summaryrefslogtreecommitdiff
path: root/source4
diff options
context:
space:
mode:
authorBrad Hards <bradh@frogmouth.net>2010-11-08 12:15:50 +1100
committerAndrew Tridgell <tridge@samba.org>2010-11-08 18:15:23 +1100
commitcd4c3d6d7ba987abf7b2ae7b826b9ef0c8cb0f2f (patch)
tree96344f034e7c3c57624ef6e4ecd7e0b975f4c9c0 /source4
parent3c4376c4d8dbd7c5db52df7442ec410dbfb06e62 (diff)
downloadsamba-cd4c3d6d7ba987abf7b2ae7b826b9ef0c8cb0f2f.tar.gz
samba-cd4c3d6d7ba987abf7b2ae7b826b9ef0c8cb0f2f.tar.bz2
samba-cd4c3d6d7ba987abf7b2ae7b826b9ef0c8cb0f2f.zip
s4-auth Fix typos in samba4 auth code
Diffstat (limited to 'source4')
-rw-r--r--source4/auth/gensec/gensec_gssapi.c14
1 files changed, 7 insertions, 7 deletions
diff --git a/source4/auth/gensec/gensec_gssapi.c b/source4/auth/gensec/gensec_gssapi.c
index 4729ed6062..3c579fee50 100644
--- a/source4/auth/gensec/gensec_gssapi.c
+++ b/source4/auth/gensec/gensec_gssapi.c
@@ -553,9 +553,9 @@ static NTSTATUS gensec_gssapi_update(struct gensec_security *gensec_security,
gensec_gssapi_state->sasl_state = STAGE_DONE;
if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SEAL)) {
- DEBUG(5, ("GSSAPI Connection will be cryptographicly sealed\n"));
+ DEBUG(5, ("GSSAPI Connection will be cryptographically sealed\n"));
} else if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SIGN)) {
- DEBUG(5, ("GSSAPI Connection will be cryptographicly signed\n"));
+ DEBUG(5, ("GSSAPI Connection will be cryptographically signed\n"));
} else {
DEBUG(5, ("GSSAPI Connection will have no cryptographic protection\n"));
}
@@ -688,11 +688,11 @@ static NTSTATUS gensec_gssapi_update(struct gensec_security *gensec_security,
gensec_gssapi_state->sasl_state = STAGE_DONE;
if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SEAL)) {
- DEBUG(3, ("SASL/GSSAPI Connection to server will be cryptographicly sealed\n"));
+ DEBUG(3, ("SASL/GSSAPI Connection to server will be cryptographically sealed\n"));
} else if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SIGN)) {
- DEBUG(3, ("SASL/GSSAPI Connection to server will be cryptographicly signed\n"));
+ DEBUG(3, ("SASL/GSSAPI Connection to server will be cryptographically signed\n"));
} else {
- DEBUG(3, ("SASL/GSSAPI Connection to server will have no cryptographicly protection\n"));
+ DEBUG(3, ("SASL/GSSAPI Connection to server will have no cryptographically protection\n"));
}
return NT_STATUS_OK;
@@ -816,9 +816,9 @@ static NTSTATUS gensec_gssapi_update(struct gensec_security *gensec_security,
/* quirk: This changes the value that gensec_have_feature returns, to be that after SASL negotiation */
gensec_gssapi_state->sasl_state = STAGE_DONE;
if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SEAL)) {
- DEBUG(5, ("SASL/GSSAPI Connection from client will be cryptographicly sealed\n"));
+ DEBUG(5, ("SASL/GSSAPI Connection from client will be cryptographically sealed\n"));
} else if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SIGN)) {
- DEBUG(5, ("SASL/GSSAPI Connection from client will be cryptographicly signed\n"));
+ DEBUG(5, ("SASL/GSSAPI Connection from client will be cryptographically signed\n"));
} else {
DEBUG(5, ("SASL/GSSAPI Connection from client will have no cryptographic protection\n"));
}