s4-auth Fix typos in samba4 auth code
authorBrad Hards <bradh@frogmouth.net>
Mon, 8 Nov 2010 01:15:50 +0000 (12:15 +1100)
committerAndrew Tridgell <tridge@samba.org>
Mon, 8 Nov 2010 07:15:23 +0000 (18:15 +1100)
source4/auth/gensec/gensec_gssapi.c

index 4729ed6062d2505083d486e32f96cc006ea47e0b..3c579fee50989397f214f31f0a3118623a1bca3f 100644 (file)
@@ -553,9 +553,9 @@ static NTSTATUS gensec_gssapi_update(struct gensec_security *gensec_security,
                                gensec_gssapi_state->sasl_state = STAGE_DONE;
 
                                if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SEAL)) {
-                                       DEBUG(5, ("GSSAPI Connection will be cryptographicly sealed\n"));
+                                       DEBUG(5, ("GSSAPI Connection will be cryptographically sealed\n"));
                                } else if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SIGN)) {
-                                       DEBUG(5, ("GSSAPI Connection will be cryptographicly signed\n"));
+                                       DEBUG(5, ("GSSAPI Connection will be cryptographically signed\n"));
                                } else {
                                        DEBUG(5, ("GSSAPI Connection will have no cryptographic protection\n"));
                                }
@@ -688,11 +688,11 @@ static NTSTATUS gensec_gssapi_update(struct gensec_security *gensec_security,
                        gensec_gssapi_state->sasl_state = STAGE_DONE;
 
                        if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SEAL)) {
-                               DEBUG(3, ("SASL/GSSAPI Connection to server will be cryptographicly sealed\n"));
+                               DEBUG(3, ("SASL/GSSAPI Connection to server will be cryptographically sealed\n"));
                        } else if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SIGN)) {
-                               DEBUG(3, ("SASL/GSSAPI Connection to server will be cryptographicly signed\n"));
+                               DEBUG(3, ("SASL/GSSAPI Connection to server will be cryptographically signed\n"));
                        } else {
-                               DEBUG(3, ("SASL/GSSAPI Connection to server will have no cryptographicly protection\n"));
+                               DEBUG(3, ("SASL/GSSAPI Connection to server will have no cryptographically protection\n"));
                        }
 
                        return NT_STATUS_OK;
@@ -816,9 +816,9 @@ static NTSTATUS gensec_gssapi_update(struct gensec_security *gensec_security,
                /* quirk:  This changes the value that gensec_have_feature returns, to be that after SASL negotiation */
                gensec_gssapi_state->sasl_state = STAGE_DONE;
                if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SEAL)) {
-                       DEBUG(5, ("SASL/GSSAPI Connection from client will be cryptographicly sealed\n"));
+                       DEBUG(5, ("SASL/GSSAPI Connection from client will be cryptographically sealed\n"));
                } else if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SIGN)) {
-                       DEBUG(5, ("SASL/GSSAPI Connection from client will be cryptographicly signed\n"));
+                       DEBUG(5, ("SASL/GSSAPI Connection from client will be cryptographically signed\n"));
                } else {
                        DEBUG(5, ("SASL/GSSAPI Connection from client will have no cryptographic protection\n"));
                }