diff --git a/source4/torture/rpc/alter_context.c b/source4/torture/rpc/alter_context.c index 22abd97e2fc..9b697279c85 100644 --- a/source4/torture/rpc/alter_context.c +++ b/source4/torture/rpc/alter_context.c @@ -89,7 +89,7 @@ bool torture_rpc_alter_context(struct torture_context *torture) NT_STATUS_CONNECTION_RESET); torture_assert(torture, !dcerpc_binding_handle_is_connected(p->binding_handle), - "dcerpc disonnected"); + "dcerpc disconnected"); return ret; } diff --git a/source4/torture/rpc/backupkey.c b/source4/torture/rpc/backupkey.c index 9dd6f5eb270..23572e82e57 100644 --- a/source4/torture/rpc/backupkey.c +++ b/source4/torture/rpc/backupkey.c @@ -54,7 +54,7 @@ enum test_wrong { /* Our very special and valued secret */ /* No need to put const as we cast the array in uint8_t - * we will get a warning about the discared const + * we will get a warning about the discarded const */ static const char secret[] = "tata yoyo mais qu'est ce qu'il y a sous ton grand chapeau ?"; @@ -188,7 +188,7 @@ static struct dom_sid *get_user_sid(struct torture_context *tctx, * the version depends on the version parameter * the structure is returned as a blob. * The broken flag is to indicate if we want - * to create a non conform to specification structre + * to create a non conform to specification structure */ static DATA_BLOB *create_unencryptedsecret(TALLOC_CTX *mem_ctx, bool broken, @@ -216,7 +216,7 @@ static DATA_BLOB *create_unencryptedsecret(TALLOC_CTX *mem_ctx, if (broken) { /* The magic value is correctly set by the NDR push * but we want to test the behavior of the server - * if a differrent value is provided + * if a different value is provided */ ((uint8_t*)blob->data)[4] = 79; /* A great year !!! */ } @@ -241,7 +241,7 @@ static DATA_BLOB *create_unencryptedsecret(TALLOC_CTX *mem_ctx, /* * The magic value is correctly set by the NDR push * but we want to test the behavior of the server - * if a differrent value is provided + * if a different value is provided */ ((uint8_t*)blob->data)[4] = 79; /* A great year !!! */ } @@ -252,7 +252,7 @@ static DATA_BLOB *create_unencryptedsecret(TALLOC_CTX *mem_ctx, /* * Create an access check structure, the format depends on the version parameter. - * If broken is specified then we create a stucture that isn't conform to the + * If broken is specified then we create a structure that isn't conform to the * specification. * * If the structure can't be created then NULL is returned. diff --git a/source4/torture/rpc/drsuapi.c b/source4/torture/rpc/drsuapi.c index d3e18ca246b..4c7e2fc39df 100644 --- a/source4/torture/rpc/drsuapi.c +++ b/source4/torture/rpc/drsuapi.c @@ -690,7 +690,7 @@ bool test_QuerySitesByCost(struct torture_context *tctx, "dcerpc_drsuapi_QuerySitesByCost"); torture_assert_int_equal(tctx, r.out.ctr->ctr1.info[1].site_cost, -1, - "dcerpc_drsuapi_QuerySitesByCost exptected site cost"); + "dcerpc_drsuapi_QuerySitesByCost expected site cost"); } return true; diff --git a/source4/torture/rpc/iremotewinspool_driver.c b/source4/torture/rpc/iremotewinspool_driver.c index f88b13a060b..4e558ef742c 100644 --- a/source4/torture/rpc/iremotewinspool_driver.c +++ b/source4/torture/rpc/iremotewinspool_driver.c @@ -672,7 +672,7 @@ static bool test_CopyDriverFiles(struct torture_context *tctx, status = smbcli_mkdir(ctx->dinfo->cli->tree, ctx->dinfo->print_upload_guid_dir); torture_assert_ntstatus_ok_goto(tctx, status, ok, done, "Failed to create upload directory"); - /* Walk the provided torture option driver_path file tree, creating the directory heirarchy and + /* Walk the provided torture option driver_path file tree, creating the directory hierarchy and * copying all files to print$/{GUID}/ share */ ret = tftw(tctx, ctx->dinfo->local_driver_path, copy_driver_files, TFTW_MAX_DEPTH, ctx->dinfo); torture_assert_int_equal_goto(tctx, ret, 0, ok, done, "Failed to copy driver files to print$/{GUID}/ dir"); diff --git a/source4/torture/rpc/lsa.c b/source4/torture/rpc/lsa.c index d22546862d5..3deb75bb94d 100644 --- a/source4/torture/rpc/lsa.c +++ b/source4/torture/rpc/lsa.c @@ -3636,7 +3636,7 @@ static bool check_pw_with_krb5(struct torture_context *tctx, torture_assert_int_not_equal(tctx, t_kvno, 0, assertion_message); } else { assertion_message = talloc_asprintf(ctx, - "krbtgt_referral_ticket(%s) kvno(NULL) exptected(%u) current(%u)", + "krbtgt_referral_ticket(%s) kvno(NULL) expected(%u) current(%u)", krbtgt_trust_realm_string, (unsigned)expected_kvno,(unsigned)kvno); torture_comment(tctx, "%s\n", assertion_message); diff --git a/source4/torture/rpc/mdssvc.c b/source4/torture/rpc/mdssvc.c index 213ff32ba62..2096ed7b9c7 100644 --- a/source4/torture/rpc/mdssvc.c +++ b/source4/torture/rpc/mdssvc.c @@ -1,6 +1,6 @@ /* Unix SMB/CIFS implementation. - test suite for the mdssvc RPC serice + test suite for the mdssvc RPC service Copyright (C) Ralph Boehme 2019 diff --git a/source4/torture/rpc/netlogon.c b/source4/torture/rpc/netlogon.c index a3d190f13dd..dbfca5fe1c8 100644 --- a/source4/torture/rpc/netlogon.c +++ b/source4/torture/rpc/netlogon.c @@ -2292,7 +2292,7 @@ static bool test_ServerReqChallengeGlobal(struct torture_context *tctx, /* * Test the re-use of the challenge is not possible on a third - * connection, after first useing it second one. + * connection, after first using it second one. */ static bool test_ServerReqChallengeReuseGlobal(struct torture_context *tctx, diff --git a/source4/torture/rpc/remote_pac.c b/source4/torture/rpc/remote_pac.c index edf98a27d11..8f4ee2bbc44 100644 --- a/source4/torture/rpc/remote_pac.c +++ b/source4/torture/rpc/remote_pac.c @@ -147,7 +147,7 @@ static const struct PAC_BUFFER *get_pac_buffer(const struct PAC_DATA *pac_data, return pac_buf; } -/* Also happens to be a really good one-step verfication of our Kerberos stack */ +/* Also happens to be a really good one-step verification of our Kerberos stack */ static bool netlogon_validate_pac(struct torture_context *tctx, struct dcerpc_pipe *p1, @@ -1099,7 +1099,7 @@ static bool test_S4U2Self(struct torture_context *tctx, torture_assert_u32_equal(tctx, netlogon_user_info_dc->sids[i].attrs, s4u2self_session_info->torture->dc_sids[k].attrs, "Different domain group attrs for S4U2Self"); torture_assert(tctx, !dom_sid_in_domain(builtin_domain, &s4u2self_session_info->torture->dc_sids[k].sid), "Returned BUILTIN domain in groups for S4U2Self"); torture_assert(tctx, !dom_sid_in_domain(builtin_domain, &kinit_session_info->torture->dc_sids[j].sid), "Returned BUILTIN domain in groups kinit-based PAC"); - torture_assert(tctx, !dom_sid_in_domain(builtin_domain, &netlogon_user_info_dc->sids[i].sid), "Returned BUILTIN domian in groups from NETLOGON SamLogon reply"); + torture_assert(tctx, !dom_sid_in_domain(builtin_domain, &netlogon_user_info_dc->sids[i].sid), "Returned BUILTIN domain in groups from NETLOGON SamLogon reply"); } return true; diff --git a/source4/torture/rpc/samba3rpc.c b/source4/torture/rpc/samba3rpc.c index 36eabdc488d..10f0fccde73 100644 --- a/source4/torture/rpc/samba3rpc.c +++ b/source4/torture/rpc/samba3rpc.c @@ -282,7 +282,7 @@ bool torture_bind_authcontext(struct torture_context *torture) torture_assert(torture, smbXcli_conn_is_connected(cli->transport->conn), "smb still connected"); torture_assert(torture, !dcerpc_binding_handle_is_connected(lsa_handle), - "dcerpc disonnected"); + "dcerpc disconnected"); if (NT_STATUS_EQUAL(status, NT_STATUS_INVALID_HANDLE)) { torture_comment(torture, "dcerpc_lsa_OpenPolicy2 with wrong vuid gave %s, " diff --git a/source4/torture/rpc/samlogon.c b/source4/torture/rpc/samlogon.c index 00a87baee99..fa07c65eefc 100644 --- a/source4/torture/rpc/samlogon.c +++ b/source4/torture/rpc/samlogon.c @@ -1116,7 +1116,7 @@ static bool test_lmv2_ntlm_break_lm_no_dom(struct samlogon_state *samlogon_state } /* - * Test the NTLM2 response (extra challenge in LM feild) + * Test the NTLM2 response (extra challenge in LM field) * * This test is the same as the 'break LM' test, but checks that the * server implements NTLM2 session security in the right place @@ -1838,7 +1838,7 @@ bool torture_rpc_samlogon(struct torture_context *torture) creds = cli_credentials_get_netlogon_creds(machine_credentials), ret, failed, - "obtaining credentails"); + "obtaining credentials"); { diff --git a/source4/torture/rpc/samr.c b/source4/torture/rpc/samr.c index a303c87fd77..22e0606de96 100644 --- a/source4/torture/rpc/samr.c +++ b/source4/torture/rpc/samr.c @@ -2975,7 +2975,7 @@ bool test_ChangePasswordUser3(struct dcerpc_pipe *p, struct torture_context *tct } } - /* We tested the order of precendence which is as follows: + /* We tested the order of precedence which is as follows: * pwd min_age * pwd length @@ -5742,7 +5742,7 @@ static bool test_user_ops(struct dcerpc_pipe *p, ret = false; } - /* Try a compleatly random password */ + /* Try a completely random password */ if (!test_ChangePasswordRandomBytes(p, tctx, base_acct_name, user_handle, &password)) { ret = false; } diff --git a/source4/torture/rpc/samr_accessmask.c b/source4/torture/rpc/samr_accessmask.c index 0d4c69b9b7f..07b8d44f6c2 100644 --- a/source4/torture/rpc/samr_accessmask.c +++ b/source4/torture/rpc/samr_accessmask.c @@ -326,12 +326,12 @@ static bool test_samr_connect_user_acl(struct torture_context *tctx, printf("Connect5 failed - %s\n", nt_errstr(status)); return false; } - /* disconnec the user */ + /* disconnect the user */ talloc_free(test_p); /* read the sequrity descriptor back. it should not have changed - * eventhough samr_SetSecurity returned SUCCESS + * even though samr_SetSecurity returned SUCCESS */ torture_assert_ntstatus_ok(tctx, dcerpc_samr_QuerySecurity_r(b, tctx, &qs), "QuerySecurity failed"); @@ -359,7 +359,7 @@ static bool test_samr_connect_user_acl(struct torture_context *tctx, /* * test if the ACLs are enforced for users. - * a normal testuser only gets the rights provided in hte ACL for + * a normal testuser only gets the rights provided in the ACL for * Everyone which does not include the SAMR_ACCESS_SHUTDOWN_SERVER * right. If the ACLs are checked when a user connects * a testuser that requests the accessmask with only this bit set @@ -398,7 +398,7 @@ static bool test_samr_connect_user_acl_enforced(struct torture_context *tctx, } printf(" OK\n"); - /* disconnec the user */ + /* disconnect the user */ talloc_free(test_p); return ret; diff --git a/source4/torture/rpc/schannel.c b/source4/torture/rpc/schannel.c index ed94c912251..d6dca366670 100644 --- a/source4/torture/rpc/schannel.c +++ b/source4/torture/rpc/schannel.c @@ -215,14 +215,14 @@ bool test_netlogon_ex_ops(struct dcerpc_pipe *p, struct torture_context *tctx, netlogon_creds_arcfour_crypt(creds, base->LMSessKey.key, 8); } - DEBUG(1,("decryped keys validation_level %d\n", + DEBUG(1,("decrypted keys validation_level %d\n", validation_levels[i])); dump_data(1, base->key.key, 16); dump_data(1, base->LMSessKey.key, 8); if (!can_do_validation_6) { - /* we cant compare against unencrypted keys */ + /* we can't compare against unencrypted keys */ continue; } @@ -420,14 +420,14 @@ static bool test_netlogon_ex_bug14932(struct dcerpc_pipe *p, netlogon_creds_arcfour_crypt(creds, base->LMSessKey.key, 8); } - DEBUG(1,("decryped keys validation_level %d\n", + DEBUG(1,("decrypted keys validation_level %d\n", validation_levels[i])); dump_data(1, base->key.key, 16); dump_data(1, base->LMSessKey.key, 8); if (!can_do_validation_6) { - /* we cant compare against unencrypted keys */ + /* we can't compare against unencrypted keys */ continue; } diff --git a/source4/torture/rpc/testjoin.c b/source4/torture/rpc/testjoin.c index 0a3c96f55ea..6fb5f8627a1 100644 --- a/source4/torture/rpc/testjoin.c +++ b/source4/torture/rpc/testjoin.c @@ -637,7 +637,7 @@ _PUBLIC_ struct test_join *torture_join_domain(struct torture_context *tctx, cli_credentials_set_secure_channel_type(*machine_credentials, SEC_CHAN_WKSTA); } else { - DEBUG(0, ("Invalid account type specificed to torture_join_domain\n")); + DEBUG(0, ("Invalid account type specified to torture_join_domain\n")); talloc_free(*machine_credentials); return NULL; }