From adcc92f83594abc3ab98fd0f138cdc76d3d2560d Mon Sep 17 00:00:00 2001 From: Andreas Schneider Date: Thu, 27 Apr 2023 15:53:25 +0200 Subject: [PATCH] libcli:auth: Fix code spelling Signed-off-by: Andreas Schneider Reviewed-by: Volker Lendecke --- libcli/auth/msrpc_parse.c | 2 +- libcli/auth/proto.h | 2 +- libcli/auth/schannel_state_tdb.c | 4 ++-- libcli/auth/session.c | 8 ++++---- libcli/auth/smbencrypt.c | 2 +- 5 files changed, 9 insertions(+), 9 deletions(-) diff --git a/libcli/auth/msrpc_parse.c b/libcli/auth/msrpc_parse.c index 86ba2ec00d4..8326261e838 100644 --- a/libcli/auth/msrpc_parse.c +++ b/libcli/auth/msrpc_parse.c @@ -24,7 +24,7 @@ /* this is a tiny msrpc packet generator. I am only using this to - avoid tying this code to a particular varient of our rpc code. This + avoid tying this code to a particular variant of our rpc code. This generator is not general enough for all our rpc needs, its just enough for the spnego/ntlmssp code diff --git a/libcli/auth/proto.h b/libcli/auth/proto.h index f6ca2f1632d..b202542068d 100644 --- a/libcli/auth/proto.h +++ b/libcli/auth/proto.h @@ -224,7 +224,7 @@ bool extract_pwd_blob_from_buffer514(TALLOC_CTX *mem_ctx, /** * @brief Decode AES password buffer to password in the given charset. * - * @param mem_ctx The memory context to allocate the deocded passwrod on. + * @param mem_ctx The memory context to allocate the decoded password on. * * @param in_buffer[514] The in buffer with the decrypted password data. * diff --git a/libcli/auth/schannel_state_tdb.c b/libcli/auth/schannel_state_tdb.c index e0ac8a378a0..ac3654e2c99 100644 --- a/libcli/auth/schannel_state_tdb.c +++ b/libcli/auth/schannel_state_tdb.c @@ -34,7 +34,7 @@ /****************************************************************************** Open or create the schannel session store tdb. Non-static so it can - be called from parent processes to corectly handle TDB_CLEAR_IF_FIRST + be called from parent processes to correctly handle TDB_CLEAR_IF_FIRST *******************************************************************************/ struct db_context *open_schannel_session_store(TALLOC_CTX *mem_ctx, @@ -550,7 +550,7 @@ NTSTATUS schannel_save_challenge(struct loadparm_context *lp_ctx, remote machine stored in the schannel database. The credentials are (re)read and from the schannel database, and - written back after the caclulations are performed. + written back after the calculations are performed. If the creds_out parameter is not NULL returns the credentials. ********************************************************************/ diff --git a/libcli/auth/session.c b/libcli/auth/session.c index 43ce9d54fdc..dba6c5c5b49 100644 --- a/libcli/auth/session.c +++ b/libcli/auth/session.c @@ -131,7 +131,7 @@ char *sess_decrypt_string(TALLOC_CTX *mem_ctx, } if (IVAL(out.data, 4) != 1) { - DEBUG(0,("Unexpected revision number %d in session crypted string\n", + DEBUG(0,("Unexpected revision number %d in session encrypted string\n", IVAL(out.data, 4))); data_blob_free(&out); return NULL; @@ -204,7 +204,7 @@ NTSTATUS sess_decrypt_blob(TALLOC_CTX *mem_ctx, const DATA_BLOB *blob, const DAT int rc, slen; if (blob->length < 8) { - DEBUG(0, ("Unexpected length %d in session crypted secret (BLOB)\n", + DEBUG(0, ("Unexpected length %d in session encrypted secret (BLOB)\n", (int)blob->length)); return NT_STATUS_INVALID_PARAMETER; } @@ -221,14 +221,14 @@ NTSTATUS sess_decrypt_blob(TALLOC_CTX *mem_ctx, const DATA_BLOB *blob, const DAT } if (IVAL(out.data, 4) != 1) { - DEBUG(2,("Unexpected revision number %d in session crypted secret (BLOB)\n", + DEBUG(2,("Unexpected revision number %d in session encrypted secret (BLOB)\n", IVAL(out.data, 4))); return NT_STATUS_UNKNOWN_REVISION; } slen = IVAL(out.data, 0); if (slen > blob->length - 8) { - DEBUG(0,("Invalid crypt length %d in session crypted secret (BLOB)\n", slen)); + DEBUG(0,("Invalid crypt length %d in session encrypted secret (BLOB)\n", slen)); return NT_STATUS_WRONG_PASSWORD; } diff --git a/libcli/auth/smbencrypt.c b/libcli/auth/smbencrypt.c index 8492202ea93..d525b373e86 100644 --- a/libcli/auth/smbencrypt.c +++ b/libcli/auth/smbencrypt.c @@ -1105,7 +1105,7 @@ NTSTATUS encode_rc4_passwd_buffer(const char *passwd, /* * The packet format is the 516 byte RC4 encrypted - * pasword followed by the 16 byte counfounder + * password followed by the 16 byte counfounder * The confounder is a salt to prevent pre-computed hash attacks on the * database. */