1
0
mirror of https://github.com/samba-team/samba.git synced 2025-01-21 18:04:06 +03:00

Fix spelling mistakes

Signed-off-by: Olly Betts <olly@survex.com>
Reviewed-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
Reviewed-by: Andrew Bartlett <abartlet@samba.org>
This commit is contained in:
Olly Betts 2018-11-28 11:10:17 +13:00 committed by Douglas Bagnall
parent 669249ae93
commit 28aeb86a9f
18 changed files with 31 additions and 31 deletions

View File

@ -293,13 +293,13 @@ int main(int argc, const char **argv)
ret = event_config_init(e_state, &e_state->config);
if (ret != 0) {
D_ERR("Failed to initalize event config\n");
D_ERR("Failed to initialize event config\n");
goto fail;
}
e_state->ev = tevent_context_init(e_state->mem_ctx);
if (e_state->ev == NULL) {
D_ERR("Failed to initalize tevent\n");
D_ERR("Failed to initialize tevent\n");
ret = 1;
goto fail;
}

View File

@ -35,7 +35,7 @@ struct dns_buffer *dns_create_buffer(TALLOC_CTX *mem_ctx)
result->error = ERROR_DNS_SUCCESS;
/*
* Small inital size to excercise the realloc code
* Small initial size to exercise the realloc code
*/
result->size = 2;

View File

@ -171,7 +171,7 @@ static int do_tests(const char *name, int tdb_flags)
* mutex patches, the freelist was already blocked here by the
* allrecord child, which was waiting for the chainlock child to give
* up its chainlock. Make sure that we don't run into this
* deadlock. To excercise the deadlock, just comment out the "ok"
* deadlock. To exercise the deadlock, just comment out the "ok"
* line.
*
* The freelist lock/mutex is independent from the allrecord lock/mutex.

View File

@ -1719,7 +1719,7 @@ static bool test_multi_tevent_threaded_2(struct torture_context *test,
/*
* tevent_re_initialise used to have a bug where it did not
* re-initialise the thread support after taking it
* down. Excercise that code path.
* down. Exercise that code path.
*/
ret = tevent_re_initialise(ev);
torture_assert(test, ret == 0, "tevent_re_initialise failed");

View File

@ -51,7 +51,7 @@ typedef NTSTATUS tstream_read_pdu_blob_full_fn_t(void *private_data,
*
* @param[in] stream The stream to read data from.
*
* @param[in] inital_read_size The initial byte count that is needed to workout
* @param[in] initial_read_size The initial byte count that is needed to workout
* the full pdu size.
*
* @param[in] full_fn The callback function that will report the size
@ -69,7 +69,7 @@ typedef NTSTATUS tstream_read_pdu_blob_full_fn_t(void *private_data,
struct tevent_req *tstream_read_pdu_blob_send(TALLOC_CTX *mem_ctx,
struct tevent_context *ev,
struct tstream_context *stream,
size_t inital_read_size,
size_t initial_read_size,
tstream_read_pdu_blob_full_fn_t *full_fn,
void *full_private);
/**

View File

@ -2163,7 +2163,7 @@ newSuperior: %s""" % (str(from_dn), str(to_rdn), str(to_base)))
# (objectClass).
if list_attid_from_md[0] != 0:
error_count += 1
self.report("ERROR: Not fixing incorrect inital attributeID in '%s' on '%s', it should be objectClass" %
self.report("ERROR: Not fixing incorrect initial attributeID in '%s' on '%s', it should be objectClass" %
(attrname, str(dn)))
got_repl_property_meta_data = True

View File

@ -333,7 +333,7 @@ static ssize_t shadow_copy2_posix_gmt_string(struct vfs_handle_struct *handle,
* snapshot at the given timestamp of the input path.
*
* In the case of a parallel snapdir (specified with an
* absolute path), this is the inital portion of the
* absolute path), this is the initial portion of the
* local path of any snapshot file. The complete path is
* obtained by appending the portion of the file's path
* below the share root's mountpoint.

View File

@ -237,7 +237,7 @@ const struct dom_sid *pdb_get_group_sid(struct samu *sampass)
}
/**
* Get flags showing what is initalised in the struct samu
* Get flags showing what is initialised in the struct samu
* @param sampass the struct samu in question
* @return the flags indicating the members initialised in the struct.
**/
@ -419,7 +419,7 @@ bool pdb_set_logon_divs(struct samu *sampass, uint16_t hours, enum pdb_value_sta
}
/**
* Set flags showing what is initalised in the struct samu
* Set flags showing what is initialised in the struct samu
* @param sampass the struct samu in question
* @param flag The *new* flag to be set. Old flags preserved
* this flag is only added.

View File

@ -3542,7 +3542,7 @@ static PyObject *py_pdb_new(PyTypeObject *type, PyObject *args, PyObject *kwargs
return NULL;
}
/* Initalize list of methods */
/* Initialize list of methods */
status = make_pdb_method_name(&methods, url);
if (!NT_STATUS_IS_OK(status)) {
PyErr_Format(py_pdb_error, "Cannot load backend methods for '%s' backend (%d,%s)",
@ -3727,7 +3727,7 @@ static PyMethodDef py_passdb_methods[] = {
Return domain SID from secrets database." },
{ "reload_static_pdb", py_reload_static_pdb, METH_NOARGS,
"reload_static_pdb() -> None\n\n \
Re-initalise the static pdb used internally. Needed if 'passdb backend' is changed." },
Re-initialise the static pdb used internally. Needed if 'passdb backend' is changed." },
{ NULL },
};

View File

@ -3756,7 +3756,7 @@ static NTSTATUS open_file_ntcreate(connection_struct *conn,
return status;
}
}
/* Note that here we set the *inital* delete on close flag,
/* Note that here we set the *initial* delete on close flag,
not the regular one. The magic gets handled in close. */
fsp->initial_delete_on_close = True;
}
@ -4292,7 +4292,7 @@ static NTSTATUS open_directory(connection_struct *conn,
}
if (NT_STATUS_IS_OK(status)) {
/* Note that here we set the *inital* delete on close flag,
/* Note that here we set the *initial* delete on close flag,
not the regular one. The magic gets handled in close. */
fsp->initial_delete_on_close = True;
}

View File

@ -6930,7 +6930,7 @@ NTSTATUS rename_internals_fsp(connection_struct *conn,
status = can_set_delete_on_close(fsp, 0);
if (NT_STATUS_IS_OK(status)) {
/* Note that here we set the *inital* delete on close flag,
/* Note that here we set the *initial* delete on close flag,
* not the regular one. The magic gets handled in close. */
fsp->initial_delete_on_close = True;
}

View File

@ -58,8 +58,8 @@ static NTSTATUS sync_files(struct copy_clistate *cp_clistate, const char *mask);
* @brief RPC based subcommands for the 'net' utility.
*
* This file should contain much of the functionality that used to
* be found in rpcclient, execpt that the commands should change
* less often, and the fucntionality should be sane (the user is not
* be found in rpcclient, except that the commands should change
* less often, and the functionality should be sane (the user is not
* expected to know a rid/sid before they conduct an operation etc.)
*
* @todo Perhaps eventually these should be split out into a number
@ -256,7 +256,7 @@ fail:
}
/**
* Force a change of the trust acccount password.
* Force a change of the trust account password.
*
* All parameters are provided by the run_rpc_command function, except for
* argc, argv which are passed through.
@ -305,7 +305,7 @@ static NTSTATUS rpc_changetrustpw_internals(struct net_context *c,
}
/**
* Force a change of the trust acccount password.
* Force a change of the trust account password.
*
* @param argc Standard main() style argc.
* @param argv Standard main() style argv. Initial components are already
@ -336,7 +336,7 @@ int net_rpc_changetrustpw(struct net_context *c, int argc, const char **argv)
* the message to be displayed when oldjoin was explicitly
* requested, but not when it was implied by "net rpc join".
*
* This uses 'machinename' as the inital password, and changes it.
* This uses 'machinename' as the initial password, and changes it.
*
* The password should be created with 'server manager' or equiv first.
*
@ -375,7 +375,7 @@ static int net_rpc_oldjoin(struct net_context *c, int argc, const char **argv)
}
/*
check what type of join - if the user want's to join as
check what type of join - if the user wants to join as
a BDC, the server must agree that we are a BDC.
*/
if (argc >= 0) {
@ -568,7 +568,7 @@ static int net_rpc_join_newstyle(struct net_context *c, int argc, const char **a
}
/*
check what type of join - if the user want's to join as
check what type of join - if the user wants to join as
a BDC, the server must agree that we are a BDC.
*/
if (argc >= 0) {

View File

@ -104,8 +104,8 @@ static NTSTATUS do_ntlm_auth_with_stored_pw(const char *namespace,
}
/*
* We inject the inital NEGOTIATE message our caller used
* in order to get the state machine into the correct possition.
* We inject the initial NEGOTIATE message our caller used
* in order to get the state machine into the correct position.
*/
reply = data_blob_null;
status = gensec_update(auth_generic_state->gensec_security,

View File

@ -1437,7 +1437,7 @@ main() {
headers='rpcsvc/rquota.h',
lib='tirpc')
# Required fucntion for NFS quote support
# Required function for NFS quote support
conf.CHECK_CODE('''
clnt_create("", RQUOTAPROG, RQUOTAVERS, "udp");
''',

View File

@ -185,7 +185,7 @@ done:
}
/*
* Check this after the modules have be initalised so we
* Check this after the modules have be initialised so we
* can actually read the backend DB.
*/
data->userPassword_support

View File

@ -602,7 +602,7 @@ NTSTATUS libnet_DomainOpenLsa_recv(struct composite_context *c, struct libnet_co
/**
* Sends a request to open a domain in desired service
*
* @param ctx initalised libnet context
* @param ctx initialised libnet context
* @param io arguments and results of the call
* @param monitor pointer to monitor function that is passed monitor message
*/
@ -1188,7 +1188,7 @@ static struct domainlist* get_domain_list(TALLOC_CTX *mem_ctx, struct domain_lis
/**
* Sends a request to list domains on given host
*
* @param ctx initalised libnet context
* @param ctx initialised libnet context
* @param mem_ctx memory context
* @param io arguments and results of the call
* @param monitor pointer to monitor function that is passed monitor messages

View File

@ -1523,7 +1523,7 @@ static bool torture_chkpath_test(struct torture_context *tctx,
}
/*
* This is a test to excercise some weird Samba3 error paths.
* This is a test to exercise some weird Samba3 error paths.
*/
static bool torture_samba3_errorpaths(struct torture_context *tctx)

View File

@ -940,7 +940,7 @@ class DrsReplicaSyncIntegrityTestCase(drs_base.DrsBaseTestCase):
# This test is a little different in that we're particularly interested
# in exercising the replmd client code on the second DC.
# First, make sure the peer DC has the base OU, then connect to it (so
# we store its inital HWM)
# we store its initial HWM)
self.sync_DCs()
peer_conn = DcConnection(self, self.ldb_dc1, self.dnsname_dc1)