mirror of
https://github.com/samba-team/samba.git
synced 2024-12-22 13:34:15 +03:00
auth: Fix code spelling
Signed-off-by: Joseph Sutton <josephsutton@catalyst.net.nz> Reviewed-by: Andrew Bartlett <abartlet@samba.org>
This commit is contained in:
parent
f51efc4008
commit
e69ba9a0a3
@ -460,7 +460,7 @@ NTSTATUS auth_convert_user_info_dc_saminfo2(TALLOC_CTX *mem_ctx,
|
||||
sam2->base = sam6->base;
|
||||
/*
|
||||
* We have nowhere to put sam6->sids, so we follow Windows here and drop
|
||||
* it. Any resource groups it happened to be contain are lost.
|
||||
* it. Any resource groups it happened to contain are lost.
|
||||
*/
|
||||
sam2->base.user_flags &= ~NETLOGON_EXTRA_SIDS;
|
||||
TALLOC_FREE(sam6->sids);
|
||||
|
@ -506,7 +506,7 @@ static krb5_error_code krb5_cc_remove_cred_wrap(struct ccache_container *ccc,
|
||||
#endif
|
||||
|
||||
/*
|
||||
* Indicate the we failed to log in to this service/host with these
|
||||
* Indicate that we failed to log in to this service/host with these
|
||||
* credentials. The caller passes an unsigned int which they
|
||||
* initialise to the number of times they would like to retry.
|
||||
*
|
||||
@ -856,7 +856,7 @@ _PUBLIC_ int cli_credentials_get_client_gss_creds(struct cli_credentials *cred,
|
||||
DEBUG(3, ("Credentials for %s will expire shortly (%u sec), must refresh credentials cache\n", cli_credentials_get_principal(cred, cred), lifetime));
|
||||
expired = true;
|
||||
} else if (maj_stat != GSS_S_COMPLETE) {
|
||||
*error_string = talloc_asprintf(cred, "inquiry of credential lifefime via GSSAPI gss_inquire_cred failed: %s\n",
|
||||
*error_string = talloc_asprintf(cred, "inquiry of credential lifetime via GSSAPI gss_inquire_cred failed: %s\n",
|
||||
gssapi_error_string(cred, maj_stat, min_stat, NULL));
|
||||
return EINVAL;
|
||||
}
|
||||
@ -1050,7 +1050,7 @@ _PUBLIC_ int cli_credentials_get_client_gss_creds(struct cli_credentials *cred,
|
||||
gcc->creds = gssapi_cred;
|
||||
talloc_set_destructor(gcc, free_gssapi_creds);
|
||||
|
||||
/* set the clinet_gss_creds_obtained here, as it just
|
||||
/* set the client_gss_creds_obtained here, as it just
|
||||
got set to UNINITIALISED by the calls above */
|
||||
cred->client_gss_creds_obtained = obtained;
|
||||
cred->client_gss_creds = gcc;
|
||||
|
@ -76,7 +76,7 @@ bool gensec_security_ops_enabled(const struct gensec_security_ops *ops, struct g
|
||||
* only add non-kerberos mechs
|
||||
*
|
||||
* Once we get things like NegoEx or moonshot, this will of course get
|
||||
* more compplex.
|
||||
* more complex.
|
||||
*/
|
||||
|
||||
static const struct gensec_security_ops **gensec_use_kerberos_mechs(
|
||||
|
@ -359,7 +359,7 @@ NTSTATUS ntlmssp_seal_packet(struct ntlmssp_state *ntlmssp_state,
|
||||
* The order of these two operations matters - we
|
||||
* must first seal the packet, then seal the
|
||||
* sequence number - this is because the
|
||||
* send_seal_hash is not constant, but is is rather
|
||||
* send_seal_hash is not constant, but is rather
|
||||
* updated with each iteration
|
||||
*/
|
||||
nt_status = ntlmssp_make_packet_signature(ntlmssp_state,
|
||||
@ -411,7 +411,7 @@ NTSTATUS ntlmssp_seal_packet(struct ntlmssp_state *ntlmssp_state,
|
||||
* The order of these two operations matters - we
|
||||
* must first seal the packet, then seal the
|
||||
* sequence number - this is because the ntlmv1_arc4_state
|
||||
* is not constant, but is is rather updated with
|
||||
* is not constant, but is rather updated with
|
||||
* each iteration
|
||||
*/
|
||||
dump_arc4_state("ntlmv1 arc4 state:\n",
|
||||
|
Loading…
Reference in New Issue
Block a user