mirror of
https://github.com/samba-team/samba.git
synced 2025-02-01 05:47:28 +03:00
s4:kdc: Fix code spelling
Signed-off-by: Andreas Schneider <asn@samba.org> Reviewed-by: Joseph Sutton <josephsutton@catalyst.net.nz> Autobuild-User(master): Andreas Schneider <asn@cryptomilk.org> Autobuild-Date(master): Thu Aug 3 15:25:01 UTC 2023 on atb-devel-224
This commit is contained in:
parent
b29793ffde
commit
85c8222bdb
@ -506,7 +506,7 @@ static int fill_claim_entry(TALLOC_CTX *mem_ctx,
|
||||
}
|
||||
|
||||
/*
|
||||
* Determine wheter a claim applies to the most specific objectClass of the
|
||||
* Determine whether a claim applies to the most specific objectClass of the
|
||||
* principal.
|
||||
*/
|
||||
static int claim_applies_to_class(TALLOC_CTX *mem_ctx,
|
||||
|
@ -1079,7 +1079,7 @@ static krb5_error_code samba_kdc_message2entry(krb5_context context,
|
||||
uint32_t supported_session_etypes;
|
||||
uint32_t available_enctypes = 0;
|
||||
/*
|
||||
* also lagacy enctypes are announced,
|
||||
* also legacy enctypes are announced,
|
||||
* but effectively restricted by kdc_enctypes
|
||||
*/
|
||||
uint32_t domain_enctypes = ENC_RC4_HMAC_MD5 | ENC_RSA_MD5 | ENC_CRC32;
|
||||
@ -3517,7 +3517,7 @@ NTSTATUS samba_kdc_setup_db_ctx(TALLOC_CTX *mem_ctx, struct samba_kdc_base_conte
|
||||
* authenticate the KDC to the LDAP server is highly likely to
|
||||
* be circular.
|
||||
*
|
||||
* In future we may set this up to use EXERNAL and SSL
|
||||
* In future we may set this up to use EXTERNAL and SSL
|
||||
* certificates, for now it will almost certainly be NTLMSSP_SET_USERNAME
|
||||
*/
|
||||
|
||||
|
@ -984,7 +984,7 @@ static krb5_error_code hdb_samba4_audit(krb5_context context,
|
||||
* from the password history, so we don't
|
||||
* update the badPwdCount, but still return
|
||||
* PREAUTH_FAILED and need to forward to
|
||||
* a RWDC in order to produce an autoritative
|
||||
* a RWDC in order to produce an authoritative
|
||||
* response for the client.
|
||||
*/
|
||||
status = NT_STATUS_WRONG_PASSWORD;
|
||||
|
@ -31,7 +31,7 @@ static void smb_krb5_err(TALLOC_CTX *mem_ctx,
|
||||
char *krb5_err_str = smb_get_krb5_error_message(context,
|
||||
code,
|
||||
mem_ctx);
|
||||
printf("%s: %s\n", msg, krb5_err_str ? krb5_err_str : "UNKOWN");
|
||||
printf("%s: %s\n", msg, krb5_err_str ? krb5_err_str : "UNKNOWN");
|
||||
|
||||
talloc_free(mem_ctx);
|
||||
exit(exit_code);
|
||||
|
@ -320,7 +320,7 @@ fetch_referral_principal:
|
||||
* ADDOM.SAMBA.EXAMPLE.COM
|
||||
*
|
||||
* We look up if we have and entry in the database and get an
|
||||
* entry with the pricipal:
|
||||
* entry with the principal:
|
||||
*
|
||||
* cifs/dc7.SAMBA2008R2.EXAMPLE.COM@SAMBA2008R2.EXAMPLE.COM
|
||||
*
|
||||
|
@ -317,7 +317,7 @@ static krb5_error_code samba_wdc_verify_pac2(astgs_request_t r,
|
||||
* RODC, then we need to regenerate the PAC - we can't trust
|
||||
* it, and confirm that the RODC was permitted to print this ticket
|
||||
*
|
||||
* Becasue of the samba_kdc_validate_pac_blob() step we can be
|
||||
* Because of the samba_kdc_validate_pac_blob() step we can be
|
||||
* sure that the record in 'client' matches the SID in the
|
||||
* original PAC.
|
||||
*/
|
||||
|
Loading…
x
Reference in New Issue
Block a user