1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-22 13:34:15 +03:00

s4:torture: Fix code spelling

Signed-off-by: Joseph Sutton <josephsutton@catalyst.net.nz>
Reviewed-by: Andrew Bartlett <abartlet@samba.org>
This commit is contained in:
Joseph Sutton 2023-09-06 11:33:59 +12:00 committed by Andrew Bartlett
parent 882a4674c0
commit 39a88a83f3
5 changed files with 14 additions and 14 deletions

View File

@ -645,7 +645,7 @@ static struct test_wrepl_conflict_conn *test_create_conflict_ctx(
nbt_srv_addr = socket_address_from_strings(tctx, ctx->nbtsock_srv->sock->backend_name, ctx->myaddr->addr, lpcfg_nbt_port(tctx->lp_ctx));
if (!nbt_srv_addr) return NULL;
/* And if possible, bind to it. This won't work unless we are root or in sockewrapper */
/* And if possible, bind to it. This won't work unless we are root or in socketwrapper */
status = socket_listen(ctx->nbtsock_srv->sock, nbt_srv_addr, 0, 0);
talloc_free(nbt_srv_addr);
if (!NT_STATUS_IS_OK(status)) {
@ -671,7 +671,7 @@ static struct test_wrepl_conflict_conn *test_create_conflict_ctx(
lpcfg_nbt_port(tctx->lp_ctx));
if (!nbt_srv_addr) return NULL;
/* And if possible, bind to it. This won't work unless we are root or in sockewrapper */
/* And if possible, bind to it. This won't work unless we are root or in socketwrapper */
status = socket_listen(ctx->nbtsock_srv2->sock, ctx->myaddr2, 0, 0);
talloc_free(nbt_srv_addr);
if (!NT_STATUS_IS_OK(status)) {
@ -1167,7 +1167,7 @@ static bool test_conflict_same_owner(struct torture_context *tctx,
.num_ips = ARRAY_SIZE(addresses_B_3_4),
.ips = addresses_B_3_4,
},{
/* the last one should always be a unique,tomstone record! */
/* the last one should always be a unique,tombstone record! */
.type = WREPL_TYPE_UNIQUE,
.state = WREPL_STATE_TOMBSTONE,
.node = WREPL_NODE_B,

View File

@ -2014,7 +2014,7 @@ static bool lsarsetforesttrustsinformation_in_check(struct torture_context *tctx
torture_assert_str_equal(tctx, r->in.trusted_domain_name->string, "f1.test", "trusted domain name");
torture_assert_int_equal(tctx, r->in.highest_record_type, 2, "highest record type");
torture_assert(tctx, r->in.forest_trust_info != NULL, "forest trust info");
torture_assert_int_equal(tctx, r->in.forest_trust_info->count, 2, "number fo forest trust records");
torture_assert_int_equal(tctx, r->in.forest_trust_info->count, 2, "number of forest trust records");
torture_assert_int_equal(tctx, r->in.forest_trust_info->entries[0]->flags, 0, "first entry flags");
torture_assert_int_equal(tctx, r->in.forest_trust_info->entries[0]->type, 0, "first entry type");
torture_assert_int_equal(tctx, r->in.forest_trust_info->entries[0]->time, 0, "first entry time");

View File

@ -1108,7 +1108,7 @@ next_run:
lock[0].pid--;
/*
* demonstrate the a successful lock with count = 0 and the same offset,
* demonstrate that a successful lock with count = 0 and the same offset,
* doesn't reset the error cache
*/
lock[0].offset = 100;
@ -1132,7 +1132,7 @@ next_run:
CHECK_STATUS(status, NT_STATUS_FILE_LOCK_CONFLICT);
/*
* demonstrate the a successful lock with count = 0 and outside the locked range,
* demonstrate that a successful lock with count = 0 and outside the locked range,
* doesn't reset the error cache
*/
lock[0].offset = 110;
@ -1197,7 +1197,7 @@ next_run:
CHECK_STATUS(status, NT_STATUS_FILE_LOCK_CONFLICT);
/*
* demonstrate the a lock with count = 0 and inside the locked range,
* demonstrate that a lock with count = 0 and inside the locked range,
* fails and resets the error cache
*/
lock[0].offset = 101;
@ -1228,7 +1228,7 @@ next_run:
status = smb_raw_lock(cli->tree, &io);
CHECK_STATUS(status, NT_STATUS_FILE_LOCK_CONFLICT);
/* demonstrate the a changing offset, resets the error cache */
/* demonstrate that a changing offset resets the error cache */
lock[0].offset = 105;
lock[0].count = 10;
io.lockx.in.file.fnum = fnum;
@ -1286,7 +1286,7 @@ next_run:
CHECK_STATUS(status, NT_STATUS_FILE_LOCK_CONFLICT);
/*
* demonstrate the a successful lock in a different range,
* demonstrate that a successful lock in a different range
* doesn't reset the cache, the failing lock on the 2nd handle
* resets the cache
*/

View File

@ -472,7 +472,7 @@ bool test_DsCrackNames(struct torture_context *tctx,
/* form up a user@DOMAIN */
user_principal_name_short = talloc_asprintf(mem_ctx, "%s$@%s", test_dc, nt4_domain);
/* variable nt4_domain includs a trailing \ */
/* variable nt4_domain includes a trailing \ */
user_principal_name_short[strlen(user_principal_name_short) - 1] = '\0';
service_principal_name = talloc_asprintf(mem_ctx, "HOST/%s", test_dc);

View File

@ -2066,7 +2066,7 @@ bool test_netlogon_capabilities(struct dcerpc_pipe *p, struct torture_context *t
* because dcerpc_netr_LogonGetCapabilities with
* an unknown query level returns DCERPC_NCA_S_FAULT_INVALID_TAG
* => NT_STATUS_RPC_ENUM_VALUE_OUT_OF_RANGE
* without looking a the authenticator.
* without looking at the authenticator.
*/
tmp_creds = *creds;
netlogon_creds_client_authenticator(&tmp_creds, &auth);
@ -2085,7 +2085,7 @@ bool test_netlogon_capabilities(struct dcerpc_pipe *p, struct torture_context *t
* because dcerpc_netr_LogonGetCapabilities with
* an unknown query level returns DCERPC_NCA_S_FAULT_INVALID_TAG
* => NT_STATUS_RPC_ENUM_VALUE_OUT_OF_RANGE
* without looking a the authenticator.
* without looking at the authenticator.
*/
tmp_creds = *creds;
netlogon_creds_client_authenticator(&tmp_creds, &auth);
@ -2103,7 +2103,7 @@ bool test_netlogon_capabilities(struct dcerpc_pipe *p, struct torture_context *t
* we need to operate on a temporary copy of creds
* because dcerpc_netr_LogonGetCapabilities was
* dcerpc_netr_DummyFunction and returns NT_STATUS_NOT_IMPLEMENTED
* without looking a the authenticator.
* without looking at the authenticator.
*/
tmp_creds = *creds;
netlogon_creds_client_authenticator(&tmp_creds, &auth);
@ -2134,7 +2134,7 @@ bool test_netlogon_capabilities(struct dcerpc_pipe *p, struct torture_context *t
* because dcerpc_netr_LogonGetCapabilities with
* an query level 2 may returns DCERPC_NCA_S_FAULT_INVALID_TAG
* => NT_STATUS_RPC_ENUM_VALUE_OUT_OF_RANGE
* without looking a the authenticator.
* without looking at the authenticator.
*/
tmp_creds = *creds;
netlogon_creds_client_authenticator(&tmp_creds, &auth);