diff --git a/source4/torture/krb5/kdc-canon-heimdal.c b/source4/torture/krb5/kdc-canon-heimdal.c index 2fdcb4cf85e..392329a66e2 100644 --- a/source4/torture/krb5/kdc-canon-heimdal.c +++ b/source4/torture/krb5/kdc-canon-heimdal.c @@ -144,7 +144,7 @@ static NTSTATUS test_generate_session_info_pac(struct auth4_context *auth_ctx, /* Check to see if we can pass the PAC across to the NETLOGON server for validation */ -/* Also happens to be a really good one-step verfication of our Kerberos stack */ +/* Also happens to be a really good one-step verification of our Kerberos stack */ static bool test_accept_ticket(struct torture_context *tctx, struct cli_credentials *credentials, @@ -762,7 +762,7 @@ static bool torture_krb5_as_req_canon(struct torture_context *tctx, const void * } /* - * Confirm gettting a ticket to pass to the server, running + * Confirm getting a ticket to pass to the server, running * either the TEST_TGS_REQ or TEST_SELF_TRUST_TGS_REQ stage. * * This triggers the client to attempt to get a @@ -868,7 +868,7 @@ static bool torture_krb5_as_req_canon(struct torture_context *tctx, const void * } /* - * Confirm gettting a ticket to pass to the server, running + * Confirm getting a ticket to pass to the server, running * the TEST_TGS_REQ_HOST, TEST_TGS_REQ_HOST_SRV_INST, TEST_TGS_REQ_HOST_SRV_HST stage * * This triggers the client to attempt to get a @@ -1002,7 +1002,7 @@ static bool torture_krb5_as_req_canon(struct torture_context *tctx, const void * } /* - * Confirm gettting a ticket for the same krbtgt/realm that we + * Confirm getting a ticket for the same krbtgt/realm that we * got back with the initial ticket, running the * TEST_TGS_REQ_KRBTGT stage. * diff --git a/source4/torture/krb5/kdc-heimdal.c b/source4/torture/krb5/kdc-heimdal.c index 8cace9e6c36..d6659778491 100644 --- a/source4/torture/krb5/kdc-heimdal.c +++ b/source4/torture/krb5/kdc-heimdal.c @@ -410,7 +410,7 @@ static bool torture_krb5_post_recv_test(struct torture_krb5_context *test_contex break; /* - * Confirm correct error codes when we deliberatly send the wrong password + * Confirm correct error codes when we deliberately send the wrong password */ case TORTURE_KRB5_TEST_BREAK_PW: if (test_context->packet_count == 0) { @@ -435,7 +435,7 @@ static bool torture_krb5_post_recv_test(struct torture_krb5_context *test_contex break; /* - * Confirm correct error codes when we deliberatly skew the client clock + * Confirm correct error codes when we deliberately skew the client clock */ case TORTURE_KRB5_TEST_CLOCK_SKEW: if (test_context->packet_count == 0) {