mirror of
https://github.com/samba-team/samba.git
synced 2025-01-03 01:18:10 +03:00
auth: Fix code spelling
Best reviewed with: `git show --word-diff` Signed-off-by: Andreas Schneider <asn@samba.org> Reviewed-by: Rowland Penny <rpenny@samba.org>
This commit is contained in:
parent
71eb85bc25
commit
98c14205a0
@ -124,7 +124,7 @@ static enum event_logon_type get_logon_type(
|
||||
*
|
||||
* IF adding a new field please update the minor version number AUTH_MINOR
|
||||
*
|
||||
* To process the resulting log lines from the commend line use jq to
|
||||
* To process the resulting log lines from the command line use jq to
|
||||
* parse the json.
|
||||
*
|
||||
* grep "^ {" log file |
|
||||
@ -345,7 +345,7 @@ failure:
|
||||
*
|
||||
* IF adding a new field please update the minor version number AUTHZ_MINOR
|
||||
*
|
||||
* To process the resulting log lines from the commend line use jq to
|
||||
* To process the resulting log lines from the command line use jq to
|
||||
* parse the json.
|
||||
*
|
||||
* grep "^ {" log_file |\
|
||||
|
@ -37,7 +37,7 @@ enum auth_password_state {
|
||||
|
||||
#define AUTH_SESSION_INFO_DEFAULT_GROUPS 0x01 /* Add the user to the default world and network groups */
|
||||
#define AUTH_SESSION_INFO_AUTHENTICATED 0x02 /* Add the user to the 'authenticated users' group */
|
||||
#define AUTH_SESSION_INFO_SIMPLE_PRIVILEGES 0x04 /* Use a trivial map between users and privilages, rather than a DB */
|
||||
#define AUTH_SESSION_INFO_SIMPLE_PRIVILEGES 0x04 /* Use a trivial map between users and privileges, rather than a DB */
|
||||
#define AUTH_SESSION_INFO_UNIX_TOKEN 0x08 /* The returned token must have the unix_token and unix_info elements provided */
|
||||
#define AUTH_SESSION_INFO_NTLM 0x10 /* The returned token must have authenticated-with-NTLM flag set */
|
||||
|
||||
|
@ -210,7 +210,7 @@ _PUBLIC_ const char *cli_credentials_get_username(struct cli_credentials *cred)
|
||||
*
|
||||
* @param[in] obtained A pointer to store the obtained information.
|
||||
*
|
||||
* return The user name or NULL if an error occured.
|
||||
* return The user name or NULL if an error occurred.
|
||||
*/
|
||||
_PUBLIC_ const char *
|
||||
cli_credentials_get_username_and_obtained(struct cli_credentials *cred,
|
||||
@ -259,7 +259,7 @@ _PUBLIC_ bool cli_credentials_set_bind_dn(struct cli_credentials *cred,
|
||||
* Obtain the BIND DN for this credentials context.
|
||||
* @param cred credentials context
|
||||
* @retval The username set on this context.
|
||||
* @note Return value will be NULL if not specified explictly
|
||||
* @note Return value will be NULL if not specified explicitly
|
||||
*/
|
||||
_PUBLIC_ const char *cli_credentials_get_bind_dn(struct cli_credentials *cred)
|
||||
{
|
||||
@ -459,7 +459,7 @@ _PUBLIC_ const char *cli_credentials_get_password(struct cli_credentials *cred)
|
||||
*
|
||||
* @param[in] obtained A pointer to store the obtained information.
|
||||
*
|
||||
* return The user name or NULL if an error occured.
|
||||
* return The user name or NULL if an error occurred.
|
||||
*/
|
||||
_PUBLIC_ const char *
|
||||
cli_credentials_get_password_and_obtained(struct cli_credentials *cred,
|
||||
@ -1290,7 +1290,7 @@ _PUBLIC_ void cli_credentials_set_secure_channel_type(struct cli_credentials *cr
|
||||
}
|
||||
|
||||
/**
|
||||
* Return NETLOGON secure chanel type
|
||||
* Return NETLOGON secure channel type
|
||||
*/
|
||||
|
||||
_PUBLIC_ time_t cli_credentials_get_password_last_changed_time(struct cli_credentials *cred)
|
||||
@ -1309,7 +1309,7 @@ _PUBLIC_ void cli_credentials_set_password_last_changed_time(struct cli_credenti
|
||||
}
|
||||
|
||||
/**
|
||||
* Return NETLOGON secure chanel type
|
||||
* Return NETLOGON secure channel type
|
||||
*/
|
||||
|
||||
_PUBLIC_ enum netr_SchannelType cli_credentials_get_secure_channel_type(struct cli_credentials *cred)
|
||||
|
@ -110,7 +110,7 @@ struct cli_credentials {
|
||||
/* Should we get a forwardable ticket? */
|
||||
enum credentials_krb_forwardable krb_forwardable;
|
||||
|
||||
/* Forced SASL mechansim */
|
||||
/* Forced SASL mechanism */
|
||||
char *forced_sasl_mech;
|
||||
|
||||
/* gensec features which should be used for connections */
|
||||
|
@ -996,7 +996,7 @@ _PUBLIC_ int cli_credentials_get_client_gss_creds(struct cli_credentials *cred,
|
||||
ccache out of it. This routine can be generalised in future for
|
||||
the case where we deal with GSSAPI mechs other than krb5.
|
||||
|
||||
On sucess, the caller must not free gssapi_cred, as it now belongs
|
||||
On success, the caller must not free gssapi_cred, as it now belongs
|
||||
to the credentials system.
|
||||
*/
|
||||
|
||||
|
@ -870,7 +870,7 @@ static NTSTATUS gensec_start_mech(struct gensec_security *gensec_security)
|
||||
}
|
||||
|
||||
/**
|
||||
* Start a GENSEC sub-mechanism with a specified mechansim structure, used in SPNEGO
|
||||
* Start a GENSEC sub-mechanism with a specified mechanism structure, used in SPNEGO
|
||||
*
|
||||
*/
|
||||
|
||||
|
@ -120,7 +120,7 @@ static bool gensec_gssapi_check_oid(const DATA_BLOB *blob, const char *oid)
|
||||
}
|
||||
|
||||
/**
|
||||
* Check if the packet is one for the KRB5 mechansim
|
||||
* Check if the packet is one for the KRB5 mechanism
|
||||
*
|
||||
* NOTE: This is a helper that can be employed by multiple mechanisms, do
|
||||
* not make assumptions about the private_data
|
||||
|
@ -1068,7 +1068,7 @@ static NTSTATUS schannel_session_info(struct gensec_security *gensec_security,
|
||||
}
|
||||
|
||||
/*
|
||||
* Reduce the attack surface by ensuring schannel is not availble when
|
||||
* Reduce the attack surface by ensuring schannel is not available when
|
||||
* we are not a DC
|
||||
*/
|
||||
static NTSTATUS schannel_server_start(struct gensec_security *gensec_security)
|
||||
|
@ -65,7 +65,7 @@ struct spnego_neg_state {
|
||||
struct spnego_neg_ops {
|
||||
const char *name;
|
||||
/*
|
||||
* The start hook does the initial processing on the incoming paket and
|
||||
* The start hook does the initial processing on the incoming packet and
|
||||
* may starts the first possible subcontext. It indicates that
|
||||
* gensec_update() is required on the subcontext by returning
|
||||
* NT_STATUS_MORE_PROCESSING_REQUIRED and return something useful in
|
||||
|
@ -85,7 +85,7 @@ NTSTATUS gssapi_obtain_pac_blob(TALLOC_CTX *mem_ctx,
|
||||
OM_uint32 gss_maj, gss_min;
|
||||
#ifdef HAVE_GSS_GET_NAME_ATTRIBUTE
|
||||
/*
|
||||
* gss_get_name_attribute() in MIT krb5 1.10.0 can return unintialized pac_display_buffer
|
||||
* gss_get_name_attribute() in MIT krb5 1.10.0 can return uninitialized pac_display_buffer
|
||||
* and later gss_release_buffer() will crash on attempting to release it.
|
||||
*
|
||||
* So always initialize the buffer descriptors.
|
||||
|
@ -309,7 +309,7 @@ NTSTATUS kerberos_decode_pac(TALLOC_CTX *mem_ctx,
|
||||
memset(srv_sig_wipe->signature.data,
|
||||
'\0', srv_sig_wipe->signature.length);
|
||||
|
||||
/* and reencode, back into the same place it came from */
|
||||
/* and re-encode, back into the same place it came from */
|
||||
ndr_err = ndr_push_struct_blob(
|
||||
kdc_sig_blob, pac_data_raw, kdc_sig_wipe,
|
||||
(ndr_push_flags_fn_t)ndr_push_PAC_SIGNATURE_DATA);
|
||||
|
@ -63,7 +63,7 @@ struct ntlmssp_state
|
||||
bool use_ntlmv2;
|
||||
bool use_ccache;
|
||||
bool resume_ccache;
|
||||
bool use_nt_response; /* Set to 'False' to debug what happens when the NT response is omited */
|
||||
bool use_nt_response; /* Set to 'False' to debug what happens when the NT response is omitted */
|
||||
bool allow_lm_response;/* The LM_RESPONSE code is not very secure... */
|
||||
bool allow_lm_key; /* The LM_KEY code is not very secure... */
|
||||
|
||||
|
@ -658,7 +658,7 @@ NTSTATUS ntlmssp_client_challenge(struct gensec_security *gensec_security,
|
||||
|
||||
if (!(flags & CLI_CRED_LANMAN_AUTH)) {
|
||||
/* LM Key is still possible, just silly, so we do not
|
||||
* allow it. Fortunetly all LM crypto is off by
|
||||
* allow it. Fortunately all LM crypto is off by
|
||||
* default and we require command line options to end
|
||||
* up here */
|
||||
ntlmssp_state->neg_flags &= ~NTLMSSP_NEGOTIATE_LM_KEY;
|
||||
|
@ -175,7 +175,7 @@ NTSTATUS gensec_ntlmssp_server_negotiate(struct gensec_security *gensec_security
|
||||
}
|
||||
|
||||
/* The flags we send back are not just the negotiated flags,
|
||||
* they are also 'what is in this packet'. Therfore, we
|
||||
* they are also 'what is in this packet'. Therefore, we
|
||||
* operate on 'chal_flags' from here on
|
||||
*/
|
||||
|
||||
|
@ -793,7 +793,7 @@ NTSTATUS ntlmssp_sign_reset(struct ntlmssp_state *ntlmssp_state,
|
||||
|
||||
/*
|
||||
* Key weakening not performed on the master key for NTLM2
|
||||
* and does not occour for NTLM1. Therefore we only need
|
||||
* and does not occur for NTLM1. Therefore we only need
|
||||
* to do this for the LM_KEY.
|
||||
*/
|
||||
if (ntlmssp_state->neg_flags & NTLMSSP_NEGOTIATE_LM_KEY) {
|
||||
|
Loading…
Reference in New Issue
Block a user