diff options
author | Brad Hards <bradh@frogmouth.net> | 2010-11-08 12:15:50 +1100 |
---|---|---|
committer | Andrew Tridgell <tridge@samba.org> | 2010-11-08 18:15:23 +1100 |
commit | cd4c3d6d7ba987abf7b2ae7b826b9ef0c8cb0f2f (patch) | |
tree | 96344f034e7c3c57624ef6e4ecd7e0b975f4c9c0 | |
parent | 3c4376c4d8dbd7c5db52df7442ec410dbfb06e62 (diff) | |
download | samba-cd4c3d6d7ba987abf7b2ae7b826b9ef0c8cb0f2f.tar.gz samba-cd4c3d6d7ba987abf7b2ae7b826b9ef0c8cb0f2f.tar.bz2 samba-cd4c3d6d7ba987abf7b2ae7b826b9ef0c8cb0f2f.zip |
s4-auth Fix typos in samba4 auth code
-rw-r--r-- | source4/auth/gensec/gensec_gssapi.c | 14 |
1 files changed, 7 insertions, 7 deletions
diff --git a/source4/auth/gensec/gensec_gssapi.c b/source4/auth/gensec/gensec_gssapi.c index 4729ed6062..3c579fee50 100644 --- a/source4/auth/gensec/gensec_gssapi.c +++ b/source4/auth/gensec/gensec_gssapi.c @@ -553,9 +553,9 @@ static NTSTATUS gensec_gssapi_update(struct gensec_security *gensec_security, gensec_gssapi_state->sasl_state = STAGE_DONE; if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SEAL)) { - DEBUG(5, ("GSSAPI Connection will be cryptographicly sealed\n")); + DEBUG(5, ("GSSAPI Connection will be cryptographically sealed\n")); } else if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SIGN)) { - DEBUG(5, ("GSSAPI Connection will be cryptographicly signed\n")); + DEBUG(5, ("GSSAPI Connection will be cryptographically signed\n")); } else { DEBUG(5, ("GSSAPI Connection will have no cryptographic protection\n")); } @@ -688,11 +688,11 @@ static NTSTATUS gensec_gssapi_update(struct gensec_security *gensec_security, gensec_gssapi_state->sasl_state = STAGE_DONE; if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SEAL)) { - DEBUG(3, ("SASL/GSSAPI Connection to server will be cryptographicly sealed\n")); + DEBUG(3, ("SASL/GSSAPI Connection to server will be cryptographically sealed\n")); } else if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SIGN)) { - DEBUG(3, ("SASL/GSSAPI Connection to server will be cryptographicly signed\n")); + DEBUG(3, ("SASL/GSSAPI Connection to server will be cryptographically signed\n")); } else { - DEBUG(3, ("SASL/GSSAPI Connection to server will have no cryptographicly protection\n")); + DEBUG(3, ("SASL/GSSAPI Connection to server will have no cryptographically protection\n")); } return NT_STATUS_OK; @@ -816,9 +816,9 @@ static NTSTATUS gensec_gssapi_update(struct gensec_security *gensec_security, /* quirk: This changes the value that gensec_have_feature returns, to be that after SASL negotiation */ gensec_gssapi_state->sasl_state = STAGE_DONE; if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SEAL)) { - DEBUG(5, ("SASL/GSSAPI Connection from client will be cryptographicly sealed\n")); + DEBUG(5, ("SASL/GSSAPI Connection from client will be cryptographically sealed\n")); } else if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SIGN)) { - DEBUG(5, ("SASL/GSSAPI Connection from client will be cryptographicly signed\n")); + DEBUG(5, ("SASL/GSSAPI Connection from client will be cryptographically signed\n")); } else { DEBUG(5, ("SASL/GSSAPI Connection from client will have no cryptographic protection\n")); } |