svn commit: r203097 - head/lib/librpcsec_gss

Jens Schweikhardt schweikh at FreeBSD.org
Wed Jan 27 21:01:21 UTC 2010


Author: schweikh
Date: Wed Jan 27 21:01:21 2010
New Revision: 203097
URL: http://svn.freebsd.org/changeset/base/203097

Log:
  Correct a bunch of typos.

Modified:
  head/lib/librpcsec_gss/rpc_gss_get_versions.3
  head/lib/librpcsec_gss/rpc_gss_max_data_length.3
  head/lib/librpcsec_gss/rpc_gss_seccreate.3
  head/lib/librpcsec_gss/rpc_gss_set_callback.3
  head/lib/librpcsec_gss/rpc_gss_set_svc_name.3
  head/lib/librpcsec_gss/rpcsec_gss.3

Modified: head/lib/librpcsec_gss/rpc_gss_get_versions.3
==============================================================================
--- head/lib/librpcsec_gss/rpc_gss_get_versions.3	Wed Jan 27 20:32:58 2010	(r203096)
+++ head/lib/librpcsec_gss/rpc_gss_get_versions.3	Wed Jan 27 21:01:21 2010	(r203097)
@@ -43,11 +43,11 @@ Return the highest and lowest supported 
 .It vers_hi
 The value of
 .Fa *vers_hi
-is set to the highest suppored protocol version
+is set to the highest supported protocol version
 .It vers_lo
 The value of
 .Fa *vers_lo
-is set to the lowest suppored protocol version
+is set to the lowest supported protocol version
 .El
 .Sh SEE ALSO
 .Xr rpc 3 ,

Modified: head/lib/librpcsec_gss/rpc_gss_max_data_length.3
==============================================================================
--- head/lib/librpcsec_gss/rpc_gss_max_data_length.3	Wed Jan 27 20:32:58 2010	(r203096)
+++ head/lib/librpcsec_gss/rpc_gss_max_data_length.3	Wed Jan 27 21:01:21 2010	(r203097)
@@ -43,7 +43,7 @@ given the current service and QoP settin
 .Sh PARAMETERS
 .Bl -tag
 .It auth
-A handle to a RPCSEC_GSS security ccontext
+A handle to a RPCSEC_GSS security context
 .It max_tp_unit_len
 Maximum packet size of the underlying transport protocol
 .El

Modified: head/lib/librpcsec_gss/rpc_gss_seccreate.3
==============================================================================
--- head/lib/librpcsec_gss/rpc_gss_seccreate.3	Wed Jan 27 20:32:58 2010	(r203096)
+++ head/lib/librpcsec_gss/rpc_gss_seccreate.3	Wed Jan 27 21:01:21 2010	(r203097)
@@ -75,7 +75,7 @@ RPC headers are integrity protected by a
 .El
 .It qop
 Desired	quality of protection or NULL for the default.
-Available values are lised in /etc/gss/qop
+Available values are listed in /etc/gss/qop
 .It options_req
 Extra security context options to be passed to the underlying GSS-API
 mechanism.

Modified: head/lib/librpcsec_gss/rpc_gss_set_callback.3
==============================================================================
--- head/lib/librpcsec_gss/rpc_gss_set_callback.3	Wed Jan 27 20:32:58 2010	(r203096)
+++ head/lib/librpcsec_gss/rpc_gss_set_callback.3	Wed Jan 27 21:01:21 2010	(r203097)
@@ -66,11 +66,11 @@ values for service and quality of protec
 .It cb
 A structure containing the RPC program and version for this callback
 and a function which will be called when new contexts are created for
-ths given RPC program and version
+the given RPC program and version
 .It req
 The RPC request using the new context
 .It deleg
-GSS-APi delegated credentials (if any)
+GSS-API delegated credentials (if any)
 .It gss_context
 The GSS-API context
 .It lock

Modified: head/lib/librpcsec_gss/rpc_gss_set_svc_name.3
==============================================================================
--- head/lib/librpcsec_gss/rpc_gss_set_svc_name.3	Wed Jan 27 20:32:58 2010	(r203096)
+++ head/lib/librpcsec_gss/rpc_gss_set_svc_name.3	Wed Jan 27 21:01:21 2010	(r203097)
@@ -51,7 +51,7 @@ version.
 .It principal
 A string representing the service principal in the form
 .Qq service at hostname
-.It mechanim
+.It mechanism
 The name of the security mechanism
 .It req_time
 The time in seconds that the service credentials should remain

Modified: head/lib/librpcsec_gss/rpcsec_gss.3
==============================================================================
--- head/lib/librpcsec_gss/rpcsec_gss.3	Wed Jan 27 20:32:58 2010	(r203096)
+++ head/lib/librpcsec_gss/rpcsec_gss.3	Wed Jan 27 21:01:21 2010	(r203097)
@@ -43,7 +43,7 @@ subsequent communication between client 
 authenticated.
 Optionally, extra protection can be applied to the connection.
 The integrity service uses checksums to ensure that all data sent by
-a peer is recieved without modification.
+a peer is received without modification.
 The privacy service uses encryption to ensure that no third party can
 access the data for a connection.
 .Pp
@@ -111,7 +111,7 @@ typedef struct {
 } *rpc_gss_principal_t;
 .Ed
 .It Vt rpc_gss_rawcred_t
-This structure is used to access the raw credentions associated with a
+This structure is used to access the raw credentials associated with a
 security context.
 .Bd -literal
 typedef struct {


More information about the svn-src-head mailing list