}
/*
- pull a samr_Password structutre from a result set.
+ pull a samr_Password structure from a result set.
*/
struct samr_Password *samdb_result_hash(TALLOC_CTX *mem_ctx, const struct ldb_message *msg, const char *attr)
{
}
/*
- pull a samr_LogonHours structutre from a result set.
+ pull a samr_LogonHours structure from a result set.
*/
struct samr_LogonHours samdb_result_logon_hours(TALLOC_CTX *mem_ctx, struct ldb_message *msg, const char *attr)
{
if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
talloc_free(scb);
return ldb_error(ldb, LDB_ERR_CONSTRAINT_VIOLATION,
- "ndr_pull_struct_blob PrimaryKerberosNeverKeys");
+ "ndr_pull_struct_blob PrimaryKerberosNewerKeys");
}
if (k->version != 4) {
talloc_free(scb);
return ldb_error(ldb, LDB_ERR_CONSTRAINT_VIOLATION,
- "KerberosNerverKeys version != 4");
+ "KerberosNewerKeys version != 4");
}
if (k->ctr.ctr4.salt.string == NULL) {
old_pkb3 = &_old_pkb.ctr.ctr3;
}
- /* if we didn't found the old keys we're done */
+ /* if we didn't find the old keys we're done */
if (!old_pkb3) {
return LDB_SUCCESS;
}
old_pkb4 = &_old_pkb.ctr.ctr4;
}
- /* if we didn't found the old keys we're done */
+ /* if we didn't find the old keys we're done */
if (!old_pkb4) {
return LDB_SUCCESS;
}