s4/auth: Trivial spelling fixes.
authorBrad Hards <bradh@frogmouth.net>
Fri, 17 Jun 2011 09:53:11 +0000 (19:53 +1000)
committerAndrew Tridgell <tridge@samba.org>
Tue, 21 Jun 2011 05:54:32 +0000 (15:54 +1000)
Signed-off-by: Andrew Tridgell <tridge@samba.org>
source4/auth/credentials/credentials_krb5.c
source4/auth/kerberos/kerberos_util.c

index 6670f434d9d6d80f88608ea4f0407ff0afc1bb3f..1643197004cdefa2d189efa01b55af30c6ee13c7 100644 (file)
@@ -387,7 +387,7 @@ void cli_credentials_invalidate_client_gss_creds(struct cli_credentials *cred,
        }
        /* Now that we know that the data is 'this specified', then
         * don't allow something less 'known' to be returned as a
-        * ccache.  Ie, if the username is on the commmand line, we
+        * ccache.  Ie, if the username is on the command line, we
         * don't want to later guess to use a file-based ccache */
        if (obtained > cred->client_gss_creds_threshold) {
                cred->client_gss_creds_threshold = obtained;
@@ -420,7 +420,7 @@ _PUBLIC_ void cli_credentials_invalidate_ccache(struct cli_credentials *cred,
        }
        /* Now that we know that the data is 'this specified', then
         * don't allow something less 'known' to be returned as a
-        * ccache.  Ie, if the username is on the commmand line, we
+        * ccache.  i.e, if the username is on the command line, we
         * don't want to later guess to use a file-based ccache */
        if (obtained > cred->ccache_threshold) {
                cred->ccache_threshold  = obtained;
@@ -844,7 +844,7 @@ _PUBLIC_ void cli_credentials_set_salt_principal(struct cli_credentials *cred, c
        cred->salt_principal = talloc_strdup(cred, principal);
 }
 
-/* The 'impersonate_principal' is used to allow on Kerberos principal
+/* The 'impersonate_principal' is used to allow one Kerberos principal
  * (and it's associated keytab etc) to impersonate another.  The
  * ability to do this is controlled by the KDC, but it is generally
  * permitted to impersonate anyone to yourself.  This allows any
index f05016b8735b2882fcc63b2333f15592f20e9186..9cef977306108cc21ca109040f0ba954c5cda69c 100644 (file)
@@ -173,7 +173,7 @@ static krb5_error_code principals_from_msg(TALLOC_CTX *parent_ctx,
                        return ret;
                }
                
-               /* This song-and-dance effectivly puts the principal
+               /* This song-and-dance effectively puts the principal
                 * into talloc, so we can't loose it. */
                talloc_set_destructor(principals[i], free_principal);
                i++;
@@ -262,7 +262,7 @@ static krb5_error_code salt_principal_from_msg(TALLOC_CTX *parent_ctx,
                                          upper_realm,
                                          "host", salt_body, NULL);
                if (ret == 0) {
-                       /* This song-and-dance effectivly puts the principal
+                       /* This song-and-dance effectively puts the principal
                         * into talloc, so we can't loose it. */
                        mem_ctx->smb_krb5_context = talloc_reference(mem_ctx, smb_krb5_context);
                        mem_ctx->principal = *salt_princ;
@@ -737,7 +737,7 @@ static krb5_error_code remove_old_entries(TALLOC_CTX *parent_ctx,
                        /* Release the enumeration.  We are going to
                         * have to start this from the top again,
                         * because deletes during enumeration may not
-                        * always be consistant.
+                        * always be consistent.
                         *
                         * Also, the enumeration locks a FILE: keytab
                         */