summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorAndreas Schneider <asn@samba.org>2023-03-14 08:50:34 +0100
committerAndreas Schneider <asn@cryptomilk.org>2023-03-28 09:33:31 +0000
commit98c14205a0d2ff380ef65120aae52a1567ee443b (patch)
tree0029c27084f9e90e3bbbe15f3210e1ff91aa4ed5
parent71eb85bc252637db908ca57c2d9790f6109491e0 (diff)
downloadsamba-98c14205a0d2ff380ef65120aae52a1567ee443b.tar.gz
auth: Fix code spelling
Best reviewed with: `git show --word-diff` Signed-off-by: Andreas Schneider <asn@samba.org> Reviewed-by: Rowland Penny <rpenny@samba.org>
-rw-r--r--auth/auth_log.c4
-rw-r--r--auth/common_auth.h2
-rw-r--r--auth/credentials/credentials.c10
-rw-r--r--auth/credentials/credentials_internal.h2
-rw-r--r--auth/credentials/credentials_krb5.c2
-rw-r--r--auth/gensec/gensec_start.c2
-rw-r--r--auth/gensec/gensec_util.c2
-rw-r--r--auth/gensec/schannel.c2
-rw-r--r--auth/gensec/spnego.c2
-rw-r--r--auth/kerberos/gssapi_pac.c2
-rw-r--r--auth/kerberos/kerberos_pac.c2
-rw-r--r--auth/ntlmssp/ntlmssp.h2
-rw-r--r--auth/ntlmssp/ntlmssp_client.c2
-rw-r--r--auth/ntlmssp/ntlmssp_server.c2
-rw-r--r--auth/ntlmssp/ntlmssp_sign.c2
15 files changed, 20 insertions, 20 deletions
diff --git a/auth/auth_log.c b/auth/auth_log.c
index 787a9ec6b42..cf1f9109c74 100644
--- a/auth/auth_log.c
+++ b/auth/auth_log.c
@@ -124,7 +124,7 @@ static enum event_logon_type get_logon_type(
*
* IF adding a new field please update the minor version number AUTH_MINOR
*
- * To process the resulting log lines from the commend line use jq to
+ * To process the resulting log lines from the command line use jq to
* parse the json.
*
* grep "^ {" log file |
@@ -345,7 +345,7 @@ failure:
*
* IF adding a new field please update the minor version number AUTHZ_MINOR
*
- * To process the resulting log lines from the commend line use jq to
+ * To process the resulting log lines from the command line use jq to
* parse the json.
*
* grep "^ {" log_file |\
diff --git a/auth/common_auth.h b/auth/common_auth.h
index fb41d48be49..691c6359ac4 100644
--- a/auth/common_auth.h
+++ b/auth/common_auth.h
@@ -37,7 +37,7 @@ enum auth_password_state {
#define AUTH_SESSION_INFO_DEFAULT_GROUPS 0x01 /* Add the user to the default world and network groups */
#define AUTH_SESSION_INFO_AUTHENTICATED 0x02 /* Add the user to the 'authenticated users' group */
-#define AUTH_SESSION_INFO_SIMPLE_PRIVILEGES 0x04 /* Use a trivial map between users and privilages, rather than a DB */
+#define AUTH_SESSION_INFO_SIMPLE_PRIVILEGES 0x04 /* Use a trivial map between users and privileges, rather than a DB */
#define AUTH_SESSION_INFO_UNIX_TOKEN 0x08 /* The returned token must have the unix_token and unix_info elements provided */
#define AUTH_SESSION_INFO_NTLM 0x10 /* The returned token must have authenticated-with-NTLM flag set */
diff --git a/auth/credentials/credentials.c b/auth/credentials/credentials.c
index 521951ff957..0485cc4e64e 100644
--- a/auth/credentials/credentials.c
+++ b/auth/credentials/credentials.c
@@ -210,7 +210,7 @@ _PUBLIC_ const char *cli_credentials_get_username(struct cli_credentials *cred)
*
* @param[in] obtained A pointer to store the obtained information.
*
- * return The user name or NULL if an error occured.
+ * return The user name or NULL if an error occurred.
*/
_PUBLIC_ const char *
cli_credentials_get_username_and_obtained(struct cli_credentials *cred,
@@ -259,7 +259,7 @@ _PUBLIC_ bool cli_credentials_set_bind_dn(struct cli_credentials *cred,
* Obtain the BIND DN for this credentials context.
* @param cred credentials context
* @retval The username set on this context.
- * @note Return value will be NULL if not specified explictly
+ * @note Return value will be NULL if not specified explicitly
*/
_PUBLIC_ const char *cli_credentials_get_bind_dn(struct cli_credentials *cred)
{
@@ -459,7 +459,7 @@ _PUBLIC_ const char *cli_credentials_get_password(struct cli_credentials *cred)
*
* @param[in] obtained A pointer to store the obtained information.
*
- * return The user name or NULL if an error occured.
+ * return The user name or NULL if an error occurred.
*/
_PUBLIC_ const char *
cli_credentials_get_password_and_obtained(struct cli_credentials *cred,
@@ -1290,7 +1290,7 @@ _PUBLIC_ void cli_credentials_set_secure_channel_type(struct cli_credentials *cr
}
/**
- * Return NETLOGON secure chanel type
+ * Return NETLOGON secure channel type
*/
_PUBLIC_ time_t cli_credentials_get_password_last_changed_time(struct cli_credentials *cred)
@@ -1309,7 +1309,7 @@ _PUBLIC_ void cli_credentials_set_password_last_changed_time(struct cli_credenti
}
/**
- * Return NETLOGON secure chanel type
+ * Return NETLOGON secure channel type
*/
_PUBLIC_ enum netr_SchannelType cli_credentials_get_secure_channel_type(struct cli_credentials *cred)
diff --git a/auth/credentials/credentials_internal.h b/auth/credentials/credentials_internal.h
index 3b1581acb11..966926919b0 100644
--- a/auth/credentials/credentials_internal.h
+++ b/auth/credentials/credentials_internal.h
@@ -110,7 +110,7 @@ struct cli_credentials {
/* Should we get a forwardable ticket? */
enum credentials_krb_forwardable krb_forwardable;
- /* Forced SASL mechansim */
+ /* Forced SASL mechanism */
char *forced_sasl_mech;
/* gensec features which should be used for connections */
diff --git a/auth/credentials/credentials_krb5.c b/auth/credentials/credentials_krb5.c
index 58926bc8723..c0631b43061 100644
--- a/auth/credentials/credentials_krb5.c
+++ b/auth/credentials/credentials_krb5.c
@@ -996,7 +996,7 @@ _PUBLIC_ int cli_credentials_get_client_gss_creds(struct cli_credentials *cred,
ccache out of it. This routine can be generalised in future for
the case where we deal with GSSAPI mechs other than krb5.
- On sucess, the caller must not free gssapi_cred, as it now belongs
+ On success, the caller must not free gssapi_cred, as it now belongs
to the credentials system.
*/
diff --git a/auth/gensec/gensec_start.c b/auth/gensec/gensec_start.c
index bd5b7259d3f..b6979812ac0 100644
--- a/auth/gensec/gensec_start.c
+++ b/auth/gensec/gensec_start.c
@@ -870,7 +870,7 @@ static NTSTATUS gensec_start_mech(struct gensec_security *gensec_security)
}
/**
- * Start a GENSEC sub-mechanism with a specified mechansim structure, used in SPNEGO
+ * Start a GENSEC sub-mechanism with a specified mechanism structure, used in SPNEGO
*
*/
diff --git a/auth/gensec/gensec_util.c b/auth/gensec/gensec_util.c
index 1075b9fde87..b6b4a722f27 100644
--- a/auth/gensec/gensec_util.c
+++ b/auth/gensec/gensec_util.c
@@ -120,7 +120,7 @@ static bool gensec_gssapi_check_oid(const DATA_BLOB *blob, const char *oid)
}
/**
- * Check if the packet is one for the KRB5 mechansim
+ * Check if the packet is one for the KRB5 mechanism
*
* NOTE: This is a helper that can be employed by multiple mechanisms, do
* not make assumptions about the private_data
diff --git a/auth/gensec/schannel.c b/auth/gensec/schannel.c
index 9860559668f..872e7d185e6 100644
--- a/auth/gensec/schannel.c
+++ b/auth/gensec/schannel.c
@@ -1068,7 +1068,7 @@ static NTSTATUS schannel_session_info(struct gensec_security *gensec_security,
}
/*
- * Reduce the attack surface by ensuring schannel is not availble when
+ * Reduce the attack surface by ensuring schannel is not available when
* we are not a DC
*/
static NTSTATUS schannel_server_start(struct gensec_security *gensec_security)
diff --git a/auth/gensec/spnego.c b/auth/gensec/spnego.c
index 87545d860e8..fcb5a06439e 100644
--- a/auth/gensec/spnego.c
+++ b/auth/gensec/spnego.c
@@ -65,7 +65,7 @@ struct spnego_neg_state {
struct spnego_neg_ops {
const char *name;
/*
- * The start hook does the initial processing on the incoming paket and
+ * The start hook does the initial processing on the incoming packet and
* may starts the first possible subcontext. It indicates that
* gensec_update() is required on the subcontext by returning
* NT_STATUS_MORE_PROCESSING_REQUIRED and return something useful in
diff --git a/auth/kerberos/gssapi_pac.c b/auth/kerberos/gssapi_pac.c
index 12043992308..4ad787396aa 100644
--- a/auth/kerberos/gssapi_pac.c
+++ b/auth/kerberos/gssapi_pac.c
@@ -85,7 +85,7 @@ NTSTATUS gssapi_obtain_pac_blob(TALLOC_CTX *mem_ctx,
OM_uint32 gss_maj, gss_min;
#ifdef HAVE_GSS_GET_NAME_ATTRIBUTE
/*
- * gss_get_name_attribute() in MIT krb5 1.10.0 can return unintialized pac_display_buffer
+ * gss_get_name_attribute() in MIT krb5 1.10.0 can return uninitialized pac_display_buffer
* and later gss_release_buffer() will crash on attempting to release it.
*
* So always initialize the buffer descriptors.
diff --git a/auth/kerberos/kerberos_pac.c b/auth/kerberos/kerberos_pac.c
index 650c851bf13..b914075d85c 100644
--- a/auth/kerberos/kerberos_pac.c
+++ b/auth/kerberos/kerberos_pac.c
@@ -309,7 +309,7 @@ NTSTATUS kerberos_decode_pac(TALLOC_CTX *mem_ctx,
memset(srv_sig_wipe->signature.data,
'\0', srv_sig_wipe->signature.length);
- /* and reencode, back into the same place it came from */
+ /* and re-encode, back into the same place it came from */
ndr_err = ndr_push_struct_blob(
kdc_sig_blob, pac_data_raw, kdc_sig_wipe,
(ndr_push_flags_fn_t)ndr_push_PAC_SIGNATURE_DATA);
diff --git a/auth/ntlmssp/ntlmssp.h b/auth/ntlmssp/ntlmssp.h
index 658d3fa86af..49f47c270bd 100644
--- a/auth/ntlmssp/ntlmssp.h
+++ b/auth/ntlmssp/ntlmssp.h
@@ -63,7 +63,7 @@ struct ntlmssp_state
bool use_ntlmv2;
bool use_ccache;
bool resume_ccache;
- bool use_nt_response; /* Set to 'False' to debug what happens when the NT response is omited */
+ bool use_nt_response; /* Set to 'False' to debug what happens when the NT response is omitted */
bool allow_lm_response;/* The LM_RESPONSE code is not very secure... */
bool allow_lm_key; /* The LM_KEY code is not very secure... */
diff --git a/auth/ntlmssp/ntlmssp_client.c b/auth/ntlmssp/ntlmssp_client.c
index af1642d3256..337aeed9229 100644
--- a/auth/ntlmssp/ntlmssp_client.c
+++ b/auth/ntlmssp/ntlmssp_client.c
@@ -658,7 +658,7 @@ NTSTATUS ntlmssp_client_challenge(struct gensec_security *gensec_security,
if (!(flags & CLI_CRED_LANMAN_AUTH)) {
/* LM Key is still possible, just silly, so we do not
- * allow it. Fortunetly all LM crypto is off by
+ * allow it. Fortunately all LM crypto is off by
* default and we require command line options to end
* up here */
ntlmssp_state->neg_flags &= ~NTLMSSP_NEGOTIATE_LM_KEY;
diff --git a/auth/ntlmssp/ntlmssp_server.c b/auth/ntlmssp/ntlmssp_server.c
index 6a27db1b7d4..64b96283eb2 100644
--- a/auth/ntlmssp/ntlmssp_server.c
+++ b/auth/ntlmssp/ntlmssp_server.c
@@ -175,7 +175,7 @@ NTSTATUS gensec_ntlmssp_server_negotiate(struct gensec_security *gensec_security
}
/* The flags we send back are not just the negotiated flags,
- * they are also 'what is in this packet'. Therfore, we
+ * they are also 'what is in this packet'. Therefore, we
* operate on 'chal_flags' from here on
*/
diff --git a/auth/ntlmssp/ntlmssp_sign.c b/auth/ntlmssp/ntlmssp_sign.c
index 11e5930a8de..b9be182e3f2 100644
--- a/auth/ntlmssp/ntlmssp_sign.c
+++ b/auth/ntlmssp/ntlmssp_sign.c
@@ -793,7 +793,7 @@ NTSTATUS ntlmssp_sign_reset(struct ntlmssp_state *ntlmssp_state,
/*
* Key weakening not performed on the master key for NTLM2
- * and does not occour for NTLM1. Therefore we only need
+ * and does not occur for NTLM1. Therefore we only need
* to do this for the LM_KEY.
*/
if (ntlmssp_state->neg_flags & NTLMSSP_NEGOTIATE_LM_KEY) {