diff options
| -rw-r--r-- | source4/auth/credentials/credentials_krb5.c | 6 | ||||
| -rw-r--r-- | source4/auth/kerberos/kerberos_util.c | 6 | 
2 files changed, 6 insertions, 6 deletions
diff --git a/source4/auth/credentials/credentials_krb5.c b/source4/auth/credentials/credentials_krb5.c index 6670f434d9..1643197004 100644 --- a/source4/auth/credentials/credentials_krb5.c +++ b/source4/auth/credentials/credentials_krb5.c @@ -387,7 +387,7 @@ void cli_credentials_invalidate_client_gss_creds(struct cli_credentials *cred,  	}  	/* Now that we know that the data is 'this specified', then  	 * don't allow something less 'known' to be returned as a -	 * ccache.  Ie, if the username is on the commmand line, we +	 * ccache.  Ie, if the username is on the command line, we  	 * don't want to later guess to use a file-based ccache */  	if (obtained > cred->client_gss_creds_threshold) {  		cred->client_gss_creds_threshold = obtained; @@ -420,7 +420,7 @@ _PUBLIC_ void cli_credentials_invalidate_ccache(struct cli_credentials *cred,  	}  	/* Now that we know that the data is 'this specified', then  	 * don't allow something less 'known' to be returned as a -	 * ccache.  Ie, if the username is on the commmand line, we +	 * ccache.  i.e, if the username is on the command line, we  	 * don't want to later guess to use a file-based ccache */  	if (obtained > cred->ccache_threshold) {  		cred->ccache_threshold  = obtained; @@ -844,7 +844,7 @@ _PUBLIC_ void cli_credentials_set_salt_principal(struct cli_credentials *cred, c  	cred->salt_principal = talloc_strdup(cred, principal);  } -/* The 'impersonate_principal' is used to allow on Kerberos principal +/* The 'impersonate_principal' is used to allow one Kerberos principal   * (and it's associated keytab etc) to impersonate another.  The   * ability to do this is controlled by the KDC, but it is generally   * permitted to impersonate anyone to yourself.  This allows any diff --git a/source4/auth/kerberos/kerberos_util.c b/source4/auth/kerberos/kerberos_util.c index f05016b873..9cef977306 100644 --- a/source4/auth/kerberos/kerberos_util.c +++ b/source4/auth/kerberos/kerberos_util.c @@ -173,7 +173,7 @@ static krb5_error_code principals_from_msg(TALLOC_CTX *parent_ctx,  			return ret;  		} -		/* This song-and-dance effectivly puts the principal +		/* This song-and-dance effectively puts the principal  		 * into talloc, so we can't loose it. */  		talloc_set_destructor(principals[i], free_principal);  		i++; @@ -262,7 +262,7 @@ static krb5_error_code salt_principal_from_msg(TALLOC_CTX *parent_ctx,  					  upper_realm,  					  "host", salt_body, NULL);  		if (ret == 0) { -			/* This song-and-dance effectivly puts the principal +			/* This song-and-dance effectively puts the principal  			 * into talloc, so we can't loose it. */  			mem_ctx->smb_krb5_context = talloc_reference(mem_ctx, smb_krb5_context);  			mem_ctx->principal = *salt_princ; @@ -737,7 +737,7 @@ static krb5_error_code remove_old_entries(TALLOC_CTX *parent_ctx,  			/* Release the enumeration.  We are going to  			 * have to start this from the top again,  			 * because deletes during enumeration may not -			 * always be consistant. +			 * always be consistent.  			 *  			 * Also, the enumeration locks a FILE: keytab  			 */  | 
