDC) may do name mapping), this string
+    contains the original name.
 
 Unfortunately, there is no field here which contains the domain of the client.
-In order for the krb5_ccache to properly report the client principal name, the 
+In order for the krb5_ccache to properly report the client principal name, the
 client principal name is constructed by utilizing the ClientName and DomainName
 fields of the Initial TGT associated with the Kerberos LSA credential cache.
 To disable the use of the TGT info and instead simply use the "DomainName" field
@@ -290,8 +290,8 @@ GSSAPI Sample Client:
 The GSS API Sample Client provided in this distribution is compatible with the
 gss-server application built on Unix/Linux systems.  This client is not compatible
 with the Platform SDK/Samples/Security/SSPI/GSS/ samples which Microsoft has been
-shipping as of January 2004.  Revised versions of these samples are available upon 
-request to krbdev at mit.edu.  
+shipping as of January 2004.  Revised versions of these samples are available upon
+request to krbdev at mit.edu.
 
 More Information:
 ----------------


More information about the cvs-krb5 mailing list