diff options
author | Andreas Schneider <asn@samba.org> | 2023-03-14 08:50:34 +0100 |
---|---|---|
committer | Andreas Schneider <asn@cryptomilk.org> | 2023-03-28 09:33:31 +0000 |
commit | 98c14205a0d2ff380ef65120aae52a1567ee443b (patch) | |
tree | 0029c27084f9e90e3bbbe15f3210e1ff91aa4ed5 | |
parent | 71eb85bc252637db908ca57c2d9790f6109491e0 (diff) | |
download | samba-98c14205a0d2ff380ef65120aae52a1567ee443b.tar.gz |
auth: Fix code spelling
Best reviewed with: `git show --word-diff`
Signed-off-by: Andreas Schneider <asn@samba.org>
Reviewed-by: Rowland Penny <rpenny@samba.org>
-rw-r--r-- | auth/auth_log.c | 4 | ||||
-rw-r--r-- | auth/common_auth.h | 2 | ||||
-rw-r--r-- | auth/credentials/credentials.c | 10 | ||||
-rw-r--r-- | auth/credentials/credentials_internal.h | 2 | ||||
-rw-r--r-- | auth/credentials/credentials_krb5.c | 2 | ||||
-rw-r--r-- | auth/gensec/gensec_start.c | 2 | ||||
-rw-r--r-- | auth/gensec/gensec_util.c | 2 | ||||
-rw-r--r-- | auth/gensec/schannel.c | 2 | ||||
-rw-r--r-- | auth/gensec/spnego.c | 2 | ||||
-rw-r--r-- | auth/kerberos/gssapi_pac.c | 2 | ||||
-rw-r--r-- | auth/kerberos/kerberos_pac.c | 2 | ||||
-rw-r--r-- | auth/ntlmssp/ntlmssp.h | 2 | ||||
-rw-r--r-- | auth/ntlmssp/ntlmssp_client.c | 2 | ||||
-rw-r--r-- | auth/ntlmssp/ntlmssp_server.c | 2 | ||||
-rw-r--r-- | auth/ntlmssp/ntlmssp_sign.c | 2 |
15 files changed, 20 insertions, 20 deletions
diff --git a/auth/auth_log.c b/auth/auth_log.c index 787a9ec6b42..cf1f9109c74 100644 --- a/auth/auth_log.c +++ b/auth/auth_log.c @@ -124,7 +124,7 @@ static enum event_logon_type get_logon_type( * * IF adding a new field please update the minor version number AUTH_MINOR * - * To process the resulting log lines from the commend line use jq to + * To process the resulting log lines from the command line use jq to * parse the json. * * grep "^ {" log file | @@ -345,7 +345,7 @@ failure: * * IF adding a new field please update the minor version number AUTHZ_MINOR * - * To process the resulting log lines from the commend line use jq to + * To process the resulting log lines from the command line use jq to * parse the json. * * grep "^ {" log_file |\ diff --git a/auth/common_auth.h b/auth/common_auth.h index fb41d48be49..691c6359ac4 100644 --- a/auth/common_auth.h +++ b/auth/common_auth.h @@ -37,7 +37,7 @@ enum auth_password_state { #define AUTH_SESSION_INFO_DEFAULT_GROUPS 0x01 /* Add the user to the default world and network groups */ #define AUTH_SESSION_INFO_AUTHENTICATED 0x02 /* Add the user to the 'authenticated users' group */ -#define AUTH_SESSION_INFO_SIMPLE_PRIVILEGES 0x04 /* Use a trivial map between users and privilages, rather than a DB */ +#define AUTH_SESSION_INFO_SIMPLE_PRIVILEGES 0x04 /* Use a trivial map between users and privileges, rather than a DB */ #define AUTH_SESSION_INFO_UNIX_TOKEN 0x08 /* The returned token must have the unix_token and unix_info elements provided */ #define AUTH_SESSION_INFO_NTLM 0x10 /* The returned token must have authenticated-with-NTLM flag set */ diff --git a/auth/credentials/credentials.c b/auth/credentials/credentials.c index 521951ff957..0485cc4e64e 100644 --- a/auth/credentials/credentials.c +++ b/auth/credentials/credentials.c @@ -210,7 +210,7 @@ _PUBLIC_ const char *cli_credentials_get_username(struct cli_credentials *cred) * * @param[in] obtained A pointer to store the obtained information. * - * return The user name or NULL if an error occured. + * return The user name or NULL if an error occurred. */ _PUBLIC_ const char * cli_credentials_get_username_and_obtained(struct cli_credentials *cred, @@ -259,7 +259,7 @@ _PUBLIC_ bool cli_credentials_set_bind_dn(struct cli_credentials *cred, * Obtain the BIND DN for this credentials context. * @param cred credentials context * @retval The username set on this context. - * @note Return value will be NULL if not specified explictly + * @note Return value will be NULL if not specified explicitly */ _PUBLIC_ const char *cli_credentials_get_bind_dn(struct cli_credentials *cred) { @@ -459,7 +459,7 @@ _PUBLIC_ const char *cli_credentials_get_password(struct cli_credentials *cred) * * @param[in] obtained A pointer to store the obtained information. * - * return The user name or NULL if an error occured. + * return The user name or NULL if an error occurred. */ _PUBLIC_ const char * cli_credentials_get_password_and_obtained(struct cli_credentials *cred, @@ -1290,7 +1290,7 @@ _PUBLIC_ void cli_credentials_set_secure_channel_type(struct cli_credentials *cr } /** - * Return NETLOGON secure chanel type + * Return NETLOGON secure channel type */ _PUBLIC_ time_t cli_credentials_get_password_last_changed_time(struct cli_credentials *cred) @@ -1309,7 +1309,7 @@ _PUBLIC_ void cli_credentials_set_password_last_changed_time(struct cli_credenti } /** - * Return NETLOGON secure chanel type + * Return NETLOGON secure channel type */ _PUBLIC_ enum netr_SchannelType cli_credentials_get_secure_channel_type(struct cli_credentials *cred) diff --git a/auth/credentials/credentials_internal.h b/auth/credentials/credentials_internal.h index 3b1581acb11..966926919b0 100644 --- a/auth/credentials/credentials_internal.h +++ b/auth/credentials/credentials_internal.h @@ -110,7 +110,7 @@ struct cli_credentials { /* Should we get a forwardable ticket? */ enum credentials_krb_forwardable krb_forwardable; - /* Forced SASL mechansim */ + /* Forced SASL mechanism */ char *forced_sasl_mech; /* gensec features which should be used for connections */ diff --git a/auth/credentials/credentials_krb5.c b/auth/credentials/credentials_krb5.c index 58926bc8723..c0631b43061 100644 --- a/auth/credentials/credentials_krb5.c +++ b/auth/credentials/credentials_krb5.c @@ -996,7 +996,7 @@ _PUBLIC_ int cli_credentials_get_client_gss_creds(struct cli_credentials *cred, ccache out of it. This routine can be generalised in future for the case where we deal with GSSAPI mechs other than krb5. - On sucess, the caller must not free gssapi_cred, as it now belongs + On success, the caller must not free gssapi_cred, as it now belongs to the credentials system. */ diff --git a/auth/gensec/gensec_start.c b/auth/gensec/gensec_start.c index bd5b7259d3f..b6979812ac0 100644 --- a/auth/gensec/gensec_start.c +++ b/auth/gensec/gensec_start.c @@ -870,7 +870,7 @@ static NTSTATUS gensec_start_mech(struct gensec_security *gensec_security) } /** - * Start a GENSEC sub-mechanism with a specified mechansim structure, used in SPNEGO + * Start a GENSEC sub-mechanism with a specified mechanism structure, used in SPNEGO * */ diff --git a/auth/gensec/gensec_util.c b/auth/gensec/gensec_util.c index 1075b9fde87..b6b4a722f27 100644 --- a/auth/gensec/gensec_util.c +++ b/auth/gensec/gensec_util.c @@ -120,7 +120,7 @@ static bool gensec_gssapi_check_oid(const DATA_BLOB *blob, const char *oid) } /** - * Check if the packet is one for the KRB5 mechansim + * Check if the packet is one for the KRB5 mechanism * * NOTE: This is a helper that can be employed by multiple mechanisms, do * not make assumptions about the private_data diff --git a/auth/gensec/schannel.c b/auth/gensec/schannel.c index 9860559668f..872e7d185e6 100644 --- a/auth/gensec/schannel.c +++ b/auth/gensec/schannel.c @@ -1068,7 +1068,7 @@ static NTSTATUS schannel_session_info(struct gensec_security *gensec_security, } /* - * Reduce the attack surface by ensuring schannel is not availble when + * Reduce the attack surface by ensuring schannel is not available when * we are not a DC */ static NTSTATUS schannel_server_start(struct gensec_security *gensec_security) diff --git a/auth/gensec/spnego.c b/auth/gensec/spnego.c index 87545d860e8..fcb5a06439e 100644 --- a/auth/gensec/spnego.c +++ b/auth/gensec/spnego.c @@ -65,7 +65,7 @@ struct spnego_neg_state { struct spnego_neg_ops { const char *name; /* - * The start hook does the initial processing on the incoming paket and + * The start hook does the initial processing on the incoming packet and * may starts the first possible subcontext. It indicates that * gensec_update() is required on the subcontext by returning * NT_STATUS_MORE_PROCESSING_REQUIRED and return something useful in diff --git a/auth/kerberos/gssapi_pac.c b/auth/kerberos/gssapi_pac.c index 12043992308..4ad787396aa 100644 --- a/auth/kerberos/gssapi_pac.c +++ b/auth/kerberos/gssapi_pac.c @@ -85,7 +85,7 @@ NTSTATUS gssapi_obtain_pac_blob(TALLOC_CTX *mem_ctx, OM_uint32 gss_maj, gss_min; #ifdef HAVE_GSS_GET_NAME_ATTRIBUTE /* - * gss_get_name_attribute() in MIT krb5 1.10.0 can return unintialized pac_display_buffer + * gss_get_name_attribute() in MIT krb5 1.10.0 can return uninitialized pac_display_buffer * and later gss_release_buffer() will crash on attempting to release it. * * So always initialize the buffer descriptors. diff --git a/auth/kerberos/kerberos_pac.c b/auth/kerberos/kerberos_pac.c index 650c851bf13..b914075d85c 100644 --- a/auth/kerberos/kerberos_pac.c +++ b/auth/kerberos/kerberos_pac.c @@ -309,7 +309,7 @@ NTSTATUS kerberos_decode_pac(TALLOC_CTX *mem_ctx, memset(srv_sig_wipe->signature.data, '\0', srv_sig_wipe->signature.length); - /* and reencode, back into the same place it came from */ + /* and re-encode, back into the same place it came from */ ndr_err = ndr_push_struct_blob( kdc_sig_blob, pac_data_raw, kdc_sig_wipe, (ndr_push_flags_fn_t)ndr_push_PAC_SIGNATURE_DATA); diff --git a/auth/ntlmssp/ntlmssp.h b/auth/ntlmssp/ntlmssp.h index 658d3fa86af..49f47c270bd 100644 --- a/auth/ntlmssp/ntlmssp.h +++ b/auth/ntlmssp/ntlmssp.h @@ -63,7 +63,7 @@ struct ntlmssp_state bool use_ntlmv2; bool use_ccache; bool resume_ccache; - bool use_nt_response; /* Set to 'False' to debug what happens when the NT response is omited */ + bool use_nt_response; /* Set to 'False' to debug what happens when the NT response is omitted */ bool allow_lm_response;/* The LM_RESPONSE code is not very secure... */ bool allow_lm_key; /* The LM_KEY code is not very secure... */ diff --git a/auth/ntlmssp/ntlmssp_client.c b/auth/ntlmssp/ntlmssp_client.c index af1642d3256..337aeed9229 100644 --- a/auth/ntlmssp/ntlmssp_client.c +++ b/auth/ntlmssp/ntlmssp_client.c @@ -658,7 +658,7 @@ NTSTATUS ntlmssp_client_challenge(struct gensec_security *gensec_security, if (!(flags & CLI_CRED_LANMAN_AUTH)) { /* LM Key is still possible, just silly, so we do not - * allow it. Fortunetly all LM crypto is off by + * allow it. Fortunately all LM crypto is off by * default and we require command line options to end * up here */ ntlmssp_state->neg_flags &= ~NTLMSSP_NEGOTIATE_LM_KEY; diff --git a/auth/ntlmssp/ntlmssp_server.c b/auth/ntlmssp/ntlmssp_server.c index 6a27db1b7d4..64b96283eb2 100644 --- a/auth/ntlmssp/ntlmssp_server.c +++ b/auth/ntlmssp/ntlmssp_server.c @@ -175,7 +175,7 @@ NTSTATUS gensec_ntlmssp_server_negotiate(struct gensec_security *gensec_security } /* The flags we send back are not just the negotiated flags, - * they are also 'what is in this packet'. Therfore, we + * they are also 'what is in this packet'. Therefore, we * operate on 'chal_flags' from here on */ diff --git a/auth/ntlmssp/ntlmssp_sign.c b/auth/ntlmssp/ntlmssp_sign.c index 11e5930a8de..b9be182e3f2 100644 --- a/auth/ntlmssp/ntlmssp_sign.c +++ b/auth/ntlmssp/ntlmssp_sign.c @@ -793,7 +793,7 @@ NTSTATUS ntlmssp_sign_reset(struct ntlmssp_state *ntlmssp_state, /* * Key weakening not performed on the master key for NTLM2 - * and does not occour for NTLM1. Therefore we only need + * and does not occur for NTLM1. Therefore we only need * to do this for the LM_KEY. */ if (ntlmssp_state->neg_flags & NTLMSSP_NEGOTIATE_LM_KEY) { |