s4:dsdb: Fix code spelling
authorJo Sutton <josutton@catalyst.net.nz>
Mon, 8 Jan 2024 02:04:47 +0000 (15:04 +1300)
committerAndrew Bartlett <abartlet@samba.org>
Thu, 8 Feb 2024 02:48:44 +0000 (02:48 +0000)
Signed-off-by: Jo Sutton <josutton@catalyst.net.nz>
Reviewed-by: Andrew Bartlett <abartlet@samba.org>
source4/dsdb/common/util.c
source4/dsdb/samdb/ldb_modules/password_hash.c

index 7030d9c025af01b842f06b9fc22eaf4fc14d49f6..b2d6cc6ea39e1999ca2320992a2c798be2b4a809 100644 (file)
@@ -528,7 +528,7 @@ NTTIME samdb_result_allow_password_change(struct ldb_context *sam_ldb,
 }
 
 /*
-  pull a samr_Password structutre from a result set.
+  pull a samr_Password structure from a result set.
 */
 struct samr_Password *samdb_result_hash(TALLOC_CTX *mem_ctx, const struct ldb_message *msg, const char *attr)
 {
@@ -654,7 +654,7 @@ NTSTATUS samdb_result_passwords(TALLOC_CTX *mem_ctx,
 }
 
 /*
-  pull a samr_LogonHours structutre from a result set.
+  pull a samr_LogonHours structure from a result set.
 */
 struct samr_LogonHours samdb_result_logon_hours(TALLOC_CTX *mem_ctx, struct ldb_message *msg, const char *attr)
 {
index c8f9e47cda5dcdd27f4cb41402cc2c083deaa5fe..4e95f83e497bc9d290f0c30fa596432335846d80 100644 (file)
@@ -539,13 +539,13 @@ static int password_hash_bypass(struct ldb_module *module, struct ldb_request *r
                        if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
                                talloc_free(scb);
                                return ldb_error(ldb, LDB_ERR_CONSTRAINT_VIOLATION,
-                                                "ndr_pull_struct_blob PrimaryKerberosNeverKeys");
+                                                "ndr_pull_struct_blob PrimaryKerberosNewerKeys");
                        }
 
                        if (k->version != 4) {
                                talloc_free(scb);
                                return ldb_error(ldb, LDB_ERR_CONSTRAINT_VIOLATION,
-                                                "KerberosNerverKeys version != 4");
+                                                "KerberosNewerKeys version != 4");
                        }
 
                        if (k->ctr.ctr4.salt.string == NULL) {
@@ -1012,7 +1012,7 @@ static int setup_primary_kerberos(struct setup_password_fields_io *io,
                old_pkb3 = &_old_pkb.ctr.ctr3;
        }
 
-       /* if we didn't found the old keys we're done */
+       /* if we didn't find the old keys we're done */
        if (!old_pkb3) {
                return LDB_SUCCESS;
        }
@@ -1127,7 +1127,7 @@ static int setup_primary_kerberos_newer(struct setup_password_fields_io *io,
                old_pkb4 = &_old_pkb.ctr.ctr4;
        }
 
-       /* if we didn't found the old keys we're done */
+       /* if we didn't find the old keys we're done */
        if (!old_pkb4) {
                return LDB_SUCCESS;
        }