auth: Fix code spelling
authorJoseph Sutton <josephsutton@catalyst.net.nz>
Tue, 5 Sep 2023 04:02:59 +0000 (16:02 +1200)
committerAndrew Bartlett <abartlet@samba.org>
Mon, 11 Sep 2023 02:42:41 +0000 (02:42 +0000)
Signed-off-by: Joseph Sutton <josephsutton@catalyst.net.nz>
Reviewed-by: Andrew Bartlett <abartlet@samba.org>
auth/auth_sam_reply.c
auth/credentials/credentials_krb5.c
auth/gensec/gensec_start.c
auth/ntlmssp/ntlmssp_sign.c

index 27f04e86434c9fa9f0b626aa569d86895045082b..8c0ebe5f156c5599dc47cf4d435e8a325738da6c 100644 (file)
@@ -460,7 +460,7 @@ NTSTATUS auth_convert_user_info_dc_saminfo2(TALLOC_CTX *mem_ctx,
        sam2->base      = sam6->base;
        /*
         * We have nowhere to put sam6->sids, so we follow Windows here and drop
-        * it. Any resource groups it happened to be contain are lost.
+        * it. Any resource groups it happened to contain are lost.
         */
        sam2->base.user_flags &= ~NETLOGON_EXTRA_SIDS;
        TALLOC_FREE(sam6->sids);
index 0ce70557c581eddbd49abca4546769b2845ec47a..7d7d0248cb42f8801ec5a2f071269d1dc1ac5ad5 100644 (file)
@@ -506,7 +506,7 @@ static krb5_error_code krb5_cc_remove_cred_wrap(struct ccache_container *ccc,
 #endif
 
 /*
- * Indicate the we failed to log in to this service/host with these
+ * Indicate that we failed to log in to this service/host with these
  * credentials.  The caller passes an unsigned int which they
  * initialise to the number of times they would like to retry.
  *
@@ -856,7 +856,7 @@ _PUBLIC_ int cli_credentials_get_client_gss_creds(struct cli_credentials *cred,
                        DEBUG(3, ("Credentials for %s will expire shortly (%u sec), must refresh credentials cache\n", cli_credentials_get_principal(cred, cred), lifetime));
                        expired = true;
                } else if (maj_stat != GSS_S_COMPLETE) {
-                       *error_string = talloc_asprintf(cred, "inquiry of credential lifefime via GSSAPI gss_inquire_cred failed: %s\n",
+                       *error_string = talloc_asprintf(cred, "inquiry of credential lifetime via GSSAPI gss_inquire_cred failed: %s\n",
                                                        gssapi_error_string(cred, maj_stat, min_stat, NULL));
                        return EINVAL;
                }
@@ -1050,7 +1050,7 @@ _PUBLIC_ int cli_credentials_get_client_gss_creds(struct cli_credentials *cred,
                gcc->creds = gssapi_cred;
                talloc_set_destructor(gcc, free_gssapi_creds);
 
-               /* set the clinet_gss_creds_obtained here, as it just
+               /* set the client_gss_creds_obtained here, as it just
                   got set to UNINITIALISED by the calls above */
                cred->client_gss_creds_obtained = obtained;
                cred->client_gss_creds = gcc;
index b6979812ac0eeeefff6bfaaa41dc7a6eaf29aab1..3a3165b52eb7d40995a5a379d4ef5adbd15c4a25 100644 (file)
@@ -76,7 +76,7 @@ bool gensec_security_ops_enabled(const struct gensec_security_ops *ops, struct g
  *   only add non-kerberos mechs
  *
  * Once we get things like NegoEx or moonshot, this will of course get
- * more compplex.
+ * more complex.
  */
 
 static const struct gensec_security_ops **gensec_use_kerberos_mechs(
index b9be182e3f260a5095f031e73d2499f43b8bb882..404129a0ecdd8458d2349139bcc1fdef0efa2e9c 100644 (file)
@@ -359,7 +359,7 @@ NTSTATUS ntlmssp_seal_packet(struct ntlmssp_state *ntlmssp_state,
                 * The order of these two operations matters - we
                 * must first seal the packet, then seal the
                 * sequence number - this is because the
-                * send_seal_hash is not constant, but is is rather
+                * send_seal_hash is not constant, but is rather
                 * updated with each iteration
                 */
                nt_status = ntlmssp_make_packet_signature(ntlmssp_state,
@@ -411,7 +411,7 @@ NTSTATUS ntlmssp_seal_packet(struct ntlmssp_state *ntlmssp_state,
                 * The order of these two operations matters - we
                 * must first seal the packet, then seal the
                 * sequence number - this is because the ntlmv1_arc4_state
-                * is not constant, but is is rather updated with
+                * is not constant, but is rather updated with
                 * each iteration
                 */
                dump_arc4_state("ntlmv1 arc4 state:\n",