diff options
author | Brad Hards <bradh@frogmouth.net> | 2011-06-17 19:53:11 +1000 |
---|---|---|
committer | Andrew Tridgell <tridge@samba.org> | 2011-06-21 15:54:32 +1000 |
commit | c017cbfaa47f6cb7da38a7021427412fe2e62a8d (patch) | |
tree | aab7f15dc1046c690d54ec2e4cedc586074f79af /source4/auth/credentials | |
parent | 35a9c23a016e76df7b5647e1b9285f70d15db807 (diff) | |
download | samba-c017cbfaa47f6cb7da38a7021427412fe2e62a8d.tar.gz samba-c017cbfaa47f6cb7da38a7021427412fe2e62a8d.tar.bz2 samba-c017cbfaa47f6cb7da38a7021427412fe2e62a8d.zip |
s4/auth: Trivial spelling fixes.
Signed-off-by: Andrew Tridgell <tridge@samba.org>
Diffstat (limited to 'source4/auth/credentials')
-rw-r--r-- | source4/auth/credentials/credentials_krb5.c | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/source4/auth/credentials/credentials_krb5.c b/source4/auth/credentials/credentials_krb5.c index 6670f434d9..1643197004 100644 --- a/source4/auth/credentials/credentials_krb5.c +++ b/source4/auth/credentials/credentials_krb5.c @@ -387,7 +387,7 @@ void cli_credentials_invalidate_client_gss_creds(struct cli_credentials *cred, } /* Now that we know that the data is 'this specified', then * don't allow something less 'known' to be returned as a - * ccache. Ie, if the username is on the commmand line, we + * ccache. Ie, if the username is on the command line, we * don't want to later guess to use a file-based ccache */ if (obtained > cred->client_gss_creds_threshold) { cred->client_gss_creds_threshold = obtained; @@ -420,7 +420,7 @@ _PUBLIC_ void cli_credentials_invalidate_ccache(struct cli_credentials *cred, } /* Now that we know that the data is 'this specified', then * don't allow something less 'known' to be returned as a - * ccache. Ie, if the username is on the commmand line, we + * ccache. i.e, if the username is on the command line, we * don't want to later guess to use a file-based ccache */ if (obtained > cred->ccache_threshold) { cred->ccache_threshold = obtained; @@ -844,7 +844,7 @@ _PUBLIC_ void cli_credentials_set_salt_principal(struct cli_credentials *cred, c cred->salt_principal = talloc_strdup(cred, principal); } -/* The 'impersonate_principal' is used to allow on Kerberos principal +/* The 'impersonate_principal' is used to allow one Kerberos principal * (and it's associated keytab etc) to impersonate another. The * ability to do this is controlled by the KDC, but it is generally * permitted to impersonate anyone to yourself. This allows any |