sam2->base = sam6->base;
/*
* We have nowhere to put sam6->sids, so we follow Windows here and drop
- * it. Any resource groups it happened to be contain are lost.
+ * it. Any resource groups it happened to contain are lost.
*/
sam2->base.user_flags &= ~NETLOGON_EXTRA_SIDS;
TALLOC_FREE(sam6->sids);
#endif
/*
- * Indicate the we failed to log in to this service/host with these
+ * Indicate that we failed to log in to this service/host with these
* credentials. The caller passes an unsigned int which they
* initialise to the number of times they would like to retry.
*
DEBUG(3, ("Credentials for %s will expire shortly (%u sec), must refresh credentials cache\n", cli_credentials_get_principal(cred, cred), lifetime));
expired = true;
} else if (maj_stat != GSS_S_COMPLETE) {
- *error_string = talloc_asprintf(cred, "inquiry of credential lifefime via GSSAPI gss_inquire_cred failed: %s\n",
+ *error_string = talloc_asprintf(cred, "inquiry of credential lifetime via GSSAPI gss_inquire_cred failed: %s\n",
gssapi_error_string(cred, maj_stat, min_stat, NULL));
return EINVAL;
}
gcc->creds = gssapi_cred;
talloc_set_destructor(gcc, free_gssapi_creds);
- /* set the clinet_gss_creds_obtained here, as it just
+ /* set the client_gss_creds_obtained here, as it just
got set to UNINITIALISED by the calls above */
cred->client_gss_creds_obtained = obtained;
cred->client_gss_creds = gcc;
* The order of these two operations matters - we
* must first seal the packet, then seal the
* sequence number - this is because the
- * send_seal_hash is not constant, but is is rather
+ * send_seal_hash is not constant, but is rather
* updated with each iteration
*/
nt_status = ntlmssp_make_packet_signature(ntlmssp_state,
* The order of these two operations matters - we
* must first seal the packet, then seal the
* sequence number - this is because the ntlmv1_arc4_state
- * is not constant, but is is rather updated with
+ * is not constant, but is rather updated with
* each iteration
*/
dump_arc4_state("ntlmv1 arc4 state:\n",