1
0
mirror of https://github.com/samba-team/samba.git synced 2025-01-22 22:04:08 +03:00
(This used to be commit 865c11275685c85124b506c9bbd2a8bde2e760b9)
This commit is contained in:
Tim Potter 2003-05-14 00:46:43 +00:00
parent d956b34997
commit 402fbc518a
11 changed files with 15 additions and 15 deletions

View File

@ -225,7 +225,7 @@ static NTSTATUS sam_password_ok(const struct auth_context *auth_context,
}
} else {
DEBUG(2,("sam_password_ok: NTLMv1 passwords NOT PERMITTED for user %s\n",pdb_get_username(sampass)));
/* no return, becouse we might pick up LMv2 in the LM feild */
/* no return, because we might pick up LMv2 in the LM feild */
}
}
@ -420,7 +420,7 @@ static NTSTATUS check_sam_security(const struct auth_context *auth_context,
return NT_STATUS_UNSUCCESSFUL;
}
/* Can't use the talloc version here, becouse the returned struct gets
/* Can't use the talloc version here, because the returned struct gets
kept on the server_info */
if (!NT_STATUS_IS_OK(nt_status = pdb_init_sam(&sampass))) {
return nt_status;

View File

@ -295,7 +295,7 @@ static BOOL cli_session_setup_nt1(struct cli_state *cli, const char *user,
} else {
/* pre-encrypted password supplied. Only used for
security=server, can't do
signing becouse we don't have oringial key */
signing because we don't have original key */
lm_response = data_blob(pass, passlen);
nt_response = data_blob(ntpass, ntpasslen);

View File

@ -274,7 +274,7 @@ struct cli_state *cli_initialise(struct cli_state *cli)
memset(cli->outbuf, 0, cli->bufsize);
memset(cli->inbuf, 0, cli->bufsize);
/* just becouse we over-allocate, doesn't mean it's right to use it */
/* just because we over-allocate, doesn't mean it's right to use it */
clobber_region(FUNCTION_MACRO, __LINE__, cli->outbuf+cli->bufsize, SAFETY_MARGIN);
clobber_region(FUNCTION_MACRO, __LINE__, cli->inbuf+cli->bufsize, SAFETY_MARGIN);

View File

@ -112,7 +112,7 @@ static void cli_simple_sign_outgoing_message(struct cli_state *cli)
* Firstly put the sequence number into the first 4 bytes.
* and zero out the next 4 bytes.
*
* We put the sequence into the packet, becouse we are going
* We put the sequence into the packet, because we are going
* to copy over it anyway.
*/
SIVAL(cli->outbuf, smb_ss_field,

View File

@ -183,7 +183,7 @@ NTSTATUS pdb_fill_sam_pw(SAM_ACCOUNT *sam_account, const struct passwd *pwd)
mechinism, we should call it here.
We can't just set this to 0 or allow it only to be filled
in when added to the backend, becouse the user's SID
in when added to the backend, because the user's SID
may already be in security descriptors etc.
-- abartlet 11-May-02
@ -629,7 +629,7 @@ uint32 pdb_gid_to_group_rid(gid_t gid)
static BOOL pdb_rid_is_well_known(uint32 rid)
{
/* Not using rid_offset here, becouse this is the actual
/* Not using rid_offset here, because this is the actual
NT fixed value (1000) */
return (rid < BASE_RID);

View File

@ -28,7 +28,7 @@
#define DBGC_CLASS DBGC_PASSDB
/**
* @todo Redefine this to NULL, but this changes the API becouse
* @todo Redefine this to NULL, but this changes the API because
* much of samba assumes that the pdb_get...() funtions
* return pstrings. (ie not null-pointers).
* See also pdb_fill_default_sam().

View File

@ -980,10 +980,10 @@ NTSTATUS change_oem_password(SAM_ACCOUNT *hnd, char *old_passwd, char *new_passw
* the /etc/passwd database first. Return failure if this cannot
* be done.
*
* This occurs before the oem change, becouse we don't want to
* This occurs before the oem change, because we don't want to
* update it if chgpasswd failed.
*
* Conditional on lp_unix_password_sync() becouse we don't want
* Conditional on lp_unix_password_sync() because we don't want
* to touch the unix db unless we have admin permission.
*/

View File

@ -790,7 +790,7 @@ connection_struct *make_connection(const char *service_in, DATA_BLOB password,
if(lp_security() != SEC_SHARE) {
DATA_BLOB no_pw = data_blob(NULL, 0);
if (vuser->homes_snum == -1) {
DEBUG(2, ("[homes] share not available for this user becouse it was not found or created at session setup time\n"));
DEBUG(2, ("[homes] share not available for this user because it was not found or created at session setup time\n"));
*status = NT_STATUS_BAD_NETWORK_NAME;
return NULL;
}

View File

@ -100,7 +100,7 @@ BOOL session_claim(user_struct *vuser)
}
/* If 'hostname lookup' == yes, then do the DNS lookup. This is
needed becouse utmp and PAM both expect DNS names
needed because utmp and PAM both expect DNS names
client_name() handles this case internally.
*/

View File

@ -644,7 +644,7 @@ int reply_sesssetup_and_X(connection_struct *conn, char *inbuf,char *outbuf,
if (*user) {
if (global_spnego_negotiated) {
/* This has to be here, becouse this is a perfectly valid behaviour for guest logons :-( */
/* This has to be here, because this is a perfectly valid behaviour for guest logons :-( */
DEBUG(0,("reply_sesssetup_and_X: Rejecting attempt at 'normal' session setup after negotiating spnego.\n"));
return ERROR_NT(NT_STATUS_UNSUCCESSFUL);

View File

@ -311,7 +311,7 @@ int32 tdb_change_int32_atomic(TDB_CONTEXT *tdb, const char *keystr, int32 *oldva
if ((val = tdb_fetch_int32(tdb, keystr)) == -1) {
/* The lookup failed */
if (tdb_error(tdb) != TDB_ERR_NOEXIST) {
/* but not becouse it didn't exist */
/* but not because it didn't exist */
goto err_out;
}
@ -352,7 +352,7 @@ BOOL tdb_change_uint32_atomic(TDB_CONTEXT *tdb, const char *keystr, uint32 *oldv
if (!tdb_fetch_uint32(tdb, keystr, &val)) {
/* It failed */
if (tdb_error(tdb) != TDB_ERR_NOEXIST) {
/* and not becouse it didn't exist */
/* and not because it didn't exist */
goto err_out;
}