The branch, master has been updated via 0bfdefffc8b s3:include: Fix code spelling via a26c00db11d s4:client: Fix code spelling via ef5ab45be70 s3:auth: Use new debug macros for logging via e57f034f013 s3:auth: Fix code spelling via 60b02126a3c selftest: Fix code spelling via 2bba3ef297f script: Fix code spelling via 3233fc03356 python:tests: Fix code spelling from 3522cddf9cf libcli/smb: Remove unused fallback case for ALLOW_GNUTLS_AEAD_CIPHER_ENCRYPTV2_AES_GCM
https://git.samba.org/?p=samba.git;a=shortlog;h=master - Log ----------------------------------------------------------------- commit 0bfdefffc8b269674e4ffeb273170ad68f8efa32 Author: Andreas Schneider <a...@samba.org> Date: Fri Jun 30 12:10:26 2023 +0200 s3:include: Fix code spelling Signed-off-by: Andreas Schneider <a...@samba.org> Reviewed-by: Joseph Sutton <josephsut...@catalyst.net.nz> Autobuild-User(master): Andreas Schneider <a...@cryptomilk.org> Autobuild-Date(master): Wed Jul 5 07:32:15 UTC 2023 on atb-devel-224 commit a26c00db11d9e02b18e7ef9a516eca4a107764d6 Author: Andreas Schneider <a...@samba.org> Date: Fri Jun 30 12:06:20 2023 +0200 s4:client: Fix code spelling Signed-off-by: Andreas Schneider <a...@samba.org> Reviewed-by: Joseph Sutton <josephsut...@catalyst.net.nz> commit ef5ab45be70469b9471455574ac38e7fb435c043 Author: Andreas Schneider <a...@samba.org> Date: Mon Jul 3 11:19:33 2023 +0200 s3:auth: Use new debug macros for logging Signed-off-by: Andreas Schneider <a...@samba.org> Reviewed-by: Joseph Sutton <josephsut...@catalyst.net.nz> commit e57f034f013bda65618898f22f3fb0cb903f0d94 Author: Andreas Schneider <a...@samba.org> Date: Fri Jun 30 12:06:01 2023 +0200 s3:auth: Fix code spelling Signed-off-by: Andreas Schneider <a...@samba.org> Reviewed-by: Joseph Sutton <josephsut...@catalyst.net.nz> commit 60b02126a3c0c05e710ad5be59257e969c0f1e2a Author: Andreas Schneider <a...@samba.org> Date: Fri Jun 30 12:04:33 2023 +0200 selftest: Fix code spelling Signed-off-by: Andreas Schneider <a...@samba.org> Reviewed-by: Joseph Sutton <josephsut...@catalyst.net.nz> commit 2bba3ef297f5f9a8ff55db0b73da5e9ec253e9cb Author: Andreas Schneider <a...@samba.org> Date: Fri Jun 30 11:57:55 2023 +0200 script: Fix code spelling Signed-off-by: Andreas Schneider <a...@samba.org> Reviewed-by: Joseph Sutton <josephsut...@catalyst.net.nz> commit 3233fc0335607ee67c1e03b6387d4b3efb0cc24d Author: Andreas Schneider <a...@samba.org> Date: Fri Jun 30 11:56:06 2023 +0200 python:tests: Fix code spelling Signed-off-by: Andreas Schneider <a...@samba.org> Reviewed-by: Joseph Sutton <josephsut...@catalyst.net.nz> ----------------------------------------------------------------------- Summary of changes: python/samba/tests/dsdb.py | 2 +- script/traffic_replay | 2 +- script/traffic_summary.pl | 8 +++--- selftest/create_smb1_fail_skipfile.txt | 6 ++--- selftest/flapping.d/nbt_dgram | 2 +- selftest/knownfail | 4 +-- selftest/knownfail.d/dns | 2 +- selftest/knownfail.d/samba-4.5-emulation | 2 +- selftest/knownfail_heimdal_kdc | 2 +- selftest/knownfail_mit_kdc | 2 +- selftest/knownfail_mit_kdc_pre_1_20 | 2 +- selftest/manage-ca/manage-ca.sh | 2 +- selftest/ns/mk_nsenter.sh | 2 +- selftest/selftest.pl | 2 +- selftest/target/Samba3.pm | 6 ++--- selftest/todo_smb2_tests_to_port.list | 2 +- source3/auth/auth.c | 46 ++++++++++++++++++-------------- source3/auth/auth_builtin.c | 2 +- source3/auth/auth_generic.c | 2 +- source3/auth/auth_util.c | 2 +- source3/auth/auth_winbind.c | 2 +- source3/auth/check_samsec.c | 4 +-- source3/auth/pampass.c | 10 +++---- source3/auth/pass_check.c | 2 +- source3/auth/proto.h | 12 ++++----- source3/client/clitar.c | 4 +-- source3/include/fake_file.h | 2 +- source3/include/idmap.h | 6 ++--- source3/include/idmap_autorid_tdb.h | 4 +-- source3/include/libsmbclient.h | 20 +++++++------- source3/include/local.h | 6 ++--- source3/include/messages.h | 4 +-- source3/include/nameserv.h | 2 +- source3/include/passdb.h | 30 ++++++++++----------- source3/include/smb.h | 2 +- source3/include/vfs.h | 8 +++--- 36 files changed, 112 insertions(+), 106 deletions(-) Changeset truncated at 500 lines: diff --git a/python/samba/tests/dsdb.py b/python/samba/tests/dsdb.py index d8d9ac1ee3c..37c36d6ab02 100644 --- a/python/samba/tests/dsdb.py +++ b/python/samba/tests/dsdb.py @@ -1189,7 +1189,7 @@ class DsdbStartUpTests(TestCase): lp = samba.tests.env_loadparm() path = lp.configfile - # This is to avoid a tatoo of the global state + # This is to avoid a tattoo of the global state self.lp = LoadParm(filename_for_non_global_lp=path) self.creds = Credentials() self.creds.guess(self.lp) diff --git a/script/traffic_replay b/script/traffic_replay index e785e31babf..60b7adb6e52 100755 --- a/script/traffic_replay +++ b/script/traffic_replay @@ -174,7 +174,7 @@ def main(): if not os.path.exists(model_file): logger.error("Model file %s doesn't exist" % model_file) sys.exit(1) - # the model-file can be ommitted for --generate-users-only and + # the model-file can be omitted for --generate-users-only and # --cleanup-up, but it should be specified in all other cases elif not opts.generate_users_only: logger.error("No model file specified to replay traffic from") diff --git a/script/traffic_summary.pl b/script/traffic_summary.pl index 05c1cf03702..295a320aa0a 100755 --- a/script/traffic_summary.pl +++ b/script/traffic_summary.pl @@ -45,7 +45,7 @@ my $ip_sequence = 0; # count of unique IP addresses seen my $timestamp; # Packet timestamp my $stream; # Wireshark stream number -my $ip_proto; # IP protocol (IANA protocl number) +my $ip_proto; # IP protocol (IANA protocol number) my $source; # source IP address my $dest; # destination address my $proto; # application protocol name @@ -578,7 +578,7 @@ It reads the pdml input from stdin or the list of files passed on the command li B<Wireshark Stream Number> Calculated by wireshark groups related requests and responses B<Source IP> The unique sequence number for the source IP address B<Destination IP> The unique sequence number for the destination IP address - B<protocl> The protocol name + B<protocol> The protocol name B<opcode> The protocol operation code B<Description> The protocol or operation description B<extra> Extra protocol specific data, may be more than one field @@ -636,7 +636,7 @@ It reads the pdml input from stdin or the list of files passed on the command li =head3 ldap modifiyRequest In addition to the standard ldap fields the modification type is also captured - modify_operator for modifyRequests this contains the modifiy operation + modify_operator for modifyRequests this contains the modify operation 0 - add 1 - delete 2 - replace @@ -683,7 +683,7 @@ indicates a kerberos encrypted operation. tshark indicated that the packet was malformed, for ldap it usually indicates TLS encrypted traffic. -=head1 LISENCE AND COPYRIGHT +=head1 LICENSE AND COPYRIGHT Copyright (C) Catalyst.Net Ltd 2017 diff --git a/selftest/create_smb1_fail_skipfile.txt b/selftest/create_smb1_fail_skipfile.txt index aea772f171b..dd08b5d5427 100644 --- a/selftest/create_smb1_fail_skipfile.txt +++ b/selftest/create_smb1_fail_skipfile.txt @@ -12,14 +12,14 @@ environments to be SMB2_02. Servers will only offer protocols starting with the min specified in the conf files, we don't need to change the client value here yet (until SMB1 is -truely gone) +truly gone) 2. The following environments will still negotiate SMB1 ad_dc_ntvfs, rpc_proxy & s4member 3. -Make test wont stop on first error +Make test won't stop on first error Once this patch is applied either a. Commit to gitlab or @@ -139,7 +139,7 @@ index 00000000000..eedfdbb6c35 +#!/usr/bin/env python3 +# +# Simple script to parse make test stdout results -+# to find the tests that are in error, the scrip ++# to find the tests that are in error, the script +# then creates a line for each error suitable for +# putting into a skip file. +# This scripts intended use is in SMB1 to SMB2 test diff --git a/selftest/flapping.d/nbt_dgram b/selftest/flapping.d/nbt_dgram index bb35a7d017b..10390558e64 100644 --- a/selftest/flapping.d/nbt_dgram +++ b/selftest/flapping.d/nbt_dgram @@ -1,6 +1,6 @@ # following SMB1/SMB2 test env split it seems this test # fails randomly however it doesn't seem to be directly -# related to the changes (e.g. not protocl negotiation +# related to the changes (e.g. not protocol negotiation # specific) Best guess is the order of test having being # changed (as a result of test moving env) or some other # strange env related side affect is causing this. diff --git a/selftest/knownfail b/selftest/knownfail index c6e0a242ecb..37c75d7ca33 100644 --- a/selftest/knownfail +++ b/selftest/knownfail @@ -62,7 +62,7 @@ ^samba3.base.delete.deltest17a ^samba3.unix.whoami anonymous connection.whoami\(ad_dc_smb1\) # We need to resolve if we should be including SID_NT_WORLD and SID_NT_NETWORK in this token # smbclient4 behaves differently from smbclient (s3) when encountering -# logon failures when possesing a valid ticket. Test below has been +# logon failures when possessing a valid ticket. Test below has been # changed to use smbclient (in order to support SMB2) and this part of the # test fails due to this difference ^samba4.blackbox.chgdcpass.Test login with kerberos ccache after 2nd password change\(chgdcpass\) @@ -303,7 +303,7 @@ # ^samba.tests.dcerpc.integer.samba.tests.dcerpc.integer.IntegerTests.test_.*_into_uint8_list # -# Samba sort takes a primative approach to unicode sort. These tests +# Samba sort takes a primitive approach to unicode sort. These tests # match Windows 2012R2 behaviour. # ^samba4.ldap.sort.python.+UnicodeSortTests diff --git a/selftest/knownfail.d/dns b/selftest/knownfail.d/dns index fee2f2ae322..94000e03baa 100644 --- a/selftest/knownfail.d/dns +++ b/selftest/knownfail.d/dns @@ -1,5 +1,5 @@ # These tests are expected to fail because we want to ensure that -# unauthenicated updates are not permitted against the default +# unauthenticated updates are not permitted against the default # configuration, nor against an RODC samba.tests.dns.__main__.TestDNSUpdates.test_delete_record\(rodc:local\) diff --git a/selftest/knownfail.d/samba-4.5-emulation b/selftest/knownfail.d/samba-4.5-emulation index 1fc79361e40..ef0cdf1dffa 100644 --- a/selftest/knownfail.d/samba-4.5-emulation +++ b/selftest/knownfail.d/samba-4.5-emulation @@ -1,4 +1,4 @@ -# This fails as there is no second DC in this enviroment, so it is always the owner +# This fails as there is no second DC in this environment, so it is always the owner samba4.drs.getnc_exop.python\(chgdcpass\).getnc_exop.DrsReplicaSyncTestCase.test_FSMONotOwner\(chgdcpass\) # This fails because GET_ANC is now poorly implemented (matching Samba 4.5) ^samba4.drs.getnc_exop.python\(chgdcpass\).getnc_exop.DrsReplicaSyncTestCase.test_link_utdv_hwm\(chgdcpass\) diff --git a/selftest/knownfail_heimdal_kdc b/selftest/knownfail_heimdal_kdc index 61b00aa0200..eea5fb2dfb8 100644 --- a/selftest/knownfail_heimdal_kdc +++ b/selftest/knownfail_heimdal_kdc @@ -1,5 +1,5 @@ # -# We expect all the MIT specific compatability tests to fail on heimdal +# We expect all the MIT specific compatibility tests to fail on heimdal # kerberos ^samba.tests.krb5.compatability_tests.samba.tests.krb5.compatability_tests.SimpleKerberosTests.test_mit_ # diff --git a/selftest/knownfail_mit_kdc b/selftest/knownfail_mit_kdc index 97e3cf9e120..6f4df9771ca 100644 --- a/selftest/knownfail_mit_kdc +++ b/selftest/knownfail_mit_kdc @@ -1,5 +1,5 @@ # -# We expect all the heimdal specific compatability tests to fail on MIT +# We expect all the heimdal specific compatibility tests to fail on MIT # kerberos ^samba.tests.krb5.compatability_tests.samba.tests.krb5.compatability_tests.SimpleKerberosTests.test_heimdal_ # diff --git a/selftest/knownfail_mit_kdc_pre_1_20 b/selftest/knownfail_mit_kdc_pre_1_20 index d84f6de8039..fa808d83837 100644 --- a/selftest/knownfail_mit_kdc_pre_1_20 +++ b/selftest/knownfail_mit_kdc_pre_1_20 @@ -105,7 +105,7 @@ ^samba.tests.krb5.as_req_tests.samba.tests.krb5.as_req_tests.AsReqKerberosTests.test_as_req_enc_timestamp_spn(?!_) ^samba.tests.krb5.as_req_tests.samba.tests.krb5.as_req_tests.AsReqKerberosTests.test_as_req_enc_timestamp_spn_realm # -# KDC COMPATABLITY +# KDC COMPATIBILITY # samba.tests.krb5.compatability_tests.samba.tests.krb5.compatability_tests.SimpleKerberosTests.test_ticket_signature # diff --git a/selftest/manage-ca/manage-ca.sh b/selftest/manage-ca/manage-ca.sh index 8e09a93fbd8..765b4f7493f 100755 --- a/selftest/manage-ca/manage-ca.sh +++ b/selftest/manage-ca/manage-ca.sh @@ -39,7 +39,7 @@ function check_arg() CNF="${1-}" test -n "${CNF}" || { print_usage - echo "ERROR: speficy <CNF_FILE> see manage-ca.templates.d/manage-CA-example.com.cnf" + echo "ERROR: specify <CNF_FILE> see manage-ca.templates.d/manage-CA-example.com.cnf" exit 1 } test -e "${CNF}" || { diff --git a/selftest/ns/mk_nsenter.sh b/selftest/ns/mk_nsenter.sh index c97fda9ea44..6ba50653635 100755 --- a/selftest/ns/mk_nsenter.sh +++ b/selftest/ns/mk_nsenter.sh @@ -2,7 +2,7 @@ # # Helper script. If you want a 2nd shell that communicates with the testenv DC # you can use the nsenter command to change the namespace you're in. However, -# this command is a bit unwieldly and changes depending on the testenv PID. +# this command is a bit unwieldy and changes depending on the testenv PID. # We can generate a helper script on the fly that abstracts all this # complexity, allowing you to use the same, simple command to change the # namespace that you're in, e.g. diff --git a/selftest/selftest.pl b/selftest/selftest.pl index c5041c93497..cff150c9eb7 100755 --- a/selftest/selftest.pl +++ b/selftest/selftest.pl @@ -553,7 +553,7 @@ sub write_clientconf($$$) # each user has a USER-${USER_PRINCIPAL_NAME}-cert.pem and # USER-${USER_PRINCIPAL_NAME}-private-key.pem symlink # We make a copy here and make the certificated easily - # accessable in the client environment. + # accessible in the client environment. my $mask = umask; umask 0077; opendir USERS, "${ca_users_dir}" or die "Could not open dir '${ca_users_dir}': $!"; diff --git a/selftest/target/Samba3.pm b/selftest/target/Samba3.pm index 0bb074cf11e..d9e17473615 100755 --- a/selftest/target/Samba3.pm +++ b/selftest/target/Samba3.pm @@ -1194,7 +1194,7 @@ sub setup_admem_idmap_autorid idmap config * : range = 1000000-19999999 idmap config * : rangesize = 1000000 - # Prevent overridding the provisioned lib/krb5.conf which sets certain + # Prevent overriding the provisioned lib/krb5.conf which sets certain # values required for tests to succeed create krb5 conf = no "; @@ -1290,7 +1290,7 @@ sub setup_ad_member_idmap_rid idmap config * : range = 1000000-1999999 idmap config $dcvars->{DOMAIN} : backend = rid idmap config $dcvars->{DOMAIN} : range = 2000000-2999999 - # Prevent overridding the provisioned lib/krb5.conf which sets certain + # Prevent overriding the provisioned lib/krb5.conf which sets certain # values required for tests to succeed create krb5 conf = no map to guest = bad user @@ -3262,7 +3262,7 @@ sub provision($$) [fsrvp_share] path = $fsrvp_shrdir - comment = fake shapshots using rsync + comment = fake snapshots using rsync vfs objects = shell_snap shadow_copy2 shell_snap:check path command = $fake_snap_pl --check shell_snap:create command = $fake_snap_pl --create diff --git a/selftest/todo_smb2_tests_to_port.list b/selftest/todo_smb2_tests_to_port.list index dc1df963918..8b24c1e92ff 100644 --- a/selftest/todo_smb2_tests_to_port.list +++ b/selftest/todo_smb2_tests_to_port.list @@ -8,7 +8,7 @@ # python3 selftest/tests.py | grep "^samba" \ # | grep _smb1 | grep -v _done # -# Tests that are ported should be moved to approriate _smb1_done +# Tests that are ported should be moved to appropriate _smb1_done # test environment and the entry removed from here samba3.base.attr(ad_dc_smb1) samba3.base.attr(nt4_dc_smb1) diff --git a/source3/auth/auth.c b/source3/auth/auth.c index b388b619d75..b83e98f0a3c 100644 --- a/source3/auth/auth.c +++ b/source3/auth/auth.c @@ -1,4 +1,4 @@ -/* +/* Unix SMB/CIFS implementation. Password and authentication handling Copyright (C) Andrew Bartlett 2001-2002 @@ -86,8 +86,9 @@ NTSTATUS auth_get_ntlm_challenge(struct auth_context *auth_context, uint8_t chal[8]) { if (auth_context->challenge.length) { - DEBUG(5, ("get_ntlm_challenge (auth subsystem): returning previous challenge by module %s (normal)\n", - auth_context->challenge_set_by)); + DBG_INFO("get_ntlm_challenge (auth subsystem): returning " + "previous challenge by module %s (normal)\n", + auth_context->challenge_set_by); memcpy(chal, auth_context->challenge.data, 8); return NT_STATUS_OK; } @@ -111,14 +112,14 @@ NTSTATUS auth_get_ntlm_challenge(struct auth_context *auth_context, * Check user is in correct domain (if required) * * @param user Only used to fill in the debug message - * + * * @param domain The domain to be verified * - * @return True if the user can connect with that domain, + * @return True if the user can connect with that domain, * False otherwise. **/ -static bool check_domain_match(const char *user, const char *domain) +static bool check_domain_match(const char *user, const char *domain) { /* * If we aren't serving to trusted domains, we must make sure that @@ -127,8 +128,8 @@ static bool check_domain_match(const char *user, const char *domain) */ if (!lp_allow_trusted_domains() && - !(strequal("", domain) || - strequal(lp_workgroup(), domain) || + !(strequal("", domain) || + strequal(lp_workgroup(), domain) || is_myname(domain))) { DEBUG(1, ("check_domain_match: Attempt to connect as user %s from domain %s denied.\n", user, domain)); return False; @@ -146,17 +147,17 @@ static bool check_domain_match(const char *user, const char *domain) * This function does NOT need to be in a become_root()/unbecome_root() pair * as it makes the calls itself when needed. * - * The return value takes precedence over the contents of the server_info - * struct. When the return is other than NT_STATUS_OK the contents + * The return value takes precedence over the contents of the server_info + * struct. When the return is other than NT_STATUS_OK the contents * of that structure is undefined. * * @param user_info Contains the user supplied components, including the passwords. * Must be created with make_user_info() or one of its wrappers. * - * @param auth_context Supplies the challenges and some other data. - * Must be created with make_auth_context(), and the challenges should be - * filled in, either at creation or by calling the challenge geneation - * function auth_get_challenge(). + * @param auth_context Supplies the challenges and some other data. + * Must be created with make_auth_context(), and the challenges should be + * filled in, either at creation or by calling the challenge generation + * function auth_get_challenge(). * * @param pserver_info If successful, contains information about the authentication, * including a struct samu struct describing the user. @@ -198,11 +199,16 @@ NTSTATUS auth_check_ntlm_password(TALLOC_CTX *mem_ctx, *pauthoritative = 1; - DEBUG(3, ("check_ntlm_password: Checking password for unmapped user [%s]\\[%s]@[%s] with the new password interface\n", - user_info->client.domain_name, user_info->client.account_name, user_info->workstation_name)); + DBG_NOTICE("check_ntlm_password: Checking password for unmapped user " + "[%s]\\[%s]@[%s] with the new password interface\n", + user_info->client.domain_name, + user_info->client.account_name, + user_info->workstation_name); - DEBUG(3, ("check_ntlm_password: mapped user is: [%s]\\[%s]@[%s]\n", - user_info->mapped.domain_name, user_info->mapped.account_name, user_info->workstation_name)); + DBG_NOTICE("check_ntlm_password: mapped user is: [%s]\\[%s]@[%s]\n", + user_info->mapped.domain_name, + user_info->mapped.account_name, + user_info->workstation_name); if (auth_context->challenge.length != 8) { DEBUG(0, ("check_ntlm_password: Invalid challenge stored for this auth context - cannot continue\n")); @@ -218,7 +224,7 @@ NTSTATUS auth_check_ntlm_password(TALLOC_CTX *mem_ctx, dump_data(5, auth_context->challenge.data, auth_context->challenge.length); #ifdef DEBUG_PASSWORD - DEBUG(100, ("user_info has passwords of length %d and %d\n", + DEBUG(100, ("user_info has passwords of length %d and %d\n", (int)user_info->password.response.lanman.length, (int)user_info->password.response.nt.length)); DEBUG(100, ("lm:\n")); dump_data(100, user_info->password.response.lanman.data, user_info->password.response.lanman.length); @@ -487,7 +493,7 @@ static NTSTATUS make_auth_context_text_list(TALLOC_CTX *mem_ctx, return nt_status; } - for (;*text_list; text_list++) { + for (;*text_list; text_list++) { if (load_auth_module(*auth_context, *text_list, &t)) { DLIST_ADD_END(list, t); } diff --git a/source3/auth/auth_builtin.c b/source3/auth/auth_builtin.c index 046b9793e33..646fbea272f 100644 --- a/source3/auth/auth_builtin.c +++ b/source3/auth/auth_builtin.c @@ -109,7 +109,7 @@ static NTSTATUS auth_init_anonymous( /** * Return an error based on username * - * This function allows the testing of obsure errors, as well as the generation + * This function allows the testing of obscure errors, as well as the generation * of NT_STATUS -> DOS error mapping tables. * * This module is of no value to end-users. diff --git a/source3/auth/auth_generic.c b/source3/auth/auth_generic.c index 673f441d9a5..f9570455fe3 100644 --- a/source3/auth/auth_generic.c +++ b/source3/auth/auth_generic.c @@ -85,7 +85,7 @@ static NTSTATUS auth3_generate_session_info_pac(struct auth4_context *auth_ctx, if (pac_blob == NULL) { /* - * This should already be catched at the main + * This should already be caught at the main * gensec layer, but better check twice */ status = NT_STATUS_INTERNAL_ERROR; diff --git a/source3/auth/auth_util.c b/source3/auth/auth_util.c index 9fe407ee5e9..293523f4272 100644 --- a/source3/auth/auth_util.c +++ b/source3/auth/auth_util.c @@ -2295,7 +2295,7 @@ bool is_trusted_domain(const char* dom_name) /* on a logon error possibly map the error to success if "map to guest" - is set approriately + is set appropriately */ NTSTATUS do_map_to_guest_server_info(TALLOC_CTX *mem_ctx, NTSTATUS status, diff --git a/source3/auth/auth_winbind.c b/source3/auth/auth_winbind.c index 3b8d1a95769..46db4f21f7a 100644 --- a/source3/auth/auth_winbind.c +++ b/source3/auth/auth_winbind.c @@ -1,7 +1,7 @@ /* Unix SMB/CIFS implementation. - Winbind authentication mechnism + Winbind authentication mechanism Copyright (C) Tim Potter 2000 Copyright (C) Andrew Bartlett 2001 - 2002 diff --git a/source3/auth/check_samsec.c b/source3/auth/check_samsec.c index 30125809563..1e55fedb615 100644 --- a/source3/auth/check_samsec.c +++ b/source3/auth/check_samsec.c @@ -429,7 +429,7 @@ NTSTATUS check_sam_security(const DATA_BLOB *challenge, user_info, &user_sess_key, &lm_sess_key); /* - * We must re-load the sam acount information under a mutex + * We must re-load the sam account information under a mutex * lock to ensure we don't miss any concurrent account lockout * changes. */ @@ -589,7 +589,7 @@ NTSTATUS check_sam_security(const DATA_BLOB *challenge, done: /* - * Always flush the getpwsid cache or this will grow indefinetly for + * Always flush the getpwsid cache or this will grow indefinitely for * each NTLM auththentication. */ memcache_flush(NULL, PDB_GETPWSID_CACHE); diff --git a/source3/auth/pampass.c b/source3/auth/pampass.c index c761d3e4fda..15025e7f1d4 100644 --- a/source3/auth/pampass.c +++ b/source3/auth/pampass.c @@ -22,7 +22,7 @@ /* * This module provides PAM based functions for validation of - * username/password pairs, account managment, session and access control. + * username/password pairs, account management, session and access control. * Note: SMB password checking is done in smbpass.c */ @@ -95,7 +95,7 @@ static bool smb_pam_error_handler(pam_handle_t *pamh, int pam_error, const char /******************************************************************* This function is a sanity check, to make sure that we NEVER report - failure as sucess. + failure as success. *********************************************************************/ static bool smb_pam_nt_status_error_handler(pam_handle_t *pamh, int pam_error, @@ -137,7 +137,7 @@ static int smb_pam_conv(int num_msg, return PAM_CONV_ERR; /* - * Apparantly HPUX has a buggy PAM that doesn't support the + * Apparently HPUX has a buggy PAM that doesn't support the * appdata_ptr. Fail if this is the case. JRA. */ @@ -306,7 +306,7 @@ static int smb_pam_passchange_conv(int num_msg, return PAM_CONV_ERR; /* - * Apparantly HPUX has a buggy PAM that doesn't support the + * Apparently HPUX has a buggy PAM that doesn't support the * appdata_ptr. Fail if this is the case. JRA. */ @@ -607,7 +607,7 @@ static NTSTATUS smb_pam_setcred(pam_handle_t *pamh, const char * user) NTSTATUS nt_status = NT_STATUS_NO_TOKEN; -- Samba Shared Repository