]> git.ipfire.org Git - thirdparty/samba.git/commitdiff
s4:kdc: Fix code spelling
authorAndreas Schneider <asn@samba.org>
Wed, 2 Aug 2023 08:47:30 +0000 (10:47 +0200)
committerAndreas Schneider <asn@cryptomilk.org>
Thu, 3 Aug 2023 15:25:01 +0000 (15:25 +0000)
Signed-off-by: Andreas Schneider <asn@samba.org>
Reviewed-by: Joseph Sutton <josephsutton@catalyst.net.nz>
Autobuild-User(master): Andreas Schneider <asn@cryptomilk.org>
Autobuild-Date(master): Thu Aug  3 15:25:01 UTC 2023 on atb-devel-224

source4/kdc/ad_claims.c
source4/kdc/db-glue.c
source4/kdc/hdb-samba4.c
source4/kdc/ktutil.c
source4/kdc/mit_samba.c
source4/kdc/wdc-samba4.c

index 109bb8a529b21f27c823aab7afa12a63ae70170b..28e3d0d3e3476c4d366a47157cd8e98a7a7737de 100644 (file)
@@ -506,7 +506,7 @@ static int fill_claim_entry(TALLOC_CTX *mem_ctx,
 }
 
 /*
- * Determine wheter a claim applies to the most specific objectClass of the
+ * Determine whether a claim applies to the most specific objectClass of the
  * principal.
  */
 static int claim_applies_to_class(TALLOC_CTX *mem_ctx,
index 5894b47ecd9ed2bfb5deb1e7447c6518afb58c8d..81f38fedb9c3d140a4d80855db931ce7e0cec1cf 100644 (file)
@@ -1079,7 +1079,7 @@ static krb5_error_code samba_kdc_message2entry(krb5_context context,
        uint32_t supported_session_etypes;
        uint32_t available_enctypes = 0;
        /*
-        * also lagacy enctypes are announced,
+        * also legacy enctypes are announced,
         * but effectively restricted by kdc_enctypes
         */
        uint32_t domain_enctypes = ENC_RC4_HMAC_MD5 | ENC_RSA_MD5 | ENC_CRC32;
@@ -3517,7 +3517,7 @@ NTSTATUS samba_kdc_setup_db_ctx(TALLOC_CTX *mem_ctx, struct samba_kdc_base_conte
         * authenticate the KDC to the LDAP server is highly likely to
         * be circular.
         *
-        * In future we may set this up to use EXERNAL and SSL
+        * In future we may set this up to use EXTERNAL and SSL
         * certificates, for now it will almost certainly be NTLMSSP_SET_USERNAME
        */
 
index 482b546d019e6b298d949a18cf0f1f185db2b804..2a5981daf2eccbcc33f196ccb82eb5a930a8d586 100644 (file)
@@ -984,7 +984,7 @@ static krb5_error_code hdb_samba4_audit(krb5_context context,
                         * from the password history, so we don't
                         * update the badPwdCount, but still return
                         * PREAUTH_FAILED and need to forward to
-                        * a RWDC in order to produce an autoritative
+                        * a RWDC in order to produce an authoritative
                         * response for the client.
                         */
                        status = NT_STATUS_WRONG_PASSWORD;
index 732d247446c47946f613943a80cd023264f4c28d..d29f4fd0ff53ecde23639b5615c3a0e17683a929 100644 (file)
@@ -31,7 +31,7 @@ static void smb_krb5_err(TALLOC_CTX *mem_ctx,
        char *krb5_err_str = smb_get_krb5_error_message(context,
                                                        code,
                                                        mem_ctx);
-       printf("%s: %s\n", msg, krb5_err_str ? krb5_err_str : "UNKOWN");
+       printf("%s: %s\n", msg, krb5_err_str ? krb5_err_str : "UNKNOWN");
 
        talloc_free(mem_ctx);
        exit(exit_code);
index d0bfe86b099630d7a75c63e0231481634ba77007..2f84b041de24d504675ec328a190c3f5eaf13ddd 100644 (file)
@@ -320,7 +320,7 @@ fetch_referral_principal:
                 *     ADDOM.SAMBA.EXAMPLE.COM
                 *
                 * We look up if we have and entry in the database and get an
-                * entry with the pricipal:
+                * entry with the principal:
                 *
                 *     cifs/dc7.SAMBA2008R2.EXAMPLE.COM@SAMBA2008R2.EXAMPLE.COM
                 *
index 6b3731d55de5e81a5c1a7c1d791fe1d7b67cdf33..4f4cda15a1fa49b6b909913bf37ddb334d00956a 100644 (file)
@@ -317,7 +317,7 @@ static krb5_error_code samba_wdc_verify_pac2(astgs_request_t r,
         * RODC, then we need to regenerate the PAC - we can't trust
         * it, and confirm that the RODC was permitted to print this ticket
         *
-        * Becasue of the samba_kdc_validate_pac_blob() step we can be
+        * Because of the samba_kdc_validate_pac_blob() step we can be
         * sure that the record in 'client' matches the SID in the
         * original PAC.
         */