From 7e15186e3e9720c1415ca301222e66c994fc0529 Mon Sep 17 00:00:00 2001 From: Steve Langasek Date: Wed, 13 Feb 2019 08:26:37 +0000 Subject: Miscellaneous spelling fixes --- doc/man/pam_prompt.3.xml | 2 +- doc/man/pam_set_item.3.xml | 2 +- modules/pam_cracklib/pam_cracklib.8.xml | 2 +- modules/pam_env/pam_env.8.xml | 2 +- modules/pam_exec/pam_exec.8.xml | 2 +- modules/pam_filter/pam_filter.c | 2 +- modules/pam_namespace/pam_namespace.c | 2 +- 7 files changed, 7 insertions(+), 7 deletions(-) diff --git a/doc/man/pam_prompt.3.xml b/doc/man/pam_prompt.3.xml index 8b502a9d..bf0c9bf6 100644 --- a/doc/man/pam_prompt.3.xml +++ b/doc/man/pam_prompt.3.xml @@ -75,7 +75,7 @@ PAM_SUCCESS - Conversation succeded, response is set. + Conversation succeeded, response is set. diff --git a/doc/man/pam_set_item.3.xml b/doc/man/pam_set_item.3.xml index 7630adbd..30ab92b9 100644 --- a/doc/man/pam_set_item.3.xml +++ b/doc/man/pam_set_item.3.xml @@ -74,7 +74,7 @@ - Both, PAM_AUTHTOK and PAM_OLDAUTHTOK, will be reseted before + Both, PAM_AUTHTOK and PAM_OLDAUTHTOK, will be reset before returning to the application. Which means an application is not able to access the authentication tokens. diff --git a/modules/pam_cracklib/pam_cracklib.8.xml b/modules/pam_cracklib/pam_cracklib.8.xml index 50027add..75e44e2d 100644 --- a/modules/pam_cracklib/pam_cracklib.8.xml +++ b/modules/pam_cracklib/pam_cracklib.8.xml @@ -402,7 +402,7 @@ - Check whether the words from the GECOS field (usualy full name + Check whether the words from the GECOS field (usually full name of the user) longer than 3 characters in straight or reversed form are contained in the new password. If any such word is found the new password is rejected. diff --git a/modules/pam_env/pam_env.8.xml b/modules/pam_env/pam_env.8.xml index d6e20a2e..105f923f 100644 --- a/modules/pam_env/pam_env.8.xml +++ b/modules/pam_env/pam_env.8.xml @@ -62,7 +62,7 @@ Second a file (/etc/environment by default) with simple KEY=VAL pairs on separate lines will be read. With the envfile option an alternate file can be specified. - And with the readenv option this can be completly disabled. + And with the readenv option this can be completely disabled. Third it will read a user configuration file diff --git a/modules/pam_exec/pam_exec.8.xml b/modules/pam_exec/pam_exec.8.xml index d1b00a21..edc3c41e 100644 --- a/modules/pam_exec/pam_exec.8.xml +++ b/modules/pam_exec/pam_exec.8.xml @@ -75,7 +75,7 @@ Commands called by pam_exec need to be aware of that the user - can have controll over the environment. + can have control over the environment. diff --git a/modules/pam_filter/pam_filter.c b/modules/pam_filter/pam_filter.c index de8c35ad..b818bb8b 100644 --- a/modules/pam_filter/pam_filter.c +++ b/modules/pam_filter/pam_filter.c @@ -376,7 +376,7 @@ set_filter (pam_handle_t *pamh, int flags UNUSED, int ctrl, /* grant slave terminal */ if (grantpt (fd[0]) < 0) { - pam_syslog(pamh, LOG_ERR, "Cannot grant acccess to slave terminal"); + pam_syslog(pamh, LOG_ERR, "Cannot grant access to slave terminal"); return PAM_ABORT; } diff --git a/modules/pam_namespace/pam_namespace.c b/modules/pam_namespace/pam_namespace.c index 660c7a1e..6d2a125d 100644 --- a/modules/pam_namespace/pam_namespace.c +++ b/modules/pam_namespace/pam_namespace.c @@ -2217,7 +2217,7 @@ int pam_sm_close_session(pam_handle_t *pamh, int flags UNUSED, pam_set_data(idata.pamh, NAMESPACE_PROTECT_DATA, NULL, NULL); if (idata.flags & PAMNS_DEBUG) - pam_syslog(idata.pamh, LOG_DEBUG, "close_session - sucessful"); + pam_syslog(idata.pamh, LOG_DEBUG, "close_session - successful"); return PAM_SUCCESS; } -- cgit v1.2.3