mirror of
https://github.com/samba-team/samba.git
synced 2025-01-21 18:04:06 +03:00
Fix spelling mistakes
Signed-off-by: Olly Betts <olly@survex.com> Reviewed-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz> Reviewed-by: Andrew Bartlett <abartlet@samba.org>
This commit is contained in:
parent
669249ae93
commit
28aeb86a9f
@ -293,13 +293,13 @@ int main(int argc, const char **argv)
|
||||
|
||||
ret = event_config_init(e_state, &e_state->config);
|
||||
if (ret != 0) {
|
||||
D_ERR("Failed to initalize event config\n");
|
||||
D_ERR("Failed to initialize event config\n");
|
||||
goto fail;
|
||||
}
|
||||
|
||||
e_state->ev = tevent_context_init(e_state->mem_ctx);
|
||||
if (e_state->ev == NULL) {
|
||||
D_ERR("Failed to initalize tevent\n");
|
||||
D_ERR("Failed to initialize tevent\n");
|
||||
ret = 1;
|
||||
goto fail;
|
||||
}
|
||||
|
@ -35,7 +35,7 @@ struct dns_buffer *dns_create_buffer(TALLOC_CTX *mem_ctx)
|
||||
result->error = ERROR_DNS_SUCCESS;
|
||||
|
||||
/*
|
||||
* Small inital size to excercise the realloc code
|
||||
* Small initial size to exercise the realloc code
|
||||
*/
|
||||
result->size = 2;
|
||||
|
||||
|
@ -171,7 +171,7 @@ static int do_tests(const char *name, int tdb_flags)
|
||||
* mutex patches, the freelist was already blocked here by the
|
||||
* allrecord child, which was waiting for the chainlock child to give
|
||||
* up its chainlock. Make sure that we don't run into this
|
||||
* deadlock. To excercise the deadlock, just comment out the "ok"
|
||||
* deadlock. To exercise the deadlock, just comment out the "ok"
|
||||
* line.
|
||||
*
|
||||
* The freelist lock/mutex is independent from the allrecord lock/mutex.
|
||||
|
@ -1719,7 +1719,7 @@ static bool test_multi_tevent_threaded_2(struct torture_context *test,
|
||||
/*
|
||||
* tevent_re_initialise used to have a bug where it did not
|
||||
* re-initialise the thread support after taking it
|
||||
* down. Excercise that code path.
|
||||
* down. Exercise that code path.
|
||||
*/
|
||||
ret = tevent_re_initialise(ev);
|
||||
torture_assert(test, ret == 0, "tevent_re_initialise failed");
|
||||
|
@ -51,7 +51,7 @@ typedef NTSTATUS tstream_read_pdu_blob_full_fn_t(void *private_data,
|
||||
*
|
||||
* @param[in] stream The stream to read data from.
|
||||
*
|
||||
* @param[in] inital_read_size The initial byte count that is needed to workout
|
||||
* @param[in] initial_read_size The initial byte count that is needed to workout
|
||||
* the full pdu size.
|
||||
*
|
||||
* @param[in] full_fn The callback function that will report the size
|
||||
@ -69,7 +69,7 @@ typedef NTSTATUS tstream_read_pdu_blob_full_fn_t(void *private_data,
|
||||
struct tevent_req *tstream_read_pdu_blob_send(TALLOC_CTX *mem_ctx,
|
||||
struct tevent_context *ev,
|
||||
struct tstream_context *stream,
|
||||
size_t inital_read_size,
|
||||
size_t initial_read_size,
|
||||
tstream_read_pdu_blob_full_fn_t *full_fn,
|
||||
void *full_private);
|
||||
/**
|
||||
|
@ -2163,7 +2163,7 @@ newSuperior: %s""" % (str(from_dn), str(to_rdn), str(to_base)))
|
||||
# (objectClass).
|
||||
if list_attid_from_md[0] != 0:
|
||||
error_count += 1
|
||||
self.report("ERROR: Not fixing incorrect inital attributeID in '%s' on '%s', it should be objectClass" %
|
||||
self.report("ERROR: Not fixing incorrect initial attributeID in '%s' on '%s', it should be objectClass" %
|
||||
(attrname, str(dn)))
|
||||
|
||||
got_repl_property_meta_data = True
|
||||
|
@ -333,7 +333,7 @@ static ssize_t shadow_copy2_posix_gmt_string(struct vfs_handle_struct *handle,
|
||||
* snapshot at the given timestamp of the input path.
|
||||
*
|
||||
* In the case of a parallel snapdir (specified with an
|
||||
* absolute path), this is the inital portion of the
|
||||
* absolute path), this is the initial portion of the
|
||||
* local path of any snapshot file. The complete path is
|
||||
* obtained by appending the portion of the file's path
|
||||
* below the share root's mountpoint.
|
||||
|
@ -237,7 +237,7 @@ const struct dom_sid *pdb_get_group_sid(struct samu *sampass)
|
||||
}
|
||||
|
||||
/**
|
||||
* Get flags showing what is initalised in the struct samu
|
||||
* Get flags showing what is initialised in the struct samu
|
||||
* @param sampass the struct samu in question
|
||||
* @return the flags indicating the members initialised in the struct.
|
||||
**/
|
||||
@ -419,7 +419,7 @@ bool pdb_set_logon_divs(struct samu *sampass, uint16_t hours, enum pdb_value_sta
|
||||
}
|
||||
|
||||
/**
|
||||
* Set flags showing what is initalised in the struct samu
|
||||
* Set flags showing what is initialised in the struct samu
|
||||
* @param sampass the struct samu in question
|
||||
* @param flag The *new* flag to be set. Old flags preserved
|
||||
* this flag is only added.
|
||||
|
@ -3542,7 +3542,7 @@ static PyObject *py_pdb_new(PyTypeObject *type, PyObject *args, PyObject *kwargs
|
||||
return NULL;
|
||||
}
|
||||
|
||||
/* Initalize list of methods */
|
||||
/* Initialize list of methods */
|
||||
status = make_pdb_method_name(&methods, url);
|
||||
if (!NT_STATUS_IS_OK(status)) {
|
||||
PyErr_Format(py_pdb_error, "Cannot load backend methods for '%s' backend (%d,%s)",
|
||||
@ -3727,7 +3727,7 @@ static PyMethodDef py_passdb_methods[] = {
|
||||
Return domain SID from secrets database." },
|
||||
{ "reload_static_pdb", py_reload_static_pdb, METH_NOARGS,
|
||||
"reload_static_pdb() -> None\n\n \
|
||||
Re-initalise the static pdb used internally. Needed if 'passdb backend' is changed." },
|
||||
Re-initialise the static pdb used internally. Needed if 'passdb backend' is changed." },
|
||||
{ NULL },
|
||||
};
|
||||
|
||||
|
@ -3756,7 +3756,7 @@ static NTSTATUS open_file_ntcreate(connection_struct *conn,
|
||||
return status;
|
||||
}
|
||||
}
|
||||
/* Note that here we set the *inital* delete on close flag,
|
||||
/* Note that here we set the *initial* delete on close flag,
|
||||
not the regular one. The magic gets handled in close. */
|
||||
fsp->initial_delete_on_close = True;
|
||||
}
|
||||
@ -4292,7 +4292,7 @@ static NTSTATUS open_directory(connection_struct *conn,
|
||||
}
|
||||
|
||||
if (NT_STATUS_IS_OK(status)) {
|
||||
/* Note that here we set the *inital* delete on close flag,
|
||||
/* Note that here we set the *initial* delete on close flag,
|
||||
not the regular one. The magic gets handled in close. */
|
||||
fsp->initial_delete_on_close = True;
|
||||
}
|
||||
|
@ -6930,7 +6930,7 @@ NTSTATUS rename_internals_fsp(connection_struct *conn,
|
||||
status = can_set_delete_on_close(fsp, 0);
|
||||
|
||||
if (NT_STATUS_IS_OK(status)) {
|
||||
/* Note that here we set the *inital* delete on close flag,
|
||||
/* Note that here we set the *initial* delete on close flag,
|
||||
* not the regular one. The magic gets handled in close. */
|
||||
fsp->initial_delete_on_close = True;
|
||||
}
|
||||
|
@ -58,8 +58,8 @@ static NTSTATUS sync_files(struct copy_clistate *cp_clistate, const char *mask);
|
||||
* @brief RPC based subcommands for the 'net' utility.
|
||||
*
|
||||
* This file should contain much of the functionality that used to
|
||||
* be found in rpcclient, execpt that the commands should change
|
||||
* less often, and the fucntionality should be sane (the user is not
|
||||
* be found in rpcclient, except that the commands should change
|
||||
* less often, and the functionality should be sane (the user is not
|
||||
* expected to know a rid/sid before they conduct an operation etc.)
|
||||
*
|
||||
* @todo Perhaps eventually these should be split out into a number
|
||||
@ -256,7 +256,7 @@ fail:
|
||||
}
|
||||
|
||||
/**
|
||||
* Force a change of the trust acccount password.
|
||||
* Force a change of the trust account password.
|
||||
*
|
||||
* All parameters are provided by the run_rpc_command function, except for
|
||||
* argc, argv which are passed through.
|
||||
@ -305,7 +305,7 @@ static NTSTATUS rpc_changetrustpw_internals(struct net_context *c,
|
||||
}
|
||||
|
||||
/**
|
||||
* Force a change of the trust acccount password.
|
||||
* Force a change of the trust account password.
|
||||
*
|
||||
* @param argc Standard main() style argc.
|
||||
* @param argv Standard main() style argv. Initial components are already
|
||||
@ -336,7 +336,7 @@ int net_rpc_changetrustpw(struct net_context *c, int argc, const char **argv)
|
||||
* the message to be displayed when oldjoin was explicitly
|
||||
* requested, but not when it was implied by "net rpc join".
|
||||
*
|
||||
* This uses 'machinename' as the inital password, and changes it.
|
||||
* This uses 'machinename' as the initial password, and changes it.
|
||||
*
|
||||
* The password should be created with 'server manager' or equiv first.
|
||||
*
|
||||
@ -375,7 +375,7 @@ static int net_rpc_oldjoin(struct net_context *c, int argc, const char **argv)
|
||||
}
|
||||
|
||||
/*
|
||||
check what type of join - if the user want's to join as
|
||||
check what type of join - if the user wants to join as
|
||||
a BDC, the server must agree that we are a BDC.
|
||||
*/
|
||||
if (argc >= 0) {
|
||||
@ -568,7 +568,7 @@ static int net_rpc_join_newstyle(struct net_context *c, int argc, const char **a
|
||||
}
|
||||
|
||||
/*
|
||||
check what type of join - if the user want's to join as
|
||||
check what type of join - if the user wants to join as
|
||||
a BDC, the server must agree that we are a BDC.
|
||||
*/
|
||||
if (argc >= 0) {
|
||||
|
@ -104,8 +104,8 @@ static NTSTATUS do_ntlm_auth_with_stored_pw(const char *namespace,
|
||||
}
|
||||
|
||||
/*
|
||||
* We inject the inital NEGOTIATE message our caller used
|
||||
* in order to get the state machine into the correct possition.
|
||||
* We inject the initial NEGOTIATE message our caller used
|
||||
* in order to get the state machine into the correct position.
|
||||
*/
|
||||
reply = data_blob_null;
|
||||
status = gensec_update(auth_generic_state->gensec_security,
|
||||
|
@ -1437,7 +1437,7 @@ main() {
|
||||
headers='rpcsvc/rquota.h',
|
||||
lib='tirpc')
|
||||
|
||||
# Required fucntion for NFS quote support
|
||||
# Required function for NFS quote support
|
||||
conf.CHECK_CODE('''
|
||||
clnt_create("", RQUOTAPROG, RQUOTAVERS, "udp");
|
||||
''',
|
||||
|
@ -185,7 +185,7 @@ done:
|
||||
}
|
||||
|
||||
/*
|
||||
* Check this after the modules have be initalised so we
|
||||
* Check this after the modules have be initialised so we
|
||||
* can actually read the backend DB.
|
||||
*/
|
||||
data->userPassword_support
|
||||
|
@ -602,7 +602,7 @@ NTSTATUS libnet_DomainOpenLsa_recv(struct composite_context *c, struct libnet_co
|
||||
/**
|
||||
* Sends a request to open a domain in desired service
|
||||
*
|
||||
* @param ctx initalised libnet context
|
||||
* @param ctx initialised libnet context
|
||||
* @param io arguments and results of the call
|
||||
* @param monitor pointer to monitor function that is passed monitor message
|
||||
*/
|
||||
@ -1188,7 +1188,7 @@ static struct domainlist* get_domain_list(TALLOC_CTX *mem_ctx, struct domain_lis
|
||||
/**
|
||||
* Sends a request to list domains on given host
|
||||
*
|
||||
* @param ctx initalised libnet context
|
||||
* @param ctx initialised libnet context
|
||||
* @param mem_ctx memory context
|
||||
* @param io arguments and results of the call
|
||||
* @param monitor pointer to monitor function that is passed monitor messages
|
||||
|
@ -1523,7 +1523,7 @@ static bool torture_chkpath_test(struct torture_context *tctx,
|
||||
}
|
||||
|
||||
/*
|
||||
* This is a test to excercise some weird Samba3 error paths.
|
||||
* This is a test to exercise some weird Samba3 error paths.
|
||||
*/
|
||||
|
||||
static bool torture_samba3_errorpaths(struct torture_context *tctx)
|
||||
|
@ -940,7 +940,7 @@ class DrsReplicaSyncIntegrityTestCase(drs_base.DrsBaseTestCase):
|
||||
# This test is a little different in that we're particularly interested
|
||||
# in exercising the replmd client code on the second DC.
|
||||
# First, make sure the peer DC has the base OU, then connect to it (so
|
||||
# we store its inital HWM)
|
||||
# we store its initial HWM)
|
||||
self.sync_DCs()
|
||||
peer_conn = DcConnection(self, self.ldb_dc1, self.dnsname_dc1)
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user