mirror of
https://github.com/samba-team/samba.git
synced 2024-12-22 13:34:15 +03:00
libcli:auth: Fix code spelling
Signed-off-by: Andreas Schneider <asn@samba.org> Reviewed-by: Volker Lendecke <vl@samba.org>
This commit is contained in:
parent
6490ff6355
commit
adcc92f835
@ -24,7 +24,7 @@
|
||||
|
||||
/*
|
||||
this is a tiny msrpc packet generator. I am only using this to
|
||||
avoid tying this code to a particular varient of our rpc code. This
|
||||
avoid tying this code to a particular variant of our rpc code. This
|
||||
generator is not general enough for all our rpc needs, its just
|
||||
enough for the spnego/ntlmssp code
|
||||
|
||||
|
@ -224,7 +224,7 @@ bool extract_pwd_blob_from_buffer514(TALLOC_CTX *mem_ctx,
|
||||
/**
|
||||
* @brief Decode AES password buffer to password in the given charset.
|
||||
*
|
||||
* @param mem_ctx The memory context to allocate the deocded passwrod on.
|
||||
* @param mem_ctx The memory context to allocate the decoded password on.
|
||||
*
|
||||
* @param in_buffer[514] The in buffer with the decrypted password data.
|
||||
*
|
||||
|
@ -34,7 +34,7 @@
|
||||
|
||||
/******************************************************************************
|
||||
Open or create the schannel session store tdb. Non-static so it can
|
||||
be called from parent processes to corectly handle TDB_CLEAR_IF_FIRST
|
||||
be called from parent processes to correctly handle TDB_CLEAR_IF_FIRST
|
||||
*******************************************************************************/
|
||||
|
||||
struct db_context *open_schannel_session_store(TALLOC_CTX *mem_ctx,
|
||||
@ -550,7 +550,7 @@ NTSTATUS schannel_save_challenge(struct loadparm_context *lp_ctx,
|
||||
remote machine stored in the schannel database.
|
||||
|
||||
The credentials are (re)read and from the schannel database, and
|
||||
written back after the caclulations are performed.
|
||||
written back after the calculations are performed.
|
||||
|
||||
If the creds_out parameter is not NULL returns the credentials.
|
||||
********************************************************************/
|
||||
|
@ -131,7 +131,7 @@ char *sess_decrypt_string(TALLOC_CTX *mem_ctx,
|
||||
}
|
||||
|
||||
if (IVAL(out.data, 4) != 1) {
|
||||
DEBUG(0,("Unexpected revision number %d in session crypted string\n",
|
||||
DEBUG(0,("Unexpected revision number %d in session encrypted string\n",
|
||||
IVAL(out.data, 4)));
|
||||
data_blob_free(&out);
|
||||
return NULL;
|
||||
@ -204,7 +204,7 @@ NTSTATUS sess_decrypt_blob(TALLOC_CTX *mem_ctx, const DATA_BLOB *blob, const DAT
|
||||
int rc, slen;
|
||||
|
||||
if (blob->length < 8) {
|
||||
DEBUG(0, ("Unexpected length %d in session crypted secret (BLOB)\n",
|
||||
DEBUG(0, ("Unexpected length %d in session encrypted secret (BLOB)\n",
|
||||
(int)blob->length));
|
||||
return NT_STATUS_INVALID_PARAMETER;
|
||||
}
|
||||
@ -221,14 +221,14 @@ NTSTATUS sess_decrypt_blob(TALLOC_CTX *mem_ctx, const DATA_BLOB *blob, const DAT
|
||||
}
|
||||
|
||||
if (IVAL(out.data, 4) != 1) {
|
||||
DEBUG(2,("Unexpected revision number %d in session crypted secret (BLOB)\n",
|
||||
DEBUG(2,("Unexpected revision number %d in session encrypted secret (BLOB)\n",
|
||||
IVAL(out.data, 4)));
|
||||
return NT_STATUS_UNKNOWN_REVISION;
|
||||
}
|
||||
|
||||
slen = IVAL(out.data, 0);
|
||||
if (slen > blob->length - 8) {
|
||||
DEBUG(0,("Invalid crypt length %d in session crypted secret (BLOB)\n", slen));
|
||||
DEBUG(0,("Invalid crypt length %d in session encrypted secret (BLOB)\n", slen));
|
||||
return NT_STATUS_WRONG_PASSWORD;
|
||||
}
|
||||
|
||||
|
@ -1105,7 +1105,7 @@ NTSTATUS encode_rc4_passwd_buffer(const char *passwd,
|
||||
|
||||
/*
|
||||
* The packet format is the 516 byte RC4 encrypted
|
||||
* pasword followed by the 16 byte counfounder
|
||||
* password followed by the 16 byte counfounder
|
||||
* The confounder is a salt to prevent pre-computed hash attacks on the
|
||||
* database.
|
||||
*/
|
||||
|
Loading…
Reference in New Issue
Block a user