svn commit: r203097 - head/lib/librpcsec_gss
Jens Schweikhardt
schweikh at FreeBSD.org
Wed Jan 27 21:01:21 UTC 2010
Author: schweikh
Date: Wed Jan 27 21:01:21 2010
New Revision: 203097
URL: http://svn.freebsd.org/changeset/base/203097
Log:
Correct a bunch of typos.
Modified:
head/lib/librpcsec_gss/rpc_gss_get_versions.3
head/lib/librpcsec_gss/rpc_gss_max_data_length.3
head/lib/librpcsec_gss/rpc_gss_seccreate.3
head/lib/librpcsec_gss/rpc_gss_set_callback.3
head/lib/librpcsec_gss/rpc_gss_set_svc_name.3
head/lib/librpcsec_gss/rpcsec_gss.3
Modified: head/lib/librpcsec_gss/rpc_gss_get_versions.3
==============================================================================
--- head/lib/librpcsec_gss/rpc_gss_get_versions.3 Wed Jan 27 20:32:58 2010 (r203096)
+++ head/lib/librpcsec_gss/rpc_gss_get_versions.3 Wed Jan 27 21:01:21 2010 (r203097)
@@ -43,11 +43,11 @@ Return the highest and lowest supported
.It vers_hi
The value of
.Fa *vers_hi
-is set to the highest suppored protocol version
+is set to the highest supported protocol version
.It vers_lo
The value of
.Fa *vers_lo
-is set to the lowest suppored protocol version
+is set to the lowest supported protocol version
.El
.Sh SEE ALSO
.Xr rpc 3 ,
Modified: head/lib/librpcsec_gss/rpc_gss_max_data_length.3
==============================================================================
--- head/lib/librpcsec_gss/rpc_gss_max_data_length.3 Wed Jan 27 20:32:58 2010 (r203096)
+++ head/lib/librpcsec_gss/rpc_gss_max_data_length.3 Wed Jan 27 21:01:21 2010 (r203097)
@@ -43,7 +43,7 @@ given the current service and QoP settin
.Sh PARAMETERS
.Bl -tag
.It auth
-A handle to a RPCSEC_GSS security ccontext
+A handle to a RPCSEC_GSS security context
.It max_tp_unit_len
Maximum packet size of the underlying transport protocol
.El
Modified: head/lib/librpcsec_gss/rpc_gss_seccreate.3
==============================================================================
--- head/lib/librpcsec_gss/rpc_gss_seccreate.3 Wed Jan 27 20:32:58 2010 (r203096)
+++ head/lib/librpcsec_gss/rpc_gss_seccreate.3 Wed Jan 27 21:01:21 2010 (r203097)
@@ -75,7 +75,7 @@ RPC headers are integrity protected by a
.El
.It qop
Desired quality of protection or NULL for the default.
-Available values are lised in /etc/gss/qop
+Available values are listed in /etc/gss/qop
.It options_req
Extra security context options to be passed to the underlying GSS-API
mechanism.
Modified: head/lib/librpcsec_gss/rpc_gss_set_callback.3
==============================================================================
--- head/lib/librpcsec_gss/rpc_gss_set_callback.3 Wed Jan 27 20:32:58 2010 (r203096)
+++ head/lib/librpcsec_gss/rpc_gss_set_callback.3 Wed Jan 27 21:01:21 2010 (r203097)
@@ -66,11 +66,11 @@ values for service and quality of protec
.It cb
A structure containing the RPC program and version for this callback
and a function which will be called when new contexts are created for
-ths given RPC program and version
+the given RPC program and version
.It req
The RPC request using the new context
.It deleg
-GSS-APi delegated credentials (if any)
+GSS-API delegated credentials (if any)
.It gss_context
The GSS-API context
.It lock
Modified: head/lib/librpcsec_gss/rpc_gss_set_svc_name.3
==============================================================================
--- head/lib/librpcsec_gss/rpc_gss_set_svc_name.3 Wed Jan 27 20:32:58 2010 (r203096)
+++ head/lib/librpcsec_gss/rpc_gss_set_svc_name.3 Wed Jan 27 21:01:21 2010 (r203097)
@@ -51,7 +51,7 @@ version.
.It principal
A string representing the service principal in the form
.Qq service at hostname
-.It mechanim
+.It mechanism
The name of the security mechanism
.It req_time
The time in seconds that the service credentials should remain
Modified: head/lib/librpcsec_gss/rpcsec_gss.3
==============================================================================
--- head/lib/librpcsec_gss/rpcsec_gss.3 Wed Jan 27 20:32:58 2010 (r203096)
+++ head/lib/librpcsec_gss/rpcsec_gss.3 Wed Jan 27 21:01:21 2010 (r203097)
@@ -43,7 +43,7 @@ subsequent communication between client
authenticated.
Optionally, extra protection can be applied to the connection.
The integrity service uses checksums to ensure that all data sent by
-a peer is recieved without modification.
+a peer is received without modification.
The privacy service uses encryption to ensure that no third party can
access the data for a connection.
.Pp
@@ -111,7 +111,7 @@ typedef struct {
} *rpc_gss_principal_t;
.Ed
.It Vt rpc_gss_rawcred_t
-This structure is used to access the raw credentions associated with a
+This structure is used to access the raw credentials associated with a
security context.
.Bd -literal
typedef struct {
More information about the svn-src-all
mailing list