r26231: Spell check: credentails -> credentials.
authorJelmer Vernooij <jelmer@samba.org>
Sun, 2 Dec 2007 18:31:14 +0000 (19:31 +0100)
committerStefan Metzmacher <metze@samba.org>
Fri, 21 Dec 2007 04:47:09 +0000 (05:47 +0100)
(This used to be commit 4b46888bd0195ab12190f76868719fc018baafd6)

source4/auth/credentials/credentials_krb5.c
source4/auth/gensec/gensec.c
source4/auth/gensec/gensec_gssapi.c
source4/auth/gensec/gensec_krb5.c
source4/auth/gensec/spnego.c
source4/libcli/smb_composite/sesssetup.c
source4/libnet/libnet_vampire.c
source4/librpc/rpc/dcerpc_auth.c
source4/utils/ntlm_auth.c

index 01e405ad658ba3415d3c168532720f29c0b02fb2..edc10d77c91554263d7e6e6c1e200f963f112714 100644 (file)
@@ -379,7 +379,7 @@ int cli_credentials_get_client_gss_creds(struct cli_credentials *cred,
 }
 
 /**
-   Set a gssapi cred_id_t into the credentails system. (Client case)
+   Set a gssapi cred_id_t into the credentials system. (Client case)
 
    This grabs the credentials both 'intact' and getting the krb5
    ccache out of it.  This routine can be generalised in future for
index 1da0cf631be980435132a2152bef41dfbd18de62..b3ac64fdce20f83da28bf244584a1e45d766d269 100644 (file)
@@ -453,7 +453,7 @@ const char **gensec_security_oids_from_ops_wrapped(TALLOC_CTX *mem_ctx,
 /**
  * Return all the security subsystems currently enabled on a GENSEC context.
  * 
- * This is taken from a list attached to the cli_credentails, and
+ * This is taken from a list attached to the cli_credentials, and
  * skips the OID in 'skip'.  (Typically the SPNEGO OID)
  * 
  */
index dceb10e7b6204e663553f66587be12da209a7bc2..98d8a4067205611d28a2656c386be4bf80a36c84 100644 (file)
@@ -366,7 +366,7 @@ static NTSTATUS gensec_gssapi_client_start(struct gensec_security *gensec_securi
                DEBUG(3, ("Cannot reach a KDC we require to contact %s\n", principal));
                return NT_STATUS_INVALID_PARAMETER; /* Make SPNEGO ignore us, we can't go any further here */
        default:
-               DEBUG(1, ("Aquiring initiator credentails failed\n"));
+               DEBUG(1, ("Aquiring initiator credentials failed\n"));
                return NT_STATUS_UNSUCCESSFUL;
        }
 
index 8ce941719f6dd7a819083ce02684707e5f3d0146..1227a48ada0560a4bb98391ae21369d1f4317333 100644 (file)
@@ -256,7 +256,7 @@ static NTSTATUS gensec_krb5_client_start(struct gensec_security *gensec_security
                DEBUG(3, ("Cannot reach a KDC we require to contact %s\n", principal));
                return NT_STATUS_INVALID_PARAMETER; /* Make SPNEGO ignore us, we can't go any further here */
        default:
-               DEBUG(1, ("gensec_krb5_start: Aquiring initiator credentails failed: %s\n", error_message(ret)));
+               DEBUG(1, ("gensec_krb5_start: Aquiring initiator credentials failed: %s\n", error_message(ret)));
                return NT_STATUS_UNSUCCESSFUL;
        }
        in_data.length = 0;
index 5c1c15935f39ff3de1635577711715a4b07c094c..ca82980f941ff8e3047163d9264342033d82663f 100644 (file)
@@ -598,7 +598,7 @@ static NTSTATUS gensec_spnego_create_negTokenInit(struct gensec_security *gensec
                spnego_out.negTokenInit.reqFlags = 0;
                
                if (spnego_state->state_position == SPNEGO_SERVER_START) {
-                       /* server credentails */
+                       /* server credentials */
                        struct cli_credentials *creds = gensec_get_credentials(gensec_security);
                        if (creds) {
                                principal = cli_credentials_get_principal(creds, out_mem_ctx);
index 622367e746e3241693eb78ed431668d6f73b1747..a7268606474b0e9675cc813aa42f78dd49821805 100644 (file)
@@ -375,7 +375,7 @@ static NTSTATUS session_setup_spnego(struct composite_context *c,
 
        status = gensec_set_credentials(session->gensec, io->in.credentials);
        if (!NT_STATUS_IS_OK(status)) {
-               DEBUG(1, ("Failed to start set GENSEC client credentails: %s\n", 
+               DEBUG(1, ("Failed to start set GENSEC client credentials: %s\n", 
                          nt_errstr(status)));
                return status;
        }
index 40693e6362e2684d1defdf8319e6a416389a8627..fbb7c8b6e5d9e8056fb9bf1f0ab1278b9246dc8a 100644 (file)
@@ -310,7 +310,7 @@ NTSTATUS libnet_SamSync_netlogon(struct libnet_context *ctx, TALLOC_CTX *mem_ctx
                }
        }
 
-       /* get NETLOGON credentails */
+       /* get NETLOGON credentials */
 
        nt_status = dcerpc_schannel_creds(p->conn->security_state.generic_state, samsync_ctx, &creds);
        if (!NT_STATUS_IS_OK(nt_status)) {
index 7db6c1b7cdbedaf18358409b9e60ea9517f74009..0fb898c562b47f94d7d3d6c9f419efb1975c7cd8 100644 (file)
@@ -248,7 +248,7 @@ struct composite_context *dcerpc_bind_auth_send(TALLOC_CTX *mem_ctx,
 
        c->status = gensec_set_credentials(sec->generic_state, credentials);
        if (!NT_STATUS_IS_OK(c->status)) {
-               DEBUG(1, ("Failed to set GENSEC client credentails: %s\n",
+               DEBUG(1, ("Failed to set GENSEC client credentials: %s\n",
                          nt_errstr(c->status)));
                composite_error(c, c->status);
                return c;
index 20673775a57e01794f7e59571d573d7bd89d771f..75c87fc111ea0b743ce3954499097c2a32a65391 100644 (file)
@@ -316,8 +316,8 @@ static void manage_gensec_get_pw_request(enum stdio_helper_mode stdio_helper_mod
 }
 
 /** 
- * Callback for password credentails.  This is not async, and when
- * GENSEC and the credentails code is made async, it will look rather
+ * Callback for password credentials.  This is not async, and when
+ * GENSEC and the credentials code is made async, it will look rather
  * different.
  */