1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-22 13:34:15 +03:00

libcli:auth: Fix code spelling

Signed-off-by: Andreas Schneider <asn@samba.org>
Reviewed-by: Volker Lendecke <vl@samba.org>
This commit is contained in:
Andreas Schneider 2023-04-27 15:53:25 +02:00 committed by Volker Lendecke
parent 6490ff6355
commit adcc92f835
5 changed files with 9 additions and 9 deletions

View File

@ -24,7 +24,7 @@
/*
this is a tiny msrpc packet generator. I am only using this to
avoid tying this code to a particular varient of our rpc code. This
avoid tying this code to a particular variant of our rpc code. This
generator is not general enough for all our rpc needs, its just
enough for the spnego/ntlmssp code

View File

@ -224,7 +224,7 @@ bool extract_pwd_blob_from_buffer514(TALLOC_CTX *mem_ctx,
/**
* @brief Decode AES password buffer to password in the given charset.
*
* @param mem_ctx The memory context to allocate the deocded passwrod on.
* @param mem_ctx The memory context to allocate the decoded password on.
*
* @param in_buffer[514] The in buffer with the decrypted password data.
*

View File

@ -34,7 +34,7 @@
/******************************************************************************
Open or create the schannel session store tdb. Non-static so it can
be called from parent processes to corectly handle TDB_CLEAR_IF_FIRST
be called from parent processes to correctly handle TDB_CLEAR_IF_FIRST
*******************************************************************************/
struct db_context *open_schannel_session_store(TALLOC_CTX *mem_ctx,
@ -550,7 +550,7 @@ NTSTATUS schannel_save_challenge(struct loadparm_context *lp_ctx,
remote machine stored in the schannel database.
The credentials are (re)read and from the schannel database, and
written back after the caclulations are performed.
written back after the calculations are performed.
If the creds_out parameter is not NULL returns the credentials.
********************************************************************/

View File

@ -131,7 +131,7 @@ char *sess_decrypt_string(TALLOC_CTX *mem_ctx,
}
if (IVAL(out.data, 4) != 1) {
DEBUG(0,("Unexpected revision number %d in session crypted string\n",
DEBUG(0,("Unexpected revision number %d in session encrypted string\n",
IVAL(out.data, 4)));
data_blob_free(&out);
return NULL;
@ -204,7 +204,7 @@ NTSTATUS sess_decrypt_blob(TALLOC_CTX *mem_ctx, const DATA_BLOB *blob, const DAT
int rc, slen;
if (blob->length < 8) {
DEBUG(0, ("Unexpected length %d in session crypted secret (BLOB)\n",
DEBUG(0, ("Unexpected length %d in session encrypted secret (BLOB)\n",
(int)blob->length));
return NT_STATUS_INVALID_PARAMETER;
}
@ -221,14 +221,14 @@ NTSTATUS sess_decrypt_blob(TALLOC_CTX *mem_ctx, const DATA_BLOB *blob, const DAT
}
if (IVAL(out.data, 4) != 1) {
DEBUG(2,("Unexpected revision number %d in session crypted secret (BLOB)\n",
DEBUG(2,("Unexpected revision number %d in session encrypted secret (BLOB)\n",
IVAL(out.data, 4)));
return NT_STATUS_UNKNOWN_REVISION;
}
slen = IVAL(out.data, 0);
if (slen > blob->length - 8) {
DEBUG(0,("Invalid crypt length %d in session crypted secret (BLOB)\n", slen));
DEBUG(0,("Invalid crypt length %d in session encrypted secret (BLOB)\n", slen));
return NT_STATUS_WRONG_PASSWORD;
}

View File

@ -1105,7 +1105,7 @@ NTSTATUS encode_rc4_passwd_buffer(const char *passwd,
/*
* The packet format is the 516 byte RC4 encrypted
* pasword followed by the 16 byte counfounder
* password followed by the 16 byte counfounder
* The confounder is a salt to prevent pre-computed hash attacks on the
* database.
*/