1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-23 17:34:34 +03:00

Fix some types

Autobuild-User: Jelmer Vernooij <jelmer@samba.org>
Autobuild-Date: Mon Feb 28 23:30:06 CET 2011 on sn-devel-104
This commit is contained in:
Jelmer Vernooij 2011-02-28 22:04:29 +01:00
parent f7b4209f99
commit 59a077d8f5
24 changed files with 39 additions and 39 deletions

View File

@ -156,7 +156,7 @@
could cause the helper to authenticate the could cause the helper to authenticate the
user). </para> user). </para>
<para>Curently implemented parameters from the <para>Currently implemented parameters from the
external program to the helper are:</para> external program to the helper are:</para>
<variablelist> <variablelist>
<varlistentry> <varlistentry>

View File

@ -123,7 +123,7 @@
<varlistentry> <varlistentry>
<term>-f, --rcfile</term> <term>-f, --rcfile</term>
<listitem><para>Use specified rcfile. This will be loaded in the order it was specified - e.g. if you specify any options before this one, they might get overriden by the contents of the rcfile.</para></listitem> <listitem><para>Use specified rcfile. This will be loaded in the order it was specified - e.g. if you specify any options before this one, they might get overridden by the contents of the rcfile.</para></listitem>
</varlistentry> </varlistentry>
<varlistentry> <varlistentry>

View File

@ -152,7 +152,7 @@ enum lsa_SidType ds_atype_map(uint32_t atype)
} }
/* get the default primary group RID for a given userAccountControl /* get the default primary group RID for a given userAccountControl
* (informations according to MS-SAMR 3.1.1.8.1) */ * (information according to MS-SAMR 3.1.1.8.1) */
uint32_t ds_uf2prim_group_rid(uint32_t uf) uint32_t ds_uf2prim_group_rid(uint32_t uf)
{ {
uint32_t prim_group_rid = DOMAIN_RID_USERS; uint32_t prim_group_rid = DOMAIN_RID_USERS;

View File

@ -557,7 +557,7 @@ static void smb_traffic_analyzer_send_data(vfs_handle_struct *handle,
} else { } else {
DEBUG(1, ("smb_traffic_analyzer_send_data_socket: " DEBUG(1, ("smb_traffic_analyzer_send_data_socket: "
"error, unkown protocol given!\n")); "error, unknown protocol given!\n"));
return; return;
} }

View File

@ -4814,7 +4814,7 @@ static bool ldapgroup2displayentry(struct ldap_search_state *state,
break; break;
default: default:
DEBUG(0,("unkown group type: %d\n", group_type)); DEBUG(0,("unknown group type: %d\n", group_type));
return False; return False;
} }
@ -6625,7 +6625,7 @@ NTSTATUS pdb_init_ldapsam(struct pdb_methods **pdb_method, const char *location)
"info, nor add one to the domain\n")); "info, nor add one to the domain\n"));
DEBUGADD(2, ("pdb_init_ldapsam: Continuing on regardless, " DEBUGADD(2, ("pdb_init_ldapsam: Continuing on regardless, "
"will be unable to allocate new users/groups, " "will be unable to allocate new users/groups, "
"and will risk BDCs having inconsistant SIDs\n")); "and will risk BDCs having inconsistent SIDs\n"));
sid_copy(&ldap_state->domain_sid, get_global_sam_sid()); sid_copy(&ldap_state->domain_sid, get_global_sam_sid());
return NT_STATUS_OK; return NT_STATUS_OK;
} }

View File

@ -144,7 +144,7 @@ const char *get_short_archi(const char *long_archi)
{ {
int i=-1; int i=-1;
DEBUG(107,("Getting architecture dependant directory\n")); DEBUG(107,("Getting architecture dependent directory\n"));
do { do {
i++; i++;
} while ( (archi_table[i].long_archi!=NULL ) && } while ( (archi_table[i].long_archi!=NULL ) &&

View File

@ -3743,7 +3743,7 @@ WERROR _spoolss_RouterRefreshPrinterChangeNotify(struct pipes_struct *p,
* We are now using the change value, and * We are now using the change value, and
* I should check for PRINTER_NOTIFY_OPTIONS_REFRESH but as * I should check for PRINTER_NOTIFY_OPTIONS_REFRESH but as
* I don't have a global notification system, I'm sending back all the * I don't have a global notification system, I'm sending back all the
* informations even when _NOTHING_ has changed. * information even when _NOTHING_ has changed.
*/ */
/* We need to keep track of the change value to send back in /* We need to keep track of the change value to send back in

View File

@ -77,7 +77,7 @@ static const char *cmd_spoolss_get_short_archi(const char *long_archi)
{ {
int i=-1; int i=-1;
DEBUG(107,("Getting architecture dependant directory\n")); DEBUG(107,("Getting architecture dependent directory\n"));
do { do {
i++; i++;
} while ( (archi_table[i].long_archi!=NULL ) && } while ( (archi_table[i].long_archi!=NULL ) &&
@ -1722,7 +1722,7 @@ static WERROR cmd_spoolss_addprinterdriver(struct rpc_pipe_client *cli,
arch = cmd_spoolss_get_short_archi(argv[1]); arch = cmd_spoolss_get_short_archi(argv[1]);
if (!arch) { if (!arch) {
printf ("Error Unknown architechture [%s]\n", argv[1]); printf ("Error Unknown architecture [%s]\n", argv[1]);
return WERR_INVALID_PARAM; return WERR_INVALID_PARAM;
} }

View File

@ -586,7 +586,7 @@ static struct cmd_set rpcclient_commands[] = {
{ "seal", RPC_RTYPE_NTSTATUS, cmd_seal, NULL, NULL, NULL, "Force RPC pipe connections to be sealed", "" }, { "seal", RPC_RTYPE_NTSTATUS, cmd_seal, NULL, NULL, NULL, "Force RPC pipe connections to be sealed", "" },
{ "schannel", RPC_RTYPE_NTSTATUS, cmd_schannel, NULL, NULL, NULL, "Force RPC pipe connections to be sealed with 'schannel'. Assumes valid machine account to this domain controller.", "" }, { "schannel", RPC_RTYPE_NTSTATUS, cmd_schannel, NULL, NULL, NULL, "Force RPC pipe connections to be sealed with 'schannel'. Assumes valid machine account to this domain controller.", "" },
{ "schannelsign", RPC_RTYPE_NTSTATUS, cmd_schannel_sign, NULL, NULL, NULL, "Force RPC pipe connections to be signed (not sealed) with 'schannel'. Assumes valid machine account to this domain controller.", "" }, { "schannelsign", RPC_RTYPE_NTSTATUS, cmd_schannel_sign, NULL, NULL, NULL, "Force RPC pipe connections to be signed (not sealed) with 'schannel'. Assumes valid machine account to this domain controller.", "" },
{ "timeout", RPC_RTYPE_NTSTATUS, cmd_timeout, NULL, NULL, NULL, "Set timeout (in milliseonds) for RPC operations", "" }, { "timeout", RPC_RTYPE_NTSTATUS, cmd_timeout, NULL, NULL, NULL, "Set timeout (in milliseconds) for RPC operations", "" },
{ "transport", RPC_RTYPE_NTSTATUS, cmd_choose_transport, NULL, NULL, NULL, "Choose ncacn transport for RPC operations", "" }, { "transport", RPC_RTYPE_NTSTATUS, cmd_choose_transport, NULL, NULL, NULL, "Choose ncacn transport for RPC operations", "" },
{ "none", RPC_RTYPE_NTSTATUS, cmd_none, NULL, NULL, NULL, "Force RPC pipe connections to have no special properties", "" }, { "none", RPC_RTYPE_NTSTATUS, cmd_none, NULL, NULL, NULL, "Force RPC pipe connections to have no special properties", "" },

View File

@ -1830,7 +1830,7 @@ static int net_ads_printer_publish(struct net_context *c, int argc, const char *
Undefined); Undefined);
if (NT_STATUS_IS_ERR(nt_status)) { if (NT_STATUS_IS_ERR(nt_status)) {
d_fprintf(stderr, _("Unable to open a connnection to %s to " d_fprintf(stderr, _("Unable to open a connection to %s to "
"obtain data for %s\n"), "obtain data for %s\n"),
servername, printername); servername, printername);
ads_destroy(&ads); ads_destroy(&ads);
@ -1879,7 +1879,7 @@ static int net_ads_printer_publish(struct net_context *c, int argc, const char *
nt_status = cli_rpc_pipe_open_noauth(cli, &ndr_table_spoolss.syntax_id, &pipe_hnd); nt_status = cli_rpc_pipe_open_noauth(cli, &ndr_table_spoolss.syntax_id, &pipe_hnd);
if (!NT_STATUS_IS_OK(nt_status)) { if (!NT_STATUS_IS_OK(nt_status)) {
d_fprintf(stderr, _("Unable to open a connnection to the spoolss pipe on %s\n"), d_fprintf(stderr, _("Unable to open a connection to the spoolss pipe on %s\n"),
servername); servername);
SAFE_FREE(prt_dn); SAFE_FREE(prt_dn);
ads_destroy(&ads); ads_destroy(&ads);

View File

@ -1333,7 +1333,7 @@ static NTSTATUS rpc_printer_publish_internals_args(struct rpc_pipe_client *pipe_
break; break;
default: default:
action_str = N_("unknown action"); action_str = N_("unknown action");
printf(_("unkown action: %d\n"), action); printf(_("unknown action: %d\n"), action);
break; break;
} }
@ -1498,7 +1498,7 @@ NTSTATUS rpc_printer_publish_list_internals(struct net_context *c,
sharename); sharename);
break; break;
default: default:
printf(_("unkown state: %d\n"), state); printf(_("unknown state: %d\n"), state);
break; break;
} }
} }

View File

@ -706,7 +706,7 @@ _PUBLIC_ int cli_credentials_get_server_gss_creds(struct cli_credentials *cred,
ret = principal_from_credentials(mem_ctx, cred, smb_krb5_context, &princ, &obtained, &error_string); ret = principal_from_credentials(mem_ctx, cred, smb_krb5_context, &princ, &obtained, &error_string);
if (ret) { if (ret) {
DEBUG(1,("cli_credentials_get_server_gss_creds: makeing krb5 principal failed (%s)\n", DEBUG(1,("cli_credentials_get_server_gss_creds: making krb5 principal failed (%s)\n",
error_string)); error_string));
talloc_free(mem_ctx); talloc_free(mem_ctx);
return ret; return ret;

View File

@ -189,7 +189,7 @@ NTSTATUS fill_netlogon_samlogon_response(struct ldb_context *sam_ctx,
} }
if (dom_res == NULL) { if (dom_res == NULL) {
DEBUG(2,(__location__ ": Unable to get domain informations with no inputs\n")); DEBUG(2,(__location__ ": Unable to get domain information with no inputs\n"));
return NT_STATUS_NO_SUCH_DOMAIN; return NT_STATUS_NO_SUCH_DOMAIN;
} }

View File

@ -2021,7 +2021,7 @@ int samdb_set_password_callback(struct ldb_request *req, struct ldb_reply *ares)
* Sets the user password using plaintext UTF16 (attribute "new_password") or * Sets the user password using plaintext UTF16 (attribute "new_password") or
* LM (attribute "lmNewHash") or NT (attribute "ntNewHash") hash. Also pass * LM (attribute "lmNewHash") or NT (attribute "ntNewHash") hash. Also pass
* the old LM and/or NT hash (attributes "lmOldHash"/"ntOldHash") if it is a * the old LM and/or NT hash (attributes "lmOldHash"/"ntOldHash") if it is a
* user change or not. The "rejectReason" gives some more informations if the * user change or not. The "rejectReason" gives some more information if the
* change failed. * change failed.
* *
* Results: NT_STATUS_OK, NT_STATUS_INVALID_PARAMETER, NT_STATUS_UNSUCCESSFUL, * Results: NT_STATUS_OK, NT_STATUS_INVALID_PARAMETER, NT_STATUS_UNSUCCESSFUL,
@ -2203,7 +2203,7 @@ NTSTATUS samdb_set_password(struct ldb_context *ldb, TALLOC_CTX *mem_ctx,
* Sets the user password using plaintext UTF16 (attribute "new_password") or * Sets the user password using plaintext UTF16 (attribute "new_password") or
* LM (attribute "lmNewHash") or NT (attribute "ntNewHash") hash. Also pass * LM (attribute "lmNewHash") or NT (attribute "ntNewHash") hash. Also pass
* the old LM and/or NT hash (attributes "lmOldHash"/"ntOldHash") if it is a * the old LM and/or NT hash (attributes "lmOldHash"/"ntOldHash") if it is a
* user change or not. The "rejectReason" gives some more informations if the * user change or not. The "rejectReason" gives some more information if the
* change failed. * change failed.
* *
* This wrapper function for "samdb_set_password" takes a SID as input rather * This wrapper function for "samdb_set_password" takes a SID as input rather

View File

@ -996,7 +996,7 @@ static int acl_modify(struct ldb_module *module, struct ldb_request *req)
/* This basic attribute existence check with the right errorcode /* This basic attribute existence check with the right errorcode
* is needed since this module is the first one which requests * is needed since this module is the first one which requests
* schema attribute informations. * schema attribute information.
* The complete attribute checking is done in the * The complete attribute checking is done in the
* "objectclass_attrs" module behind this one. * "objectclass_attrs" module behind this one.
*/ */

View File

@ -903,7 +903,7 @@ static int oc_modify_callback(struct ldb_request *req, struct ldb_reply *ares)
talloc_free(ares); talloc_free(ares);
/* this looks up the real existing object for fetching some important /* this looks up the real existing object for fetching some important
* informations (objectclasses) */ * information (objectclasses) */
ret = ldb_build_search_req(&search_req, ldb, ret = ldb_build_search_req(&search_req, ldb,
ac, ac->req->op.mod.message->dn, ac, ac->req->op.mod.message->dn,
LDB_SCOPE_BASE, LDB_SCOPE_BASE,
@ -1220,7 +1220,7 @@ static int objectclass_rename(struct ldb_module *module, struct ldb_request *req
} }
/* this looks up the parent object for fetching some important /* this looks up the parent object for fetching some important
* informations (objectclasses, DN normalisation...) */ * information (objectclasses, DN normalisation...) */
ret = ldb_build_search_req(&search_req, ldb, ret = ldb_build_search_req(&search_req, ldb,
ac, parent_dn, LDB_SCOPE_BASE, ac, parent_dn, LDB_SCOPE_BASE,
"(objectClass=*)", "(objectClass=*)",
@ -1272,7 +1272,7 @@ static int objectclass_do_rename(struct oc_context *ac)
ac->search_res = NULL; ac->search_res = NULL;
/* this looks up the real existing object for fetching some important /* this looks up the real existing object for fetching some important
* informations (objectclasses) */ * information (objectclasses) */
ret = ldb_build_search_req(&search_req, ldb, ret = ldb_build_search_req(&search_req, ldb,
ac, ac->req->op.rename.olddn, ac, ac->req->op.rename.olddn,
LDB_SCOPE_BASE, LDB_SCOPE_BASE,
@ -1451,7 +1451,7 @@ static int objectclass_delete(struct ldb_module *module, struct ldb_request *req
} }
/* this looks up the entry object for fetching some important /* this looks up the entry object for fetching some important
* informations (object classes, system flags...) */ * information (object classes, system flags...) */
ret = ldb_build_search_req(&search_req, ldb, ret = ldb_build_search_req(&search_req, ldb,
ac, req->op.del.dn, LDB_SCOPE_BASE, ac, req->op.del.dn, LDB_SCOPE_BASE,
"(objectClass=*)", "(objectClass=*)",

View File

@ -299,7 +299,7 @@ static int attr_handler2(struct oc_context *ac)
} }
/* We can use "str_list_check" with "strcmp" here since the /* We can use "str_list_check" with "strcmp" here since the
* attribute informations from the schema are always equal * attribute information from the schema are always equal
* up-down-cased. */ * up-down-cased. */
found = str_list_check(must_contain, attr->lDAPDisplayName); found = str_list_check(must_contain, attr->lDAPDisplayName);
if (found) { if (found) {

View File

@ -556,7 +556,7 @@ static int samldb_fill_object(struct samldb_ctx *ac)
struct ldb_context *ldb = ldb_module_get_ctx(ac->module); struct ldb_context *ldb = ldb_module_get_ctx(ac->module);
int ret; int ret;
/* Add informations for the different account types */ /* Add information for the different account types */
if (strcmp(ac->type, "user") == 0) { if (strcmp(ac->type, "user") == 0) {
struct ldb_control *rodc_control = ldb_request_get_control(ac->req, struct ldb_control *rodc_control = ldb_request_get_control(ac->req,
LDB_CONTROL_RODC_DCPROMO_OID); LDB_CONTROL_RODC_DCPROMO_OID);
@ -1074,7 +1074,7 @@ static int samldb_prim_group_change(struct samldb_ctx *ac)
return LDB_SUCCESS; return LDB_SUCCESS;
} }
/* Fetch informations from the existing object */ /* Fetch information from the existing object */
ret = dsdb_module_search(ac->module, ac, &res, ac->msg->dn, LDB_SCOPE_BASE, attrs, ret = dsdb_module_search(ac->module, ac, &res, ac->msg->dn, LDB_SCOPE_BASE, attrs,
DSDB_FLAG_NEXT_MODULE, ac->req, NULL); DSDB_FLAG_NEXT_MODULE, ac->req, NULL);
@ -1467,7 +1467,7 @@ static int samldb_member_check(struct samldb_ctx *ac)
int cnt; int cnt;
int ret; int ret;
/* Fetch informations from the existing object */ /* Fetch information from the existing object */
ret = dsdb_module_search(ac->module, ac, &res, ac->msg->dn, LDB_SCOPE_BASE, attrs, ret = dsdb_module_search(ac->module, ac, &res, ac->msg->dn, LDB_SCOPE_BASE, attrs,
DSDB_FLAG_NEXT_MODULE, ac->req, NULL); DSDB_FLAG_NEXT_MODULE, ac->req, NULL);
@ -1581,7 +1581,7 @@ static int samldb_description_check(struct samldb_ctx *ac, bool *modified)
unsigned int i; unsigned int i;
int ret; int ret;
/* Fetch informations from the existing object */ /* Fetch information from the existing object */
ret = dsdb_module_search(ac->module, ac, &res, ac->msg->dn, LDB_SCOPE_BASE, attrs, ret = dsdb_module_search(ac->module, ac, &res, ac->msg->dn, LDB_SCOPE_BASE, attrs,
DSDB_FLAG_NEXT_MODULE | DSDB_SEARCH_SHOW_DELETED, ac->req, DSDB_FLAG_NEXT_MODULE | DSDB_SEARCH_SHOW_DELETED, ac->req,
"(|(objectclass=user)(objectclass=group)(objectclass=samDomain)(objectclass=samServer))"); "(|(objectclass=user)(objectclass=group)(objectclass=samDomain)(objectclass=samServer))");
@ -1717,7 +1717,7 @@ static int samldb_service_principal_names_change(struct samldb_ctx *ac)
} }
if ((dns_hostname == NULL) && (sam_accountname == NULL)) { if ((dns_hostname == NULL) && (sam_accountname == NULL)) {
/* Well, there are informations missing (old name(s)) or the /* Well, there are information missing (old name(s)) or the
* names didn't change. We've nothing to do and can exit here */ * names didn't change. We've nothing to do and can exit here */
return LDB_SUCCESS; return LDB_SUCCESS;
} }

View File

@ -1470,7 +1470,7 @@ static NTSTATUS dcesrv_netr_LogonGetDomainInfo(struct dcesrv_call_state *dce_cal
update_dns_hostname = false; update_dns_hostname = false;
} }
/* Gets host informations and put them into our directory */ /* Gets host information and put them into our directory */
new_msg = ldb_msg_new(mem_ctx); new_msg = ldb_msg_new(mem_ctx);
NT_STATUS_HAVE_NO_MEMORY(new_msg); NT_STATUS_HAVE_NO_MEMORY(new_msg);
@ -1486,7 +1486,7 @@ static NTSTATUS dcesrv_netr_LogonGetDomainInfo(struct dcesrv_call_state *dce_cal
} }
/* /*
* Sets informations from "os_version". On an empty structure * Sets information from "os_version". On an empty structure
* the values are cleared. * the values are cleared.
*/ */
if (r->in.query->workstation_info->os_version.os != NULL) { if (r->in.query->workstation_info->os_version.os != NULL) {
@ -1620,7 +1620,7 @@ static NTSTATUS dcesrv_netr_LogonGetDomainInfo(struct dcesrv_call_state *dce_cal
"msDS-SupportedEncryptionTypes", "msDS-SupportedEncryptionTypes",
default_supported_enc_types); default_supported_enc_types);
/* Other host domain informations */ /* Other host domain information */
lsa_policy_info = talloc(mem_ctx, lsa_policy_info = talloc(mem_ctx,
struct netr_LsaPolicyInformation); struct netr_LsaPolicyInformation);

View File

@ -63,7 +63,7 @@ static bool test_multibind(struct ldap_connection *conn, const char *userdn, con
{ {
bool ret = true; bool ret = true;
printf("Testing multiple binds on a single connnection as anonymous and user\n"); printf("Testing multiple binds on a single connection as anonymous and user\n");
ret = test_bind_simple(conn, NULL, NULL); ret = test_bind_simple(conn, NULL, NULL);
if (!ret) { if (!ret) {

View File

@ -156,7 +156,7 @@ static bool test_create_trust_and_set_info(struct dcerpc_pipe *p,
} else { } else {
if (strcmp(info->info_ex.netbios_name.string, trustinfo.netbios_name.string) != 0) { if (strcmp(info->info_ex.netbios_name.string, trustinfo.netbios_name.string) != 0) {
torture_comment(tctx, torture_comment(tctx,
"QueryTrustedDomainInfo returned inconsistant short name: %s != %s\n", "QueryTrustedDomainInfo returned inconsistent short name: %s != %s\n",
info->info_ex.netbios_name.string, info->info_ex.netbios_name.string,
trustinfo.netbios_name.string); trustinfo.netbios_name.string);
ret = false; ret = false;

View File

@ -2353,7 +2353,7 @@ static bool test_CreateTrustedDomain(struct dcerpc_binding_handle *b,
ret = false; ret = false;
} else { } else {
if (strcmp(info->info_ex.netbios_name.string, trustinfo.name.string) != 0) { if (strcmp(info->info_ex.netbios_name.string, trustinfo.name.string) != 0) {
torture_comment(tctx, "QueryTrustedDomainInfo returned inconsistant short name: %s != %s\n", torture_comment(tctx, "QueryTrustedDomainInfo returned inconsistent short name: %s != %s\n",
info->info_ex.netbios_name.string, trustinfo.name.string); info->info_ex.netbios_name.string, trustinfo.name.string);
ret = false; ret = false;
} }
@ -2509,7 +2509,7 @@ static bool test_CreateTrustedDomainEx2(struct dcerpc_pipe *p,
ret = false; ret = false;
} else { } else {
if (strcmp(info->info_ex.netbios_name.string, trustinfo.netbios_name.string) != 0) { if (strcmp(info->info_ex.netbios_name.string, trustinfo.netbios_name.string) != 0) {
torture_comment(tctx, "QueryTrustedDomainInfo returned inconsistant short name: %s != %s\n", torture_comment(tctx, "QueryTrustedDomainInfo returned inconsistent short name: %s != %s\n",
info->info_ex.netbios_name.string, trustinfo.netbios_name.string); info->info_ex.netbios_name.string, trustinfo.netbios_name.string);
ret = false; ret = false;
} }

View File

@ -590,7 +590,7 @@ static bool test_SetPassword2(struct torture_context *tctx,
new_password.length = IVAL(password_buf.data, 512); new_password.length = IVAL(password_buf.data, 512);
torture_comment(tctx, torture_comment(tctx,
"Testing a third ServerPasswordSet2 on machine account, with a compleatly random password\n"); "Testing a third ServerPasswordSet2 on machine account, with a completely random password\n");
netlogon_creds_client_authenticator(creds, &credential); netlogon_creds_client_authenticator(creds, &credential);

View File

@ -782,7 +782,7 @@ static bool torture_winbind_struct_show_sequence(struct torture_context *torture
uint32_t seq; uint32_t seq;
torture_assert(torture, s[i].netbios_name, torture_assert(torture, s[i].netbios_name,
"more domains recieved in second run"); "more domains received in second run");
torture_assert_str_equal(torture, domlist[i].netbios_name, torture_assert_str_equal(torture, domlist[i].netbios_name,
s[i].netbios_name, s[i].netbios_name,
"inconsistent order of domain lists"); "inconsistent order of domain lists");