1
0
mirror of https://github.com/samba-team/samba.git synced 2025-02-01 05:47:28 +03:00

s4:kdc: Fix code spelling

Signed-off-by: Andreas Schneider <asn@samba.org>
Reviewed-by: Joseph Sutton <josephsutton@catalyst.net.nz>

Autobuild-User(master): Andreas Schneider <asn@cryptomilk.org>
Autobuild-Date(master): Thu Aug  3 15:25:01 UTC 2023 on atb-devel-224
This commit is contained in:
Andreas Schneider 2023-08-02 10:47:30 +02:00 committed by Andreas Schneider
parent b29793ffde
commit 85c8222bdb
6 changed files with 7 additions and 7 deletions

View File

@ -506,7 +506,7 @@ static int fill_claim_entry(TALLOC_CTX *mem_ctx,
}
/*
* Determine wheter a claim applies to the most specific objectClass of the
* Determine whether a claim applies to the most specific objectClass of the
* principal.
*/
static int claim_applies_to_class(TALLOC_CTX *mem_ctx,

View File

@ -1079,7 +1079,7 @@ static krb5_error_code samba_kdc_message2entry(krb5_context context,
uint32_t supported_session_etypes;
uint32_t available_enctypes = 0;
/*
* also lagacy enctypes are announced,
* also legacy enctypes are announced,
* but effectively restricted by kdc_enctypes
*/
uint32_t domain_enctypes = ENC_RC4_HMAC_MD5 | ENC_RSA_MD5 | ENC_CRC32;
@ -3517,7 +3517,7 @@ NTSTATUS samba_kdc_setup_db_ctx(TALLOC_CTX *mem_ctx, struct samba_kdc_base_conte
* authenticate the KDC to the LDAP server is highly likely to
* be circular.
*
* In future we may set this up to use EXERNAL and SSL
* In future we may set this up to use EXTERNAL and SSL
* certificates, for now it will almost certainly be NTLMSSP_SET_USERNAME
*/

View File

@ -984,7 +984,7 @@ static krb5_error_code hdb_samba4_audit(krb5_context context,
* from the password history, so we don't
* update the badPwdCount, but still return
* PREAUTH_FAILED and need to forward to
* a RWDC in order to produce an autoritative
* a RWDC in order to produce an authoritative
* response for the client.
*/
status = NT_STATUS_WRONG_PASSWORD;

View File

@ -31,7 +31,7 @@ static void smb_krb5_err(TALLOC_CTX *mem_ctx,
char *krb5_err_str = smb_get_krb5_error_message(context,
code,
mem_ctx);
printf("%s: %s\n", msg, krb5_err_str ? krb5_err_str : "UNKOWN");
printf("%s: %s\n", msg, krb5_err_str ? krb5_err_str : "UNKNOWN");
talloc_free(mem_ctx);
exit(exit_code);

View File

@ -320,7 +320,7 @@ fetch_referral_principal:
* ADDOM.SAMBA.EXAMPLE.COM
*
* We look up if we have and entry in the database and get an
* entry with the pricipal:
* entry with the principal:
*
* cifs/dc7.SAMBA2008R2.EXAMPLE.COM@SAMBA2008R2.EXAMPLE.COM
*

View File

@ -317,7 +317,7 @@ static krb5_error_code samba_wdc_verify_pac2(astgs_request_t r,
* RODC, then we need to regenerate the PAC - we can't trust
* it, and confirm that the RODC was permitted to print this ticket
*
* Becasue of the samba_kdc_validate_pac_blob() step we can be
* Because of the samba_kdc_validate_pac_blob() step we can be
* sure that the record in 'client' matches the SID in the
* original PAC.
*/