]> git.ipfire.org Git - thirdparty/samba.git/commitdiff
auth: Fix code spelling
authorJoseph Sutton <josephsutton@catalyst.net.nz>
Thu, 21 Sep 2023 20:07:45 +0000 (08:07 +1200)
committerAndrew Bartlett <abartlet@samba.org>
Wed, 25 Oct 2023 22:23:37 +0000 (22:23 +0000)
Signed-off-by: Joseph Sutton <josephsutton@catalyst.net.nz>
Reviewed-by: Andrew Bartlett <abartlet@samba.org>
auth/gensec/gensec_start.c
auth/kerberos/kerberos_pac.c

index 3a3165b52eb7d40995a5a379d4ef5adbd15c4a25..072188a67522863c38a54282934cf569973073d6 100644 (file)
@@ -104,7 +104,7 @@ static const struct gensec_security_ops **gensec_use_kerberos_mechs(
                bool keep = false;
 
                /*
-                * We want to keep SPNGEO and other backends
+                * We want to keep SPNEGO and other backends
                 */
                keep = old_gensec_list[i]->glue;
 
@@ -168,7 +168,7 @@ _PUBLIC_ const struct gensec_security_ops **gensec_security_mechs(
 
                        /*
                         * Even if Kerberos is set to REQUIRED, keep the
-                        * schannel auth mechanism that machine accounts are
+                        * schannel auth mechanism so that machine accounts are
                         * able to authenticate via netlogon.
                         */
                        if (gensec_security->gensec_role == GENSEC_SERVER) {
@@ -975,7 +975,7 @@ _PUBLIC_ NTSTATUS gensec_start_mech_by_oid(struct gensec_security *gensec_securi
 }
 
 /**
- * Start a GENSEC sub-mechanism by a well know SASL name
+ * Start a GENSEC sub-mechanism by a well known SASL name
  *
  */
 
index 8d3b467622db2a56859cef3d52c48532569967a0..ae4557bbd6fc9c5c0e9e1a696e414e3a29a01375 100644 (file)
@@ -179,7 +179,7 @@ NTSTATUS kerberos_decode_pac(TALLOC_CTX *mem_ctx,
        }
 
        if (pac_data->num_buffers < 4) {
-               /* we need logon_ingo, service_key and kdc_key */
+               /* we need logon_info, service_key and kdc_key */
                DEBUG(0,("less than 4 PAC buffers\n"));
                talloc_free(tmp_ctx);
                return NT_STATUS_INVALID_PARAMETER;
@@ -197,14 +197,14 @@ NTSTATUS kerberos_decode_pac(TALLOC_CTX *mem_ctx,
        }
 
        if (pac_data_raw->num_buffers < 4) {
-               /* we need logon_ingo, service_key and kdc_key */
+               /* we need logon_info, service_key and kdc_key */
                DEBUG(0,("less than 4 PAC buffers\n"));
                talloc_free(tmp_ctx);
                return NT_STATUS_INVALID_PARAMETER;
        }
 
        if (pac_data->num_buffers != pac_data_raw->num_buffers) {
-               /* we need logon_ingo, service_key and kdc_key */
+               /* we need logon_info, service_key and kdc_key */
                DEBUG(0, ("misparse! PAC_DATA has %d buffers while "
                          "PAC_DATA_RAW has %d\n", pac_data->num_buffers,
                          pac_data_raw->num_buffers));
@@ -368,7 +368,7 @@ NTSTATUS kerberos_decode_pac(TALLOC_CTX *mem_ctx,
        }
 
        if (tgs_authtime) {
-               /* Convert to NT time, so as not to loose accuracy in comparison */
+               /* Convert to NT time, so as not to lose accuracy in comparison */
                unix_to_nt_time(&tgs_authtime_nttime, tgs_authtime);
 
                if (tgs_authtime_nttime != logon_name->logon_time) {