1
0
mirror of https://github.com/samba-team/samba.git synced 2025-01-03 01:18:10 +03:00

s4:torture:rpc: Fix code spelling

Signed-off-by: Andreas Schneider <asn@samba.org>
Reviewed-by: Andrew Bartlett <abartlet@samba.org>
This commit is contained in:
Andreas Schneider 2023-08-03 15:45:20 +02:00 committed by Andrew Bartlett
parent ff2f813b68
commit 085cfe0c4a
14 changed files with 27 additions and 27 deletions

View File

@ -89,7 +89,7 @@ bool torture_rpc_alter_context(struct torture_context *torture)
NT_STATUS_CONNECTION_RESET);
torture_assert(torture, !dcerpc_binding_handle_is_connected(p->binding_handle),
"dcerpc disonnected");
"dcerpc disconnected");
return ret;
}

View File

@ -54,7 +54,7 @@ enum test_wrong {
/* Our very special and valued secret */
/* No need to put const as we cast the array in uint8_t
* we will get a warning about the discared const
* we will get a warning about the discarded const
*/
static const char secret[] = "tata yoyo mais qu'est ce qu'il y a sous ton grand chapeau ?";
@ -188,7 +188,7 @@ static struct dom_sid *get_user_sid(struct torture_context *tctx,
* the version depends on the version parameter
* the structure is returned as a blob.
* The broken flag is to indicate if we want
* to create a non conform to specification structre
* to create a non conform to specification structure
*/
static DATA_BLOB *create_unencryptedsecret(TALLOC_CTX *mem_ctx,
bool broken,
@ -216,7 +216,7 @@ static DATA_BLOB *create_unencryptedsecret(TALLOC_CTX *mem_ctx,
if (broken) {
/* The magic value is correctly set by the NDR push
* but we want to test the behavior of the server
* if a differrent value is provided
* if a different value is provided
*/
((uint8_t*)blob->data)[4] = 79; /* A great year !!! */
}
@ -241,7 +241,7 @@ static DATA_BLOB *create_unencryptedsecret(TALLOC_CTX *mem_ctx,
/*
* The magic value is correctly set by the NDR push
* but we want to test the behavior of the server
* if a differrent value is provided
* if a different value is provided
*/
((uint8_t*)blob->data)[4] = 79; /* A great year !!! */
}
@ -252,7 +252,7 @@ static DATA_BLOB *create_unencryptedsecret(TALLOC_CTX *mem_ctx,
/*
* Create an access check structure, the format depends on the version parameter.
* If broken is specified then we create a stucture that isn't conform to the
* If broken is specified then we create a structure that isn't conform to the
* specification.
*
* If the structure can't be created then NULL is returned.

View File

@ -690,7 +690,7 @@ bool test_QuerySitesByCost(struct torture_context *tctx,
"dcerpc_drsuapi_QuerySitesByCost");
torture_assert_int_equal(tctx,
r.out.ctr->ctr1.info[1].site_cost, -1,
"dcerpc_drsuapi_QuerySitesByCost exptected site cost");
"dcerpc_drsuapi_QuerySitesByCost expected site cost");
}
return true;

View File

@ -672,7 +672,7 @@ static bool test_CopyDriverFiles(struct torture_context *tctx,
status = smbcli_mkdir(ctx->dinfo->cli->tree, ctx->dinfo->print_upload_guid_dir);
torture_assert_ntstatus_ok_goto(tctx, status, ok, done, "Failed to create upload directory");
/* Walk the provided torture option driver_path file tree, creating the directory heirarchy and
/* Walk the provided torture option driver_path file tree, creating the directory hierarchy and
* copying all files to print$/{GUID}/ share */
ret = tftw(tctx, ctx->dinfo->local_driver_path, copy_driver_files, TFTW_MAX_DEPTH, ctx->dinfo);
torture_assert_int_equal_goto(tctx, ret, 0, ok, done, "Failed to copy driver files to print$/{GUID}/ dir");

View File

@ -3636,7 +3636,7 @@ static bool check_pw_with_krb5(struct torture_context *tctx,
torture_assert_int_not_equal(tctx, t_kvno, 0, assertion_message);
} else {
assertion_message = talloc_asprintf(ctx,
"krbtgt_referral_ticket(%s) kvno(NULL) exptected(%u) current(%u)",
"krbtgt_referral_ticket(%s) kvno(NULL) expected(%u) current(%u)",
krbtgt_trust_realm_string,
(unsigned)expected_kvno,(unsigned)kvno);
torture_comment(tctx, "%s\n", assertion_message);

View File

@ -1,6 +1,6 @@
/*
Unix SMB/CIFS implementation.
test suite for the mdssvc RPC serice
test suite for the mdssvc RPC service
Copyright (C) Ralph Boehme 2019

View File

@ -2292,7 +2292,7 @@ static bool test_ServerReqChallengeGlobal(struct torture_context *tctx,
/*
* Test the re-use of the challenge is not possible on a third
* connection, after first useing it second one.
* connection, after first using it second one.
*/
static bool test_ServerReqChallengeReuseGlobal(struct torture_context *tctx,

View File

@ -147,7 +147,7 @@ static const struct PAC_BUFFER *get_pac_buffer(const struct PAC_DATA *pac_data,
return pac_buf;
}
/* Also happens to be a really good one-step verfication of our Kerberos stack */
/* Also happens to be a really good one-step verification of our Kerberos stack */
static bool netlogon_validate_pac(struct torture_context *tctx,
struct dcerpc_pipe *p1,
@ -1099,7 +1099,7 @@ static bool test_S4U2Self(struct torture_context *tctx,
torture_assert_u32_equal(tctx, netlogon_user_info_dc->sids[i].attrs, s4u2self_session_info->torture->dc_sids[k].attrs, "Different domain group attrs for S4U2Self");
torture_assert(tctx, !dom_sid_in_domain(builtin_domain, &s4u2self_session_info->torture->dc_sids[k].sid), "Returned BUILTIN domain in groups for S4U2Self");
torture_assert(tctx, !dom_sid_in_domain(builtin_domain, &kinit_session_info->torture->dc_sids[j].sid), "Returned BUILTIN domain in groups kinit-based PAC");
torture_assert(tctx, !dom_sid_in_domain(builtin_domain, &netlogon_user_info_dc->sids[i].sid), "Returned BUILTIN domian in groups from NETLOGON SamLogon reply");
torture_assert(tctx, !dom_sid_in_domain(builtin_domain, &netlogon_user_info_dc->sids[i].sid), "Returned BUILTIN domain in groups from NETLOGON SamLogon reply");
}
return true;

View File

@ -282,7 +282,7 @@ bool torture_bind_authcontext(struct torture_context *torture)
torture_assert(torture, smbXcli_conn_is_connected(cli->transport->conn),
"smb still connected");
torture_assert(torture, !dcerpc_binding_handle_is_connected(lsa_handle),
"dcerpc disonnected");
"dcerpc disconnected");
if (NT_STATUS_EQUAL(status, NT_STATUS_INVALID_HANDLE)) {
torture_comment(torture, "dcerpc_lsa_OpenPolicy2 with wrong vuid gave %s, "

View File

@ -1116,7 +1116,7 @@ static bool test_lmv2_ntlm_break_lm_no_dom(struct samlogon_state *samlogon_state
}
/*
* Test the NTLM2 response (extra challenge in LM feild)
* Test the NTLM2 response (extra challenge in LM field)
*
* This test is the same as the 'break LM' test, but checks that the
* server implements NTLM2 session security in the right place
@ -1838,7 +1838,7 @@ bool torture_rpc_samlogon(struct torture_context *torture)
creds = cli_credentials_get_netlogon_creds(machine_credentials),
ret,
failed,
"obtaining credentails");
"obtaining credentials");
{

View File

@ -2975,7 +2975,7 @@ bool test_ChangePasswordUser3(struct dcerpc_pipe *p, struct torture_context *tct
}
}
/* We tested the order of precendence which is as follows:
/* We tested the order of precedence which is as follows:
* pwd min_age
* pwd length
@ -5742,7 +5742,7 @@ static bool test_user_ops(struct dcerpc_pipe *p,
ret = false;
}
/* Try a compleatly random password */
/* Try a completely random password */
if (!test_ChangePasswordRandomBytes(p, tctx, base_acct_name, user_handle, &password)) {
ret = false;
}

View File

@ -326,12 +326,12 @@ static bool test_samr_connect_user_acl(struct torture_context *tctx,
printf("Connect5 failed - %s\n", nt_errstr(status));
return false;
}
/* disconnec the user */
/* disconnect the user */
talloc_free(test_p);
/* read the sequrity descriptor back. it should not have changed
* eventhough samr_SetSecurity returned SUCCESS
* even though samr_SetSecurity returned SUCCESS
*/
torture_assert_ntstatus_ok(tctx, dcerpc_samr_QuerySecurity_r(b, tctx, &qs),
"QuerySecurity failed");
@ -359,7 +359,7 @@ static bool test_samr_connect_user_acl(struct torture_context *tctx,
/*
* test if the ACLs are enforced for users.
* a normal testuser only gets the rights provided in hte ACL for
* a normal testuser only gets the rights provided in the ACL for
* Everyone which does not include the SAMR_ACCESS_SHUTDOWN_SERVER
* right. If the ACLs are checked when a user connects
* a testuser that requests the accessmask with only this bit set
@ -398,7 +398,7 @@ static bool test_samr_connect_user_acl_enforced(struct torture_context *tctx,
}
printf(" OK\n");
/* disconnec the user */
/* disconnect the user */
talloc_free(test_p);
return ret;

View File

@ -215,14 +215,14 @@ bool test_netlogon_ex_ops(struct dcerpc_pipe *p, struct torture_context *tctx,
netlogon_creds_arcfour_crypt(creds, base->LMSessKey.key, 8);
}
DEBUG(1,("decryped keys validation_level %d\n",
DEBUG(1,("decrypted keys validation_level %d\n",
validation_levels[i]));
dump_data(1, base->key.key, 16);
dump_data(1, base->LMSessKey.key, 8);
if (!can_do_validation_6) {
/* we cant compare against unencrypted keys */
/* we can't compare against unencrypted keys */
continue;
}
@ -420,14 +420,14 @@ static bool test_netlogon_ex_bug14932(struct dcerpc_pipe *p,
netlogon_creds_arcfour_crypt(creds, base->LMSessKey.key, 8);
}
DEBUG(1,("decryped keys validation_level %d\n",
DEBUG(1,("decrypted keys validation_level %d\n",
validation_levels[i]));
dump_data(1, base->key.key, 16);
dump_data(1, base->LMSessKey.key, 8);
if (!can_do_validation_6) {
/* we cant compare against unencrypted keys */
/* we can't compare against unencrypted keys */
continue;
}

View File

@ -637,7 +637,7 @@ _PUBLIC_ struct test_join *torture_join_domain(struct torture_context *tctx,
cli_credentials_set_secure_channel_type(*machine_credentials,
SEC_CHAN_WKSTA);
} else {
DEBUG(0, ("Invalid account type specificed to torture_join_domain\n"));
DEBUG(0, ("Invalid account type specified to torture_join_domain\n"));
talloc_free(*machine_credentials);
return NULL;
}