Mode : in Flush_Mode := Sync_Flush);
-- Flush the written data to the back stream,
-- all data placed to the compressor is flushing to the Back stream.
- -- Should not be used untill necessary, becouse it is decreasing
+ -- Should not be used untill necessary, because it is decreasing
-- compression.
function Read_Total_In (Stream : in Stream_Type) return Count;
Rest_Last : Stream_Element_Offset;
-- Buffer for Read operation.
-- We need to have this buffer in the record
- -- becouse not all read data from back stream
+ -- because not all read data from back stream
-- could be processed during the read operation.
Buffer_Size : Stream_Element_Offset;
-- Buffer size for write operation.
-- We do not need to have this buffer
- -- in the record becouse all data could be
+ -- in the record because all data could be
-- processed in the write operation.
Back : Stream_Access;
pragma Import (C, inflateBackInit, "inflateBackInit_");
- -- I stopped binding the inflateBack routines, becouse realize that
+ -- I stopped binding the inflateBack routines, because realize that
-- it does not support zlib and gzip headers for now, and have no
-- symmetric deflateBack routines.
-- ZLib-Ada is symmetric regarding deflate/inflate data transformation
} else {
DEBUG(2,("ntlm_password_check: NTLMv1 passwords NOT PERMITTED for user %s\n",
username));
- /* no return, becouse we might pick up LMv2 in the LM field */
+ /* no return, because we might pick up LMv2 in the LM field */
}
}
dump_data_pw("ntlmssp clear data\n", data, length);
if (ntlmssp_state->neg_flags & NTLMSSP_NEGOTIATE_NTLM2) {
/* The order of these two operations matters - we must first seal the packet,
- then seal the sequence number - this is becouse the send_seal_hash is not
+ then seal the sequence number - this is because the send_seal_hash is not
constant, but is is rather updated with each iteration */
NTSTATUS nt_status = ntlmssp_make_packet_signature(ntlmssp_state,
data, length,
}
/* The order of these two operations matters - we must first seal the packet,
- then seal the sequence number - this is becouse the ntlmv1_arc4_state is not
+ then seal the sequence number - this is because the ntlmv1_arc4_state is not
constant, but is is rather updated with each iteration */
dump_arc4_state("ntlmv1 arc4 state:\n",
load_interfaces();
/* this makes sure that when we do things like call scripts,
- that it won't assert becouse we are not root */
+ that it won't assert because we are not root */
sec_init();
if (c->opt_machine_pass) {
dump_data_pw("ntlmssp clear data\n", data, length);
if (gensec_ntlmssp_state->neg_flags & NTLMSSP_NEGOTIATE_NTLM2) {
/* The order of these two operations matters - we must first seal the packet,
- then seal the sequence number - this is becouse the send_seal_hash is not
+ then seal the sequence number - this is because the send_seal_hash is not
constant, but is is rather updated with each iteration */
nt_status = ntlmssp_make_packet_signature(gensec_ntlmssp_state, sig_mem_ctx,
data, length,
/* The order of these two operations matters - we must
first seal the packet, then seal the sequence
- number - this is becouse the ntlmssp_hash is not
+ number - this is because the ntlmssp_hash is not
constant, but is is rather updated with each
iteration */