bool keep = false;
/*
- * We want to keep SPNGEO and other backends
+ * We want to keep SPNEGO and other backends
*/
keep = old_gensec_list[i]->glue;
/*
* Even if Kerberos is set to REQUIRED, keep the
- * schannel auth mechanism that machine accounts are
+ * schannel auth mechanism so that machine accounts are
* able to authenticate via netlogon.
*/
if (gensec_security->gensec_role == GENSEC_SERVER) {
}
/**
- * Start a GENSEC sub-mechanism by a well know SASL name
+ * Start a GENSEC sub-mechanism by a well known SASL name
*
*/
}
if (pac_data->num_buffers < 4) {
- /* we need logon_ingo, service_key and kdc_key */
+ /* we need logon_info, service_key and kdc_key */
DEBUG(0,("less than 4 PAC buffers\n"));
talloc_free(tmp_ctx);
return NT_STATUS_INVALID_PARAMETER;
}
if (pac_data_raw->num_buffers < 4) {
- /* we need logon_ingo, service_key and kdc_key */
+ /* we need logon_info, service_key and kdc_key */
DEBUG(0,("less than 4 PAC buffers\n"));
talloc_free(tmp_ctx);
return NT_STATUS_INVALID_PARAMETER;
}
if (pac_data->num_buffers != pac_data_raw->num_buffers) {
- /* we need logon_ingo, service_key and kdc_key */
+ /* we need logon_info, service_key and kdc_key */
DEBUG(0, ("misparse! PAC_DATA has %d buffers while "
"PAC_DATA_RAW has %d\n", pac_data->num_buffers,
pac_data_raw->num_buffers));
}
if (tgs_authtime) {
- /* Convert to NT time, so as not to loose accuracy in comparison */
+ /* Convert to NT time, so as not to lose accuracy in comparison */
unix_to_nt_time(&tgs_authtime_nttime, tgs_authtime);
if (tgs_authtime_nttime != logon_name->logon_time) {