mirror of
https://github.com/samba-team/samba.git
synced 2025-01-03 01:18:10 +03:00
s4:torture:rpc: Fix code spelling
Signed-off-by: Andreas Schneider <asn@samba.org> Reviewed-by: Andrew Bartlett <abartlet@samba.org>
This commit is contained in:
parent
ff2f813b68
commit
085cfe0c4a
@ -89,7 +89,7 @@ bool torture_rpc_alter_context(struct torture_context *torture)
|
||||
NT_STATUS_CONNECTION_RESET);
|
||||
|
||||
torture_assert(torture, !dcerpc_binding_handle_is_connected(p->binding_handle),
|
||||
"dcerpc disonnected");
|
||||
"dcerpc disconnected");
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
@ -54,7 +54,7 @@ enum test_wrong {
|
||||
|
||||
/* Our very special and valued secret */
|
||||
/* No need to put const as we cast the array in uint8_t
|
||||
* we will get a warning about the discared const
|
||||
* we will get a warning about the discarded const
|
||||
*/
|
||||
static const char secret[] = "tata yoyo mais qu'est ce qu'il y a sous ton grand chapeau ?";
|
||||
|
||||
@ -188,7 +188,7 @@ static struct dom_sid *get_user_sid(struct torture_context *tctx,
|
||||
* the version depends on the version parameter
|
||||
* the structure is returned as a blob.
|
||||
* The broken flag is to indicate if we want
|
||||
* to create a non conform to specification structre
|
||||
* to create a non conform to specification structure
|
||||
*/
|
||||
static DATA_BLOB *create_unencryptedsecret(TALLOC_CTX *mem_ctx,
|
||||
bool broken,
|
||||
@ -216,7 +216,7 @@ static DATA_BLOB *create_unencryptedsecret(TALLOC_CTX *mem_ctx,
|
||||
if (broken) {
|
||||
/* The magic value is correctly set by the NDR push
|
||||
* but we want to test the behavior of the server
|
||||
* if a differrent value is provided
|
||||
* if a different value is provided
|
||||
*/
|
||||
((uint8_t*)blob->data)[4] = 79; /* A great year !!! */
|
||||
}
|
||||
@ -241,7 +241,7 @@ static DATA_BLOB *create_unencryptedsecret(TALLOC_CTX *mem_ctx,
|
||||
/*
|
||||
* The magic value is correctly set by the NDR push
|
||||
* but we want to test the behavior of the server
|
||||
* if a differrent value is provided
|
||||
* if a different value is provided
|
||||
*/
|
||||
((uint8_t*)blob->data)[4] = 79; /* A great year !!! */
|
||||
}
|
||||
@ -252,7 +252,7 @@ static DATA_BLOB *create_unencryptedsecret(TALLOC_CTX *mem_ctx,
|
||||
|
||||
/*
|
||||
* Create an access check structure, the format depends on the version parameter.
|
||||
* If broken is specified then we create a stucture that isn't conform to the
|
||||
* If broken is specified then we create a structure that isn't conform to the
|
||||
* specification.
|
||||
*
|
||||
* If the structure can't be created then NULL is returned.
|
||||
|
@ -690,7 +690,7 @@ bool test_QuerySitesByCost(struct torture_context *tctx,
|
||||
"dcerpc_drsuapi_QuerySitesByCost");
|
||||
torture_assert_int_equal(tctx,
|
||||
r.out.ctr->ctr1.info[1].site_cost, -1,
|
||||
"dcerpc_drsuapi_QuerySitesByCost exptected site cost");
|
||||
"dcerpc_drsuapi_QuerySitesByCost expected site cost");
|
||||
}
|
||||
|
||||
return true;
|
||||
|
@ -672,7 +672,7 @@ static bool test_CopyDriverFiles(struct torture_context *tctx,
|
||||
status = smbcli_mkdir(ctx->dinfo->cli->tree, ctx->dinfo->print_upload_guid_dir);
|
||||
torture_assert_ntstatus_ok_goto(tctx, status, ok, done, "Failed to create upload directory");
|
||||
|
||||
/* Walk the provided torture option driver_path file tree, creating the directory heirarchy and
|
||||
/* Walk the provided torture option driver_path file tree, creating the directory hierarchy and
|
||||
* copying all files to print$/{GUID}/ share */
|
||||
ret = tftw(tctx, ctx->dinfo->local_driver_path, copy_driver_files, TFTW_MAX_DEPTH, ctx->dinfo);
|
||||
torture_assert_int_equal_goto(tctx, ret, 0, ok, done, "Failed to copy driver files to print$/{GUID}/ dir");
|
||||
|
@ -3636,7 +3636,7 @@ static bool check_pw_with_krb5(struct torture_context *tctx,
|
||||
torture_assert_int_not_equal(tctx, t_kvno, 0, assertion_message);
|
||||
} else {
|
||||
assertion_message = talloc_asprintf(ctx,
|
||||
"krbtgt_referral_ticket(%s) kvno(NULL) exptected(%u) current(%u)",
|
||||
"krbtgt_referral_ticket(%s) kvno(NULL) expected(%u) current(%u)",
|
||||
krbtgt_trust_realm_string,
|
||||
(unsigned)expected_kvno,(unsigned)kvno);
|
||||
torture_comment(tctx, "%s\n", assertion_message);
|
||||
|
@ -1,6 +1,6 @@
|
||||
/*
|
||||
Unix SMB/CIFS implementation.
|
||||
test suite for the mdssvc RPC serice
|
||||
test suite for the mdssvc RPC service
|
||||
|
||||
Copyright (C) Ralph Boehme 2019
|
||||
|
||||
|
@ -2292,7 +2292,7 @@ static bool test_ServerReqChallengeGlobal(struct torture_context *tctx,
|
||||
|
||||
/*
|
||||
* Test the re-use of the challenge is not possible on a third
|
||||
* connection, after first useing it second one.
|
||||
* connection, after first using it second one.
|
||||
*/
|
||||
|
||||
static bool test_ServerReqChallengeReuseGlobal(struct torture_context *tctx,
|
||||
|
@ -147,7 +147,7 @@ static const struct PAC_BUFFER *get_pac_buffer(const struct PAC_DATA *pac_data,
|
||||
return pac_buf;
|
||||
}
|
||||
|
||||
/* Also happens to be a really good one-step verfication of our Kerberos stack */
|
||||
/* Also happens to be a really good one-step verification of our Kerberos stack */
|
||||
|
||||
static bool netlogon_validate_pac(struct torture_context *tctx,
|
||||
struct dcerpc_pipe *p1,
|
||||
@ -1099,7 +1099,7 @@ static bool test_S4U2Self(struct torture_context *tctx,
|
||||
torture_assert_u32_equal(tctx, netlogon_user_info_dc->sids[i].attrs, s4u2self_session_info->torture->dc_sids[k].attrs, "Different domain group attrs for S4U2Self");
|
||||
torture_assert(tctx, !dom_sid_in_domain(builtin_domain, &s4u2self_session_info->torture->dc_sids[k].sid), "Returned BUILTIN domain in groups for S4U2Self");
|
||||
torture_assert(tctx, !dom_sid_in_domain(builtin_domain, &kinit_session_info->torture->dc_sids[j].sid), "Returned BUILTIN domain in groups kinit-based PAC");
|
||||
torture_assert(tctx, !dom_sid_in_domain(builtin_domain, &netlogon_user_info_dc->sids[i].sid), "Returned BUILTIN domian in groups from NETLOGON SamLogon reply");
|
||||
torture_assert(tctx, !dom_sid_in_domain(builtin_domain, &netlogon_user_info_dc->sids[i].sid), "Returned BUILTIN domain in groups from NETLOGON SamLogon reply");
|
||||
}
|
||||
|
||||
return true;
|
||||
|
@ -282,7 +282,7 @@ bool torture_bind_authcontext(struct torture_context *torture)
|
||||
torture_assert(torture, smbXcli_conn_is_connected(cli->transport->conn),
|
||||
"smb still connected");
|
||||
torture_assert(torture, !dcerpc_binding_handle_is_connected(lsa_handle),
|
||||
"dcerpc disonnected");
|
||||
"dcerpc disconnected");
|
||||
|
||||
if (NT_STATUS_EQUAL(status, NT_STATUS_INVALID_HANDLE)) {
|
||||
torture_comment(torture, "dcerpc_lsa_OpenPolicy2 with wrong vuid gave %s, "
|
||||
|
@ -1116,7 +1116,7 @@ static bool test_lmv2_ntlm_break_lm_no_dom(struct samlogon_state *samlogon_state
|
||||
}
|
||||
|
||||
/*
|
||||
* Test the NTLM2 response (extra challenge in LM feild)
|
||||
* Test the NTLM2 response (extra challenge in LM field)
|
||||
*
|
||||
* This test is the same as the 'break LM' test, but checks that the
|
||||
* server implements NTLM2 session security in the right place
|
||||
@ -1838,7 +1838,7 @@ bool torture_rpc_samlogon(struct torture_context *torture)
|
||||
creds = cli_credentials_get_netlogon_creds(machine_credentials),
|
||||
ret,
|
||||
failed,
|
||||
"obtaining credentails");
|
||||
"obtaining credentials");
|
||||
|
||||
{
|
||||
|
||||
|
@ -2975,7 +2975,7 @@ bool test_ChangePasswordUser3(struct dcerpc_pipe *p, struct torture_context *tct
|
||||
}
|
||||
}
|
||||
|
||||
/* We tested the order of precendence which is as follows:
|
||||
/* We tested the order of precedence which is as follows:
|
||||
|
||||
* pwd min_age
|
||||
* pwd length
|
||||
@ -5742,7 +5742,7 @@ static bool test_user_ops(struct dcerpc_pipe *p,
|
||||
ret = false;
|
||||
}
|
||||
|
||||
/* Try a compleatly random password */
|
||||
/* Try a completely random password */
|
||||
if (!test_ChangePasswordRandomBytes(p, tctx, base_acct_name, user_handle, &password)) {
|
||||
ret = false;
|
||||
}
|
||||
|
@ -326,12 +326,12 @@ static bool test_samr_connect_user_acl(struct torture_context *tctx,
|
||||
printf("Connect5 failed - %s\n", nt_errstr(status));
|
||||
return false;
|
||||
}
|
||||
/* disconnec the user */
|
||||
/* disconnect the user */
|
||||
talloc_free(test_p);
|
||||
|
||||
|
||||
/* read the sequrity descriptor back. it should not have changed
|
||||
* eventhough samr_SetSecurity returned SUCCESS
|
||||
* even though samr_SetSecurity returned SUCCESS
|
||||
*/
|
||||
torture_assert_ntstatus_ok(tctx, dcerpc_samr_QuerySecurity_r(b, tctx, &qs),
|
||||
"QuerySecurity failed");
|
||||
@ -359,7 +359,7 @@ static bool test_samr_connect_user_acl(struct torture_context *tctx,
|
||||
|
||||
/*
|
||||
* test if the ACLs are enforced for users.
|
||||
* a normal testuser only gets the rights provided in hte ACL for
|
||||
* a normal testuser only gets the rights provided in the ACL for
|
||||
* Everyone which does not include the SAMR_ACCESS_SHUTDOWN_SERVER
|
||||
* right. If the ACLs are checked when a user connects
|
||||
* a testuser that requests the accessmask with only this bit set
|
||||
@ -398,7 +398,7 @@ static bool test_samr_connect_user_acl_enforced(struct torture_context *tctx,
|
||||
}
|
||||
printf(" OK\n");
|
||||
|
||||
/* disconnec the user */
|
||||
/* disconnect the user */
|
||||
talloc_free(test_p);
|
||||
|
||||
return ret;
|
||||
|
@ -215,14 +215,14 @@ bool test_netlogon_ex_ops(struct dcerpc_pipe *p, struct torture_context *tctx,
|
||||
netlogon_creds_arcfour_crypt(creds, base->LMSessKey.key, 8);
|
||||
}
|
||||
|
||||
DEBUG(1,("decryped keys validation_level %d\n",
|
||||
DEBUG(1,("decrypted keys validation_level %d\n",
|
||||
validation_levels[i]));
|
||||
|
||||
dump_data(1, base->key.key, 16);
|
||||
dump_data(1, base->LMSessKey.key, 8);
|
||||
|
||||
if (!can_do_validation_6) {
|
||||
/* we cant compare against unencrypted keys */
|
||||
/* we can't compare against unencrypted keys */
|
||||
continue;
|
||||
}
|
||||
|
||||
@ -420,14 +420,14 @@ static bool test_netlogon_ex_bug14932(struct dcerpc_pipe *p,
|
||||
netlogon_creds_arcfour_crypt(creds, base->LMSessKey.key, 8);
|
||||
}
|
||||
|
||||
DEBUG(1,("decryped keys validation_level %d\n",
|
||||
DEBUG(1,("decrypted keys validation_level %d\n",
|
||||
validation_levels[i]));
|
||||
|
||||
dump_data(1, base->key.key, 16);
|
||||
dump_data(1, base->LMSessKey.key, 8);
|
||||
|
||||
if (!can_do_validation_6) {
|
||||
/* we cant compare against unencrypted keys */
|
||||
/* we can't compare against unencrypted keys */
|
||||
continue;
|
||||
}
|
||||
|
||||
|
@ -637,7 +637,7 @@ _PUBLIC_ struct test_join *torture_join_domain(struct torture_context *tctx,
|
||||
cli_credentials_set_secure_channel_type(*machine_credentials,
|
||||
SEC_CHAN_WKSTA);
|
||||
} else {
|
||||
DEBUG(0, ("Invalid account type specificed to torture_join_domain\n"));
|
||||
DEBUG(0, ("Invalid account type specified to torture_join_domain\n"));
|
||||
talloc_free(*machine_credentials);
|
||||
return NULL;
|
||||
}
|
||||
|
Loading…
Reference in New Issue
Block a user