1
0
mirror of https://github.com/samba-team/samba.git synced 2025-01-03 01:18:10 +03:00

auth: Fix code spelling

Best reviewed with: `git show --word-diff`

Signed-off-by: Andreas Schneider <asn@samba.org>
Reviewed-by: Rowland Penny <rpenny@samba.org>
This commit is contained in:
Andreas Schneider 2023-03-14 08:50:34 +01:00 committed by Andreas Schneider
parent 71eb85bc25
commit 98c14205a0
15 changed files with 20 additions and 20 deletions

View File

@ -124,7 +124,7 @@ static enum event_logon_type get_logon_type(
* *
* IF adding a new field please update the minor version number AUTH_MINOR * IF adding a new field please update the minor version number AUTH_MINOR
* *
* To process the resulting log lines from the commend line use jq to * To process the resulting log lines from the command line use jq to
* parse the json. * parse the json.
* *
* grep "^ {" log file | * grep "^ {" log file |
@ -345,7 +345,7 @@ failure:
* *
* IF adding a new field please update the minor version number AUTHZ_MINOR * IF adding a new field please update the minor version number AUTHZ_MINOR
* *
* To process the resulting log lines from the commend line use jq to * To process the resulting log lines from the command line use jq to
* parse the json. * parse the json.
* *
* grep "^ {" log_file |\ * grep "^ {" log_file |\

View File

@ -37,7 +37,7 @@ enum auth_password_state {
#define AUTH_SESSION_INFO_DEFAULT_GROUPS 0x01 /* Add the user to the default world and network groups */ #define AUTH_SESSION_INFO_DEFAULT_GROUPS 0x01 /* Add the user to the default world and network groups */
#define AUTH_SESSION_INFO_AUTHENTICATED 0x02 /* Add the user to the 'authenticated users' group */ #define AUTH_SESSION_INFO_AUTHENTICATED 0x02 /* Add the user to the 'authenticated users' group */
#define AUTH_SESSION_INFO_SIMPLE_PRIVILEGES 0x04 /* Use a trivial map between users and privilages, rather than a DB */ #define AUTH_SESSION_INFO_SIMPLE_PRIVILEGES 0x04 /* Use a trivial map between users and privileges, rather than a DB */
#define AUTH_SESSION_INFO_UNIX_TOKEN 0x08 /* The returned token must have the unix_token and unix_info elements provided */ #define AUTH_SESSION_INFO_UNIX_TOKEN 0x08 /* The returned token must have the unix_token and unix_info elements provided */
#define AUTH_SESSION_INFO_NTLM 0x10 /* The returned token must have authenticated-with-NTLM flag set */ #define AUTH_SESSION_INFO_NTLM 0x10 /* The returned token must have authenticated-with-NTLM flag set */

View File

@ -210,7 +210,7 @@ _PUBLIC_ const char *cli_credentials_get_username(struct cli_credentials *cred)
* *
* @param[in] obtained A pointer to store the obtained information. * @param[in] obtained A pointer to store the obtained information.
* *
* return The user name or NULL if an error occured. * return The user name or NULL if an error occurred.
*/ */
_PUBLIC_ const char * _PUBLIC_ const char *
cli_credentials_get_username_and_obtained(struct cli_credentials *cred, cli_credentials_get_username_and_obtained(struct cli_credentials *cred,
@ -259,7 +259,7 @@ _PUBLIC_ bool cli_credentials_set_bind_dn(struct cli_credentials *cred,
* Obtain the BIND DN for this credentials context. * Obtain the BIND DN for this credentials context.
* @param cred credentials context * @param cred credentials context
* @retval The username set on this context. * @retval The username set on this context.
* @note Return value will be NULL if not specified explictly * @note Return value will be NULL if not specified explicitly
*/ */
_PUBLIC_ const char *cli_credentials_get_bind_dn(struct cli_credentials *cred) _PUBLIC_ const char *cli_credentials_get_bind_dn(struct cli_credentials *cred)
{ {
@ -459,7 +459,7 @@ _PUBLIC_ const char *cli_credentials_get_password(struct cli_credentials *cred)
* *
* @param[in] obtained A pointer to store the obtained information. * @param[in] obtained A pointer to store the obtained information.
* *
* return The user name or NULL if an error occured. * return The user name or NULL if an error occurred.
*/ */
_PUBLIC_ const char * _PUBLIC_ const char *
cli_credentials_get_password_and_obtained(struct cli_credentials *cred, cli_credentials_get_password_and_obtained(struct cli_credentials *cred,
@ -1290,7 +1290,7 @@ _PUBLIC_ void cli_credentials_set_secure_channel_type(struct cli_credentials *cr
} }
/** /**
* Return NETLOGON secure chanel type * Return NETLOGON secure channel type
*/ */
_PUBLIC_ time_t cli_credentials_get_password_last_changed_time(struct cli_credentials *cred) _PUBLIC_ time_t cli_credentials_get_password_last_changed_time(struct cli_credentials *cred)
@ -1309,7 +1309,7 @@ _PUBLIC_ void cli_credentials_set_password_last_changed_time(struct cli_credenti
} }
/** /**
* Return NETLOGON secure chanel type * Return NETLOGON secure channel type
*/ */
_PUBLIC_ enum netr_SchannelType cli_credentials_get_secure_channel_type(struct cli_credentials *cred) _PUBLIC_ enum netr_SchannelType cli_credentials_get_secure_channel_type(struct cli_credentials *cred)

View File

@ -110,7 +110,7 @@ struct cli_credentials {
/* Should we get a forwardable ticket? */ /* Should we get a forwardable ticket? */
enum credentials_krb_forwardable krb_forwardable; enum credentials_krb_forwardable krb_forwardable;
/* Forced SASL mechansim */ /* Forced SASL mechanism */
char *forced_sasl_mech; char *forced_sasl_mech;
/* gensec features which should be used for connections */ /* gensec features which should be used for connections */

View File

@ -996,7 +996,7 @@ _PUBLIC_ int cli_credentials_get_client_gss_creds(struct cli_credentials *cred,
ccache out of it. This routine can be generalised in future for ccache out of it. This routine can be generalised in future for
the case where we deal with GSSAPI mechs other than krb5. the case where we deal with GSSAPI mechs other than krb5.
On sucess, the caller must not free gssapi_cred, as it now belongs On success, the caller must not free gssapi_cred, as it now belongs
to the credentials system. to the credentials system.
*/ */

View File

@ -870,7 +870,7 @@ static NTSTATUS gensec_start_mech(struct gensec_security *gensec_security)
} }
/** /**
* Start a GENSEC sub-mechanism with a specified mechansim structure, used in SPNEGO * Start a GENSEC sub-mechanism with a specified mechanism structure, used in SPNEGO
* *
*/ */

View File

@ -120,7 +120,7 @@ static bool gensec_gssapi_check_oid(const DATA_BLOB *blob, const char *oid)
} }
/** /**
* Check if the packet is one for the KRB5 mechansim * Check if the packet is one for the KRB5 mechanism
* *
* NOTE: This is a helper that can be employed by multiple mechanisms, do * NOTE: This is a helper that can be employed by multiple mechanisms, do
* not make assumptions about the private_data * not make assumptions about the private_data

View File

@ -1068,7 +1068,7 @@ static NTSTATUS schannel_session_info(struct gensec_security *gensec_security,
} }
/* /*
* Reduce the attack surface by ensuring schannel is not availble when * Reduce the attack surface by ensuring schannel is not available when
* we are not a DC * we are not a DC
*/ */
static NTSTATUS schannel_server_start(struct gensec_security *gensec_security) static NTSTATUS schannel_server_start(struct gensec_security *gensec_security)

View File

@ -65,7 +65,7 @@ struct spnego_neg_state {
struct spnego_neg_ops { struct spnego_neg_ops {
const char *name; const char *name;
/* /*
* The start hook does the initial processing on the incoming paket and * The start hook does the initial processing on the incoming packet and
* may starts the first possible subcontext. It indicates that * may starts the first possible subcontext. It indicates that
* gensec_update() is required on the subcontext by returning * gensec_update() is required on the subcontext by returning
* NT_STATUS_MORE_PROCESSING_REQUIRED and return something useful in * NT_STATUS_MORE_PROCESSING_REQUIRED and return something useful in

View File

@ -85,7 +85,7 @@ NTSTATUS gssapi_obtain_pac_blob(TALLOC_CTX *mem_ctx,
OM_uint32 gss_maj, gss_min; OM_uint32 gss_maj, gss_min;
#ifdef HAVE_GSS_GET_NAME_ATTRIBUTE #ifdef HAVE_GSS_GET_NAME_ATTRIBUTE
/* /*
* gss_get_name_attribute() in MIT krb5 1.10.0 can return unintialized pac_display_buffer * gss_get_name_attribute() in MIT krb5 1.10.0 can return uninitialized pac_display_buffer
* and later gss_release_buffer() will crash on attempting to release it. * and later gss_release_buffer() will crash on attempting to release it.
* *
* So always initialize the buffer descriptors. * So always initialize the buffer descriptors.

View File

@ -309,7 +309,7 @@ NTSTATUS kerberos_decode_pac(TALLOC_CTX *mem_ctx,
memset(srv_sig_wipe->signature.data, memset(srv_sig_wipe->signature.data,
'\0', srv_sig_wipe->signature.length); '\0', srv_sig_wipe->signature.length);
/* and reencode, back into the same place it came from */ /* and re-encode, back into the same place it came from */
ndr_err = ndr_push_struct_blob( ndr_err = ndr_push_struct_blob(
kdc_sig_blob, pac_data_raw, kdc_sig_wipe, kdc_sig_blob, pac_data_raw, kdc_sig_wipe,
(ndr_push_flags_fn_t)ndr_push_PAC_SIGNATURE_DATA); (ndr_push_flags_fn_t)ndr_push_PAC_SIGNATURE_DATA);

View File

@ -63,7 +63,7 @@ struct ntlmssp_state
bool use_ntlmv2; bool use_ntlmv2;
bool use_ccache; bool use_ccache;
bool resume_ccache; bool resume_ccache;
bool use_nt_response; /* Set to 'False' to debug what happens when the NT response is omited */ bool use_nt_response; /* Set to 'False' to debug what happens when the NT response is omitted */
bool allow_lm_response;/* The LM_RESPONSE code is not very secure... */ bool allow_lm_response;/* The LM_RESPONSE code is not very secure... */
bool allow_lm_key; /* The LM_KEY code is not very secure... */ bool allow_lm_key; /* The LM_KEY code is not very secure... */

View File

@ -658,7 +658,7 @@ NTSTATUS ntlmssp_client_challenge(struct gensec_security *gensec_security,
if (!(flags & CLI_CRED_LANMAN_AUTH)) { if (!(flags & CLI_CRED_LANMAN_AUTH)) {
/* LM Key is still possible, just silly, so we do not /* LM Key is still possible, just silly, so we do not
* allow it. Fortunetly all LM crypto is off by * allow it. Fortunately all LM crypto is off by
* default and we require command line options to end * default and we require command line options to end
* up here */ * up here */
ntlmssp_state->neg_flags &= ~NTLMSSP_NEGOTIATE_LM_KEY; ntlmssp_state->neg_flags &= ~NTLMSSP_NEGOTIATE_LM_KEY;

View File

@ -175,7 +175,7 @@ NTSTATUS gensec_ntlmssp_server_negotiate(struct gensec_security *gensec_security
} }
/* The flags we send back are not just the negotiated flags, /* The flags we send back are not just the negotiated flags,
* they are also 'what is in this packet'. Therfore, we * they are also 'what is in this packet'. Therefore, we
* operate on 'chal_flags' from here on * operate on 'chal_flags' from here on
*/ */

View File

@ -793,7 +793,7 @@ NTSTATUS ntlmssp_sign_reset(struct ntlmssp_state *ntlmssp_state,
/* /*
* Key weakening not performed on the master key for NTLM2 * Key weakening not performed on the master key for NTLM2
* and does not occour for NTLM1. Therefore we only need * and does not occur for NTLM1. Therefore we only need
* to do this for the LM_KEY. * to do this for the LM_KEY.
*/ */
if (ntlmssp_state->neg_flags & NTLMSSP_NEGOTIATE_LM_KEY) { if (ntlmssp_state->neg_flags & NTLMSSP_NEGOTIATE_LM_KEY) {