diff options
author | Michael Tokarev <mjt@tls.msk.ru> | 2022-04-01 10:07:47 +0300 |
---|---|---|
committer | Jeremy Allison <jra@samba.org> | 2022-06-10 18:12:33 +0000 |
commit | 17c733d946af693f28f3f55bc2a5369c87a932e0 (patch) | |
tree | b37963570458f0e5f751004bbdc7c3c70cd64b48 /auth | |
parent | 6f3e03a6e3404bcdd80e9a867588af5ccc2b2526 (diff) | |
download | samba-17c733d946af693f28f3f55bc2a5369c87a932e0.tar.gz |
spelling: connnect encrytion exisit expection explicit invalide missmatch paramater paramter partion privilige relase reponse seperate unkown verson authencication progagated
Tree-wide spellcheck for some common misspellings.
source3/utils/status.c has misspelled local variable (unkown_dialect).
"missmatch" is a known historical misspelling, only the incorrect
misspellings are fixed.
source3/locale/net/de.po has the spelling error (unkown) in two msgids -
it probably should be updated with current source.
Signed-off-by: Michael Tokarev <mjt@tls.msk.ru>
Reviewed-by: Andrew Bartlett <abartlet@samba.org>
Reviewed-by: Jeremy Allison <jra@samba.org>
Diffstat (limited to 'auth')
-rw-r--r-- | auth/gensec/gensec.h | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/auth/gensec/gensec.h b/auth/gensec/gensec.h index 53fb1e43244..29d5e92c130 100644 --- a/auth/gensec/gensec.h +++ b/auth/gensec/gensec.h @@ -158,7 +158,7 @@ NTSTATUS gensec_update_recv(struct tevent_req *req, TALLOC_CTX *out_mem_ctx, DAT * The features must be requested before starting the * gensec_update*() loop. * - * The current expection is GENSEC_FEATURE_SIGN_PKT_HEADER, + * The current exception is GENSEC_FEATURE_SIGN_PKT_HEADER, * it can also be requested once the gensec_update*() loop * returned NT_STATUS_OK. * @@ -181,7 +181,7 @@ void gensec_want_feature(struct gensec_security *gensec_security, * The features must be requested after the finished * gensec_update*() loop. * - * The current expection is GENSEC_FEATURE_SIGN_PKT_HEADER, + * The current exception is GENSEC_FEATURE_SIGN_PKT_HEADER, * it can also be requested before the gensec_update*() loop, * as the return value only indicates if the backend supports * dcerpc header signing, not if header signing will be used |