/*
this is a tiny msrpc packet generator. I am only using this to
- avoid tying this code to a particular varient of our rpc code. This
+ avoid tying this code to a particular variant of our rpc code. This
generator is not general enough for all our rpc needs, its just
enough for the spnego/ntlmssp code
/**
* @brief Decode AES password buffer to password in the given charset.
*
- * @param mem_ctx The memory context to allocate the deocded passwrod on.
+ * @param mem_ctx The memory context to allocate the decoded password on.
*
* @param in_buffer[514] The in buffer with the decrypted password data.
*
/******************************************************************************
Open or create the schannel session store tdb. Non-static so it can
- be called from parent processes to corectly handle TDB_CLEAR_IF_FIRST
+ be called from parent processes to correctly handle TDB_CLEAR_IF_FIRST
*******************************************************************************/
struct db_context *open_schannel_session_store(TALLOC_CTX *mem_ctx,
remote machine stored in the schannel database.
The credentials are (re)read and from the schannel database, and
- written back after the caclulations are performed.
+ written back after the calculations are performed.
If the creds_out parameter is not NULL returns the credentials.
********************************************************************/
}
if (IVAL(out.data, 4) != 1) {
- DEBUG(0,("Unexpected revision number %d in session crypted string\n",
+ DEBUG(0,("Unexpected revision number %d in session encrypted string\n",
IVAL(out.data, 4)));
data_blob_free(&out);
return NULL;
int rc, slen;
if (blob->length < 8) {
- DEBUG(0, ("Unexpected length %d in session crypted secret (BLOB)\n",
+ DEBUG(0, ("Unexpected length %d in session encrypted secret (BLOB)\n",
(int)blob->length));
return NT_STATUS_INVALID_PARAMETER;
}
}
if (IVAL(out.data, 4) != 1) {
- DEBUG(2,("Unexpected revision number %d in session crypted secret (BLOB)\n",
+ DEBUG(2,("Unexpected revision number %d in session encrypted secret (BLOB)\n",
IVAL(out.data, 4)));
return NT_STATUS_UNKNOWN_REVISION;
}
slen = IVAL(out.data, 0);
if (slen > blob->length - 8) {
- DEBUG(0,("Invalid crypt length %d in session crypted secret (BLOB)\n", slen));
+ DEBUG(0,("Invalid crypt length %d in session encrypted secret (BLOB)\n", slen));
return NT_STATUS_WRONG_PASSWORD;
}
/*
* The packet format is the 516 byte RC4 encrypted
- * pasword followed by the 16 byte counfounder
+ * password followed by the 16 byte counfounder
* The confounder is a salt to prevent pre-computed hash attacks on the
* database.
*/