From e69ba9a0a38ff63cb19eaad73501e186a1101d20 Mon Sep 17 00:00:00 2001 From: Joseph Sutton Date: Tue, 5 Sep 2023 16:02:59 +1200 Subject: [PATCH] auth: Fix code spelling Signed-off-by: Joseph Sutton Reviewed-by: Andrew Bartlett --- auth/auth_sam_reply.c | 2 +- auth/credentials/credentials_krb5.c | 6 +++--- auth/gensec/gensec_start.c | 2 +- auth/ntlmssp/ntlmssp_sign.c | 4 ++-- 4 files changed, 7 insertions(+), 7 deletions(-) diff --git a/auth/auth_sam_reply.c b/auth/auth_sam_reply.c index 27f04e86434..8c0ebe5f156 100644 --- a/auth/auth_sam_reply.c +++ b/auth/auth_sam_reply.c @@ -460,7 +460,7 @@ NTSTATUS auth_convert_user_info_dc_saminfo2(TALLOC_CTX *mem_ctx, sam2->base = sam6->base; /* * We have nowhere to put sam6->sids, so we follow Windows here and drop - * it. Any resource groups it happened to be contain are lost. + * it. Any resource groups it happened to contain are lost. */ sam2->base.user_flags &= ~NETLOGON_EXTRA_SIDS; TALLOC_FREE(sam6->sids); diff --git a/auth/credentials/credentials_krb5.c b/auth/credentials/credentials_krb5.c index 0ce70557c58..7d7d0248cb4 100644 --- a/auth/credentials/credentials_krb5.c +++ b/auth/credentials/credentials_krb5.c @@ -506,7 +506,7 @@ static krb5_error_code krb5_cc_remove_cred_wrap(struct ccache_container *ccc, #endif /* - * Indicate the we failed to log in to this service/host with these + * Indicate that we failed to log in to this service/host with these * credentials. The caller passes an unsigned int which they * initialise to the number of times they would like to retry. * @@ -856,7 +856,7 @@ _PUBLIC_ int cli_credentials_get_client_gss_creds(struct cli_credentials *cred, DEBUG(3, ("Credentials for %s will expire shortly (%u sec), must refresh credentials cache\n", cli_credentials_get_principal(cred, cred), lifetime)); expired = true; } else if (maj_stat != GSS_S_COMPLETE) { - *error_string = talloc_asprintf(cred, "inquiry of credential lifefime via GSSAPI gss_inquire_cred failed: %s\n", + *error_string = talloc_asprintf(cred, "inquiry of credential lifetime via GSSAPI gss_inquire_cred failed: %s\n", gssapi_error_string(cred, maj_stat, min_stat, NULL)); return EINVAL; } @@ -1050,7 +1050,7 @@ _PUBLIC_ int cli_credentials_get_client_gss_creds(struct cli_credentials *cred, gcc->creds = gssapi_cred; talloc_set_destructor(gcc, free_gssapi_creds); - /* set the clinet_gss_creds_obtained here, as it just + /* set the client_gss_creds_obtained here, as it just got set to UNINITIALISED by the calls above */ cred->client_gss_creds_obtained = obtained; cred->client_gss_creds = gcc; diff --git a/auth/gensec/gensec_start.c b/auth/gensec/gensec_start.c index b6979812ac0..3a3165b52eb 100644 --- a/auth/gensec/gensec_start.c +++ b/auth/gensec/gensec_start.c @@ -76,7 +76,7 @@ bool gensec_security_ops_enabled(const struct gensec_security_ops *ops, struct g * only add non-kerberos mechs * * Once we get things like NegoEx or moonshot, this will of course get - * more compplex. + * more complex. */ static const struct gensec_security_ops **gensec_use_kerberos_mechs( diff --git a/auth/ntlmssp/ntlmssp_sign.c b/auth/ntlmssp/ntlmssp_sign.c index b9be182e3f2..404129a0ecd 100644 --- a/auth/ntlmssp/ntlmssp_sign.c +++ b/auth/ntlmssp/ntlmssp_sign.c @@ -359,7 +359,7 @@ NTSTATUS ntlmssp_seal_packet(struct ntlmssp_state *ntlmssp_state, * The order of these two operations matters - we * must first seal the packet, then seal the * sequence number - this is because the - * send_seal_hash is not constant, but is is rather + * send_seal_hash is not constant, but is rather * updated with each iteration */ nt_status = ntlmssp_make_packet_signature(ntlmssp_state, @@ -411,7 +411,7 @@ NTSTATUS ntlmssp_seal_packet(struct ntlmssp_state *ntlmssp_state, * The order of these two operations matters - we * must first seal the packet, then seal the * sequence number - this is because the ntlmv1_arc4_state - * is not constant, but is is rather updated with + * is not constant, but is rather updated with * each iteration */ dump_arc4_state("ntlmv1 arc4 state:\n",