1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-22 13:34:15 +03:00

auth: Fix code spelling

Signed-off-by: Joseph Sutton <josephsutton@catalyst.net.nz>
Reviewed-by: Andrew Bartlett <abartlet@samba.org>
This commit is contained in:
Joseph Sutton 2023-09-05 16:02:59 +12:00 committed by Andrew Bartlett
parent f51efc4008
commit e69ba9a0a3
4 changed files with 7 additions and 7 deletions

View File

@ -460,7 +460,7 @@ NTSTATUS auth_convert_user_info_dc_saminfo2(TALLOC_CTX *mem_ctx,
sam2->base = sam6->base;
/*
* We have nowhere to put sam6->sids, so we follow Windows here and drop
* it. Any resource groups it happened to be contain are lost.
* it. Any resource groups it happened to contain are lost.
*/
sam2->base.user_flags &= ~NETLOGON_EXTRA_SIDS;
TALLOC_FREE(sam6->sids);

View File

@ -506,7 +506,7 @@ static krb5_error_code krb5_cc_remove_cred_wrap(struct ccache_container *ccc,
#endif
/*
* Indicate the we failed to log in to this service/host with these
* Indicate that we failed to log in to this service/host with these
* credentials. The caller passes an unsigned int which they
* initialise to the number of times they would like to retry.
*
@ -856,7 +856,7 @@ _PUBLIC_ int cli_credentials_get_client_gss_creds(struct cli_credentials *cred,
DEBUG(3, ("Credentials for %s will expire shortly (%u sec), must refresh credentials cache\n", cli_credentials_get_principal(cred, cred), lifetime));
expired = true;
} else if (maj_stat != GSS_S_COMPLETE) {
*error_string = talloc_asprintf(cred, "inquiry of credential lifefime via GSSAPI gss_inquire_cred failed: %s\n",
*error_string = talloc_asprintf(cred, "inquiry of credential lifetime via GSSAPI gss_inquire_cred failed: %s\n",
gssapi_error_string(cred, maj_stat, min_stat, NULL));
return EINVAL;
}
@ -1050,7 +1050,7 @@ _PUBLIC_ int cli_credentials_get_client_gss_creds(struct cli_credentials *cred,
gcc->creds = gssapi_cred;
talloc_set_destructor(gcc, free_gssapi_creds);
/* set the clinet_gss_creds_obtained here, as it just
/* set the client_gss_creds_obtained here, as it just
got set to UNINITIALISED by the calls above */
cred->client_gss_creds_obtained = obtained;
cred->client_gss_creds = gcc;

View File

@ -76,7 +76,7 @@ bool gensec_security_ops_enabled(const struct gensec_security_ops *ops, struct g
* only add non-kerberos mechs
*
* Once we get things like NegoEx or moonshot, this will of course get
* more compplex.
* more complex.
*/
static const struct gensec_security_ops **gensec_use_kerberos_mechs(

View File

@ -359,7 +359,7 @@ NTSTATUS ntlmssp_seal_packet(struct ntlmssp_state *ntlmssp_state,
* The order of these two operations matters - we
* must first seal the packet, then seal the
* sequence number - this is because the
* send_seal_hash is not constant, but is is rather
* send_seal_hash is not constant, but is rather
* updated with each iteration
*/
nt_status = ntlmssp_make_packet_signature(ntlmssp_state,
@ -411,7 +411,7 @@ NTSTATUS ntlmssp_seal_packet(struct ntlmssp_state *ntlmssp_state,
* The order of these two operations matters - we
* must first seal the packet, then seal the
* sequence number - this is because the ntlmv1_arc4_state
* is not constant, but is is rather updated with
* is not constant, but is rather updated with
* each iteration
*/
dump_arc4_state("ntlmv1 arc4 state:\n",