diff --git a/source4/libnet/libnet_passwd.c b/source4/libnet/libnet_passwd.c index ae41752b3d6..8546ef9f1f2 100644 --- a/source4/libnet/libnet_passwd.c +++ b/source4/libnet/libnet_passwd.c @@ -876,7 +876,7 @@ static NTSTATUS libnet_SetPassword_samr_handle(struct libnet_context *ctx, TALLO /* * set a password with DCERPC/SAMR calls * 1. connect to the SAMR pipe of users domain PDC (maybe a standalone server or workstation) - * is it correct to contact the the pdc of the domain of the user who's password should be set? + * is it correct to contact the pdc of the domain of the user who's password should be set? * 2. do a samr_Connect to get a policy handle * 3. do a samr_LookupDomain to get the domain sid * 4. do a samr_OpenDomain to get a domain handle diff --git a/source4/rpc_server/drsuapi/getncchanges.c b/source4/rpc_server/drsuapi/getncchanges.c index a73efe93eb9..a9088e55414 100644 --- a/source4/rpc_server/drsuapi/getncchanges.c +++ b/source4/rpc_server/drsuapi/getncchanges.c @@ -2597,7 +2597,7 @@ static WERROR getncchanges_chunk_add_la_targets(struct getncchanges_repl_chunk * * This could happen for a one-way linked attribute, if the * target is deleted and then later expunged (thus, the source * object can be left with a hanging link). Continue to send - * the the link (the client-side has already tried once with + * the link (the client-side has already tried once with * GET_TGT, so it should just end up ignoring it). */ if (ret == LDB_ERR_NO_SUCH_OBJECT) { diff --git a/source4/torture/drs/python/repl_rodc.py b/source4/torture/drs/python/repl_rodc.py index ab3d6fa1928..fe493f37398 100644 --- a/source4/torture/drs/python/repl_rodc.py +++ b/source4/torture/drs/python/repl_rodc.py @@ -280,7 +280,7 @@ class DrsRodcTestCase(drs_base.DrsBaseTestCase): (level, ctr) = self.rodc_drs.DsGetNCChanges(self.rodc_drs_handle, 8, req8) # Get the next replication chunk, but set REPL_SECRET this time. This - # is following on the the previous accepted request, but we've changed + # is following on the previous accepted request, but we've changed # exop to now request secrets. This request should fail try: req8 = self._exop_req8(dest_dsa=str(self.rodc_ctx.ntds_guid), diff --git a/testprogs/win32/prepare_dcpromo/prepare_dcpromo.c b/testprogs/win32/prepare_dcpromo/prepare_dcpromo.c index 91b819b54e6..0103cd5d848 100755 --- a/testprogs/win32/prepare_dcpromo/prepare_dcpromo.c +++ b/testprogs/win32/prepare_dcpromo/prepare_dcpromo.c @@ -115,7 +115,7 @@ static DWORD StringToSid(const char *str, sid->IdentifierAuthority.Value[1] = 0; sid->IdentifierAuthority.Value[0] = 0; - /* now read the the subauthorities */ + /* now read the subauthorities */ p = q +1; sid->SubAuthorityCount = 0;