summaryrefslogtreecommitdiff
path: root/doc/mwg/Linux-PAM_MWG.xml
diff options
context:
space:
mode:
authorThorsten Kukuk <kukuk@thkukuk.de>2009-06-16 08:32:40 +0000
committerThorsten Kukuk <kukuk@thkukuk.de>2009-06-16 08:32:40 +0000
commit2820ff6a5f9f43faa8cc823cd954966ca3f5c8cc (patch)
tree1e6105648c255cee829d129141f05004b8255699 /doc/mwg/Linux-PAM_MWG.xml
parentf25975c7d36f29b975db2a5159841b5ddcf9c475 (diff)
Relevant BUGIDs:
Purpose of commit: bugfix Commit summary: --------------- 2009-06-16 Thorsten Kukuk <kukuk@thkukuk.de> * doc/sag/Linux-PAM_SAG.xml: Fix typos. * doc/adg/Linux-PAM_ADG.xml: Likewise. * doc/mwg/Linux-PAM_MWG.xml: Likewise.
Diffstat (limited to 'doc/mwg/Linux-PAM_MWG.xml')
-rw-r--r--doc/mwg/Linux-PAM_MWG.xml6
1 files changed, 3 insertions, 3 deletions
diff --git a/doc/mwg/Linux-PAM_MWG.xml b/doc/mwg/Linux-PAM_MWG.xml
index 5a09a7cf..0c6c9201 100644
--- a/doc/mwg/Linux-PAM_MWG.xml
+++ b/doc/mwg/Linux-PAM_MWG.xml
@@ -71,7 +71,7 @@
</para>
</section>
- <section id="mwg-introducton-synopsis">
+ <section id="mwg-introduction-synopsis">
<title>Synopsis</title>
<programlisting>
#include &lt;security/pam_modules.h&gt;
@@ -97,7 +97,7 @@ gcc -shared -o pam_module.so pam_module.o -lpam
First, we cover what the module should expect from the
<emphasis remap='B'>Linux-PAM</emphasis> library and a
<emphasis remap='B'>Linux-PAM</emphasis> aware application.
- Essesntially this is the <filename>libpam.*</filename> library.
+ Essentially this is the <filename>libpam.*</filename> library.
</para>
<xi:include xmlns:xi="http://www.w3.org/2001/XInclude"
href="pam_set_data.xml"/>
@@ -169,7 +169,7 @@ gcc -shared -o pam_module.so pam_module.o -lpam
token of some lesser user. In other cases it may not be
appropriate: when <command>joe</command> maliciously wants
to reset <command>alice</command>'s password; or when anyone
- other than the user themself wishes to reset their
+ other than the user them self wishes to reset their
<emphasis>KERBEROS</emphasis> authentication token. A policy
for this action should be defined by any reasonable
authentication scheme, the module writer should consider