/* Check to see if we can pass the PAC across to the NETLOGON server for validation */
-/* Also happens to be a really good one-step verfication of our Kerberos stack */
+/* Also happens to be a really good one-step verification of our Kerberos stack */
static bool test_accept_ticket(struct torture_context *tctx,
struct cli_credentials *credentials,
}
/*
- * Confirm gettting a ticket to pass to the server, running
+ * Confirm getting a ticket to pass to the server, running
* either the TEST_TGS_REQ or TEST_SELF_TRUST_TGS_REQ stage.
*
* This triggers the client to attempt to get a
}
/*
- * Confirm gettting a ticket to pass to the server, running
+ * Confirm getting a ticket to pass to the server, running
* the TEST_TGS_REQ_HOST, TEST_TGS_REQ_HOST_SRV_INST, TEST_TGS_REQ_HOST_SRV_HST stage
*
* This triggers the client to attempt to get a
}
/*
- * Confirm gettting a ticket for the same krbtgt/realm that we
+ * Confirm getting a ticket for the same krbtgt/realm that we
* got back with the initial ticket, running the
* TEST_TGS_REQ_KRBTGT stage.
*
break;
/*
- * Confirm correct error codes when we deliberatly send the wrong password
+ * Confirm correct error codes when we deliberately send the wrong password
*/
case TORTURE_KRB5_TEST_BREAK_PW:
if (test_context->packet_count == 0) {
break;
/*
- * Confirm correct error codes when we deliberatly skew the client clock
+ * Confirm correct error codes when we deliberately skew the client clock
*/
case TORTURE_KRB5_TEST_CLOCK_SKEW:
if (test_context->packet_count == 0) {