1
0
mirror of https://github.com/samba-team/samba.git synced 2025-01-08 21:18:16 +03:00

auth: Fix code spelling

Signed-off-by: Joseph Sutton <josephsutton@catalyst.net.nz>
Reviewed-by: Andrew Bartlett <abartlet@samba.org>
This commit is contained in:
Joseph Sutton 2023-09-05 16:02:59 +12:00 committed by Andrew Bartlett
parent f51efc4008
commit e69ba9a0a3
4 changed files with 7 additions and 7 deletions

View File

@ -460,7 +460,7 @@ NTSTATUS auth_convert_user_info_dc_saminfo2(TALLOC_CTX *mem_ctx,
sam2->base = sam6->base; sam2->base = sam6->base;
/* /*
* We have nowhere to put sam6->sids, so we follow Windows here and drop * We have nowhere to put sam6->sids, so we follow Windows here and drop
* it. Any resource groups it happened to be contain are lost. * it. Any resource groups it happened to contain are lost.
*/ */
sam2->base.user_flags &= ~NETLOGON_EXTRA_SIDS; sam2->base.user_flags &= ~NETLOGON_EXTRA_SIDS;
TALLOC_FREE(sam6->sids); TALLOC_FREE(sam6->sids);

View File

@ -506,7 +506,7 @@ static krb5_error_code krb5_cc_remove_cred_wrap(struct ccache_container *ccc,
#endif #endif
/* /*
* Indicate the we failed to log in to this service/host with these * Indicate that we failed to log in to this service/host with these
* credentials. The caller passes an unsigned int which they * credentials. The caller passes an unsigned int which they
* initialise to the number of times they would like to retry. * initialise to the number of times they would like to retry.
* *
@ -856,7 +856,7 @@ _PUBLIC_ int cli_credentials_get_client_gss_creds(struct cli_credentials *cred,
DEBUG(3, ("Credentials for %s will expire shortly (%u sec), must refresh credentials cache\n", cli_credentials_get_principal(cred, cred), lifetime)); DEBUG(3, ("Credentials for %s will expire shortly (%u sec), must refresh credentials cache\n", cli_credentials_get_principal(cred, cred), lifetime));
expired = true; expired = true;
} else if (maj_stat != GSS_S_COMPLETE) { } else if (maj_stat != GSS_S_COMPLETE) {
*error_string = talloc_asprintf(cred, "inquiry of credential lifefime via GSSAPI gss_inquire_cred failed: %s\n", *error_string = talloc_asprintf(cred, "inquiry of credential lifetime via GSSAPI gss_inquire_cred failed: %s\n",
gssapi_error_string(cred, maj_stat, min_stat, NULL)); gssapi_error_string(cred, maj_stat, min_stat, NULL));
return EINVAL; return EINVAL;
} }
@ -1050,7 +1050,7 @@ _PUBLIC_ int cli_credentials_get_client_gss_creds(struct cli_credentials *cred,
gcc->creds = gssapi_cred; gcc->creds = gssapi_cred;
talloc_set_destructor(gcc, free_gssapi_creds); talloc_set_destructor(gcc, free_gssapi_creds);
/* set the clinet_gss_creds_obtained here, as it just /* set the client_gss_creds_obtained here, as it just
got set to UNINITIALISED by the calls above */ got set to UNINITIALISED by the calls above */
cred->client_gss_creds_obtained = obtained; cred->client_gss_creds_obtained = obtained;
cred->client_gss_creds = gcc; cred->client_gss_creds = gcc;

View File

@ -76,7 +76,7 @@ bool gensec_security_ops_enabled(const struct gensec_security_ops *ops, struct g
* only add non-kerberos mechs * only add non-kerberos mechs
* *
* Once we get things like NegoEx or moonshot, this will of course get * Once we get things like NegoEx or moonshot, this will of course get
* more compplex. * more complex.
*/ */
static const struct gensec_security_ops **gensec_use_kerberos_mechs( static const struct gensec_security_ops **gensec_use_kerberos_mechs(

View File

@ -359,7 +359,7 @@ NTSTATUS ntlmssp_seal_packet(struct ntlmssp_state *ntlmssp_state,
* The order of these two operations matters - we * The order of these two operations matters - we
* must first seal the packet, then seal the * must first seal the packet, then seal the
* sequence number - this is because the * sequence number - this is because the
* send_seal_hash is not constant, but is is rather * send_seal_hash is not constant, but is rather
* updated with each iteration * updated with each iteration
*/ */
nt_status = ntlmssp_make_packet_signature(ntlmssp_state, nt_status = ntlmssp_make_packet_signature(ntlmssp_state,
@ -411,7 +411,7 @@ NTSTATUS ntlmssp_seal_packet(struct ntlmssp_state *ntlmssp_state,
* The order of these two operations matters - we * The order of these two operations matters - we
* must first seal the packet, then seal the * must first seal the packet, then seal the
* sequence number - this is because the ntlmv1_arc4_state * sequence number - this is because the ntlmv1_arc4_state
* is not constant, but is is rather updated with * is not constant, but is rather updated with
* each iteration * each iteration
*/ */
dump_arc4_state("ntlmv1 arc4 state:\n", dump_arc4_state("ntlmv1 arc4 state:\n",