[SCM] Samba Shared Repository - branch master updated

Jelmer Vernooij jelmer at samba.org
Mon Feb 28 15:31:02 MST 2011


The branch, master has been updated
       via  59a077d Fix some types
      from  f7b4209 Fix one more warning introduced by changing the size of UNIX_USER_TOKEN->ngroups from size_t to uint32_t.

http://gitweb.samba.org/?p=samba.git;a=shortlog;h=master


- Log -----------------------------------------------------------------
commit 59a077d8f5b4ec78e90d6c4dabbc65375598c431
Author: Jelmer Vernooij <jelmer at samba.org>
Date:   Mon Feb 28 22:04:29 2011 +0100

    Fix some types
    
    Autobuild-User: Jelmer Vernooij <jelmer at samba.org>
    Autobuild-Date: Mon Feb 28 23:30:06 CET 2011 on sn-devel-104

-----------------------------------------------------------------------

Summary of changes:
 docs-xml/manpages-3/ntlm_auth.1.xml                |    2 +-
 docs-xml/manpages-3/smbget.1.xml                   |    2 +-
 libds/common/flag_mapping.c                        |    2 +-
 source3/modules/vfs_smb_traffic_analyzer.c         |    2 +-
 source3/passdb/pdb_ldap.c                          |    4 ++--
 source3/printing/nt_printing.c                     |    2 +-
 source3/rpc_server/spoolss/srv_spoolss_nt.c        |    2 +-
 source3/rpcclient/cmd_spoolss.c                    |    4 ++--
 source3/rpcclient/rpcclient.c                      |    2 +-
 source3/utils/net_ads.c                            |    4 ++--
 source3/utils/net_rpc_printer.c                    |    4 ++--
 source4/auth/credentials/credentials_krb5.c        |    2 +-
 source4/cldap_server/netlogon.c                    |    2 +-
 source4/dsdb/common/util.c                         |    4 ++--
 source4/dsdb/samdb/ldb_modules/acl.c               |    2 +-
 source4/dsdb/samdb/ldb_modules/objectclass.c       |    8 ++++----
 source4/dsdb/samdb/ldb_modules/objectclass_attrs.c |    2 +-
 source4/dsdb/samdb/ldb_modules/samldb.c            |   10 +++++-----
 source4/rpc_server/netlogon/dcerpc_netlogon.c      |    6 +++---
 source4/torture/ldap/basic.c                       |    2 +-
 source4/torture/rpc/forest_trust.c                 |    2 +-
 source4/torture/rpc/lsa.c                          |    4 ++--
 source4/torture/rpc/netlogon.c                     |    2 +-
 source4/torture/winbind/struct_based.c             |    2 +-
 24 files changed, 39 insertions(+), 39 deletions(-)


Changeset truncated at 500 lines:

diff --git a/docs-xml/manpages-3/ntlm_auth.1.xml b/docs-xml/manpages-3/ntlm_auth.1.xml
index 78ac69c..69264d7 100644
--- a/docs-xml/manpages-3/ntlm_auth.1.xml
+++ b/docs-xml/manpages-3/ntlm_auth.1.xml
@@ -156,7 +156,7 @@
                 could cause the helper to authenticate the
                 user). </para>
 
-		<para>Curently implemented parameters from the
+		<para>Currently implemented parameters from the
 		external program to the helper are:</para>
 		<variablelist>
 		  <varlistentry>
diff --git a/docs-xml/manpages-3/smbget.1.xml b/docs-xml/manpages-3/smbget.1.xml
index e4094ab..99ff5c6 100644
--- a/docs-xml/manpages-3/smbget.1.xml
+++ b/docs-xml/manpages-3/smbget.1.xml
@@ -123,7 +123,7 @@
 
 	<varlistentry>
 		<term>-f, --rcfile</term>
-		<listitem><para>Use specified rcfile. This will be loaded in the order it was specified - e.g. if you specify any options before this one, they might get overriden by the contents of the rcfile.</para></listitem>
+		<listitem><para>Use specified rcfile. This will be loaded in the order it was specified - e.g. if you specify any options before this one, they might get overridden by the contents of the rcfile.</para></listitem>
 	</varlistentry>
 
 	<varlistentry>
diff --git a/libds/common/flag_mapping.c b/libds/common/flag_mapping.c
index 471afd0..ddc8ec5 100644
--- a/libds/common/flag_mapping.c
+++ b/libds/common/flag_mapping.c
@@ -152,7 +152,7 @@ enum lsa_SidType ds_atype_map(uint32_t atype)
 }
 
 /* get the default primary group RID for a given userAccountControl
- * (informations according to MS-SAMR 3.1.1.8.1) */
+ * (information according to MS-SAMR 3.1.1.8.1) */
 uint32_t ds_uf2prim_group_rid(uint32_t uf)
 {
 	uint32_t prim_group_rid = DOMAIN_RID_USERS;
diff --git a/source3/modules/vfs_smb_traffic_analyzer.c b/source3/modules/vfs_smb_traffic_analyzer.c
index c4f2c39..f3d68dd 100644
--- a/source3/modules/vfs_smb_traffic_analyzer.c
+++ b/source3/modules/vfs_smb_traffic_analyzer.c
@@ -557,7 +557,7 @@ static void smb_traffic_analyzer_send_data(vfs_handle_struct *handle,
 
 	} else {
 		DEBUG(1, ("smb_traffic_analyzer_send_data_socket: "
-			"error, unkown protocol given!\n"));
+			"error, unknown protocol given!\n"));
 		return;
 	}
 
diff --git a/source3/passdb/pdb_ldap.c b/source3/passdb/pdb_ldap.c
index 5b34f6e..7eb2fef 100644
--- a/source3/passdb/pdb_ldap.c
+++ b/source3/passdb/pdb_ldap.c
@@ -4814,7 +4814,7 @@ static bool ldapgroup2displayentry(struct ldap_search_state *state,
 			break;
 
 		default:
-			DEBUG(0,("unkown group type: %d\n", group_type));
+			DEBUG(0,("unknown group type: %d\n", group_type));
 			return False;
 	}
 
@@ -6625,7 +6625,7 @@ NTSTATUS pdb_init_ldapsam(struct pdb_methods **pdb_method, const char *location)
 			  "info, nor add one to the domain\n"));
 		DEBUGADD(2, ("pdb_init_ldapsam: Continuing on regardless, "
 			     "will be unable to allocate new users/groups, "
-			     "and will risk BDCs having inconsistant SIDs\n"));
+			     "and will risk BDCs having inconsistent SIDs\n"));
 		sid_copy(&ldap_state->domain_sid, get_global_sam_sid());
 		return NT_STATUS_OK;
 	}
diff --git a/source3/printing/nt_printing.c b/source3/printing/nt_printing.c
index 68b53c7..869fcad 100644
--- a/source3/printing/nt_printing.c
+++ b/source3/printing/nt_printing.c
@@ -144,7 +144,7 @@ const char *get_short_archi(const char *long_archi)
 {
         int i=-1;
 
-        DEBUG(107,("Getting architecture dependant directory\n"));
+        DEBUG(107,("Getting architecture dependent directory\n"));
         do {
                 i++;
         } while ( (archi_table[i].long_archi!=NULL ) &&
diff --git a/source3/rpc_server/spoolss/srv_spoolss_nt.c b/source3/rpc_server/spoolss/srv_spoolss_nt.c
index 1db6522..828d06a 100644
--- a/source3/rpc_server/spoolss/srv_spoolss_nt.c
+++ b/source3/rpc_server/spoolss/srv_spoolss_nt.c
@@ -3743,7 +3743,7 @@ WERROR _spoolss_RouterRefreshPrinterChangeNotify(struct pipes_struct *p,
 	 * 	We are now using the change value, and
 	 *	I should check for PRINTER_NOTIFY_OPTIONS_REFRESH but as
 	 *	I don't have a global notification system, I'm sending back all the
-	 *	informations even when _NOTHING_ has changed.
+	 *	information even when _NOTHING_ has changed.
 	 */
 
 	/* We need to keep track of the change value to send back in
diff --git a/source3/rpcclient/cmd_spoolss.c b/source3/rpcclient/cmd_spoolss.c
index 02c3162..4eda995 100644
--- a/source3/rpcclient/cmd_spoolss.c
+++ b/source3/rpcclient/cmd_spoolss.c
@@ -77,7 +77,7 @@ static const char *cmd_spoolss_get_short_archi(const char *long_archi)
 {
         int i=-1;
 
-        DEBUG(107,("Getting architecture dependant directory\n"));
+        DEBUG(107,("Getting architecture dependent directory\n"));
         do {
                 i++;
         } while ( (archi_table[i].long_archi!=NULL ) &&
@@ -1722,7 +1722,7 @@ static WERROR cmd_spoolss_addprinterdriver(struct rpc_pipe_client *cli,
 
 	arch = cmd_spoolss_get_short_archi(argv[1]);
 	if (!arch) {
-		printf ("Error Unknown architechture [%s]\n", argv[1]);
+		printf ("Error Unknown architecture [%s]\n", argv[1]);
 		return WERR_INVALID_PARAM;
 	}
 
diff --git a/source3/rpcclient/rpcclient.c b/source3/rpcclient/rpcclient.c
index 119b9b7..4693b1d 100644
--- a/source3/rpcclient/rpcclient.c
+++ b/source3/rpcclient/rpcclient.c
@@ -586,7 +586,7 @@ static struct cmd_set rpcclient_commands[] = {
 	{ "seal", RPC_RTYPE_NTSTATUS, cmd_seal, NULL,	  NULL,	NULL, "Force RPC pipe connections to be sealed", "" },
 	{ "schannel", RPC_RTYPE_NTSTATUS, cmd_schannel, NULL,	  NULL, NULL,	"Force RPC pipe connections to be sealed with 'schannel'.  Assumes valid machine account to this domain controller.", "" },
 	{ "schannelsign", RPC_RTYPE_NTSTATUS, cmd_schannel_sign, NULL,	  NULL, NULL, "Force RPC pipe connections to be signed (not sealed) with 'schannel'.  Assumes valid machine account to this domain controller.", "" },
-	{ "timeout", RPC_RTYPE_NTSTATUS, cmd_timeout, NULL,	  NULL, NULL, "Set timeout (in milliseonds) for RPC operations", "" },
+	{ "timeout", RPC_RTYPE_NTSTATUS, cmd_timeout, NULL,	  NULL, NULL, "Set timeout (in milliseconds) for RPC operations", "" },
 	{ "transport", RPC_RTYPE_NTSTATUS, cmd_choose_transport, NULL,	  NULL, NULL, "Choose ncacn transport for RPC operations", "" },
 	{ "none", RPC_RTYPE_NTSTATUS, cmd_none, NULL,	  NULL, NULL, "Force RPC pipe connections to have no special properties", "" },
 
diff --git a/source3/utils/net_ads.c b/source3/utils/net_ads.c
index 4523804..3ee47b3 100644
--- a/source3/utils/net_ads.c
+++ b/source3/utils/net_ads.c
@@ -1830,7 +1830,7 @@ static int net_ads_printer_publish(struct net_context *c, int argc, const char *
 					Undefined);
 
 	if (NT_STATUS_IS_ERR(nt_status)) {
-		d_fprintf(stderr, _("Unable to open a connnection to %s to "
+		d_fprintf(stderr, _("Unable to open a connection to %s to "
 			            "obtain data for %s\n"),
 			  servername, printername);
 		ads_destroy(&ads);
@@ -1879,7 +1879,7 @@ static int net_ads_printer_publish(struct net_context *c, int argc, const char *
 
 	nt_status = cli_rpc_pipe_open_noauth(cli, &ndr_table_spoolss.syntax_id, &pipe_hnd);
 	if (!NT_STATUS_IS_OK(nt_status)) {
-		d_fprintf(stderr, _("Unable to open a connnection to the spoolss pipe on %s\n"),
+		d_fprintf(stderr, _("Unable to open a connection to the spoolss pipe on %s\n"),
 			 servername);
 		SAFE_FREE(prt_dn);
 		ads_destroy(&ads);
diff --git a/source3/utils/net_rpc_printer.c b/source3/utils/net_rpc_printer.c
index 0375490..6de0d40 100644
--- a/source3/utils/net_rpc_printer.c
+++ b/source3/utils/net_rpc_printer.c
@@ -1333,7 +1333,7 @@ static NTSTATUS rpc_printer_publish_internals_args(struct rpc_pipe_client *pipe_
 			break;
 		default:
 			action_str = N_("unknown action");
-			printf(_("unkown action: %d\n"), action);
+			printf(_("unknown action: %d\n"), action);
 			break;
 		}
 
@@ -1498,7 +1498,7 @@ NTSTATUS rpc_printer_publish_list_internals(struct net_context *c,
 				       sharename);
 				break;
 			default:
-				printf(_("unkown state: %d\n"), state);
+				printf(_("unknown state: %d\n"), state);
 				break;
 		}
 	}
diff --git a/source4/auth/credentials/credentials_krb5.c b/source4/auth/credentials/credentials_krb5.c
index 97b1814..ce0ae7e 100644
--- a/source4/auth/credentials/credentials_krb5.c
+++ b/source4/auth/credentials/credentials_krb5.c
@@ -706,7 +706,7 @@ _PUBLIC_ int cli_credentials_get_server_gss_creds(struct cli_credentials *cred,
 
 	ret = principal_from_credentials(mem_ctx, cred, smb_krb5_context, &princ, &obtained, &error_string);
 	if (ret) {
-		DEBUG(1,("cli_credentials_get_server_gss_creds: makeing krb5 principal failed (%s)\n",
+		DEBUG(1,("cli_credentials_get_server_gss_creds: making krb5 principal failed (%s)\n",
 			 error_string));
 		talloc_free(mem_ctx);
 		return ret;
diff --git a/source4/cldap_server/netlogon.c b/source4/cldap_server/netlogon.c
index baac3c8..6e455e4 100644
--- a/source4/cldap_server/netlogon.c
+++ b/source4/cldap_server/netlogon.c
@@ -189,7 +189,7 @@ NTSTATUS fill_netlogon_samlogon_response(struct ldb_context *sam_ctx,
 	}
 
         if (dom_res == NULL) {
-		DEBUG(2,(__location__ ": Unable to get domain informations with no inputs\n"));
+		DEBUG(2,(__location__ ": Unable to get domain information with no inputs\n"));
 		return NT_STATUS_NO_SUCH_DOMAIN;
 	}
 
diff --git a/source4/dsdb/common/util.c b/source4/dsdb/common/util.c
index 67328c6..21318cb 100644
--- a/source4/dsdb/common/util.c
+++ b/source4/dsdb/common/util.c
@@ -2021,7 +2021,7 @@ int samdb_set_password_callback(struct ldb_request *req, struct ldb_reply *ares)
  * Sets the user password using plaintext UTF16 (attribute "new_password") or
  * LM (attribute "lmNewHash") or NT (attribute "ntNewHash") hash. Also pass
  * the old LM and/or NT hash (attributes "lmOldHash"/"ntOldHash") if it is a
- * user change or not. The "rejectReason" gives some more informations if the
+ * user change or not. The "rejectReason" gives some more information if the
  * change failed.
  *
  * Results: NT_STATUS_OK, NT_STATUS_INVALID_PARAMETER, NT_STATUS_UNSUCCESSFUL,
@@ -2203,7 +2203,7 @@ NTSTATUS samdb_set_password(struct ldb_context *ldb, TALLOC_CTX *mem_ctx,
  * Sets the user password using plaintext UTF16 (attribute "new_password") or
  * LM (attribute "lmNewHash") or NT (attribute "ntNewHash") hash. Also pass
  * the old LM and/or NT hash (attributes "lmOldHash"/"ntOldHash") if it is a
- * user change or not. The "rejectReason" gives some more informations if the
+ * user change or not. The "rejectReason" gives some more information if the
  * change failed.
  *
  * This wrapper function for "samdb_set_password" takes a SID as input rather
diff --git a/source4/dsdb/samdb/ldb_modules/acl.c b/source4/dsdb/samdb/ldb_modules/acl.c
index 20f09a5..b6eb563 100644
--- a/source4/dsdb/samdb/ldb_modules/acl.c
+++ b/source4/dsdb/samdb/ldb_modules/acl.c
@@ -996,7 +996,7 @@ static int acl_modify(struct ldb_module *module, struct ldb_request *req)
 
 		/* This basic attribute existence check with the right errorcode
 		 * is needed since this module is the first one which requests
-		 * schema attribute informations.
+		 * schema attribute information.
 		 * The complete attribute checking is done in the
 		 * "objectclass_attrs" module behind this one.
 		 */
diff --git a/source4/dsdb/samdb/ldb_modules/objectclass.c b/source4/dsdb/samdb/ldb_modules/objectclass.c
index 39f456d..f48917c 100644
--- a/source4/dsdb/samdb/ldb_modules/objectclass.c
+++ b/source4/dsdb/samdb/ldb_modules/objectclass.c
@@ -903,7 +903,7 @@ static int oc_modify_callback(struct ldb_request *req, struct ldb_reply *ares)
 	talloc_free(ares);
 
 	/* this looks up the real existing object for fetching some important
-	 * informations (objectclasses) */
+	 * information (objectclasses) */
 	ret = ldb_build_search_req(&search_req, ldb,
 				   ac, ac->req->op.mod.message->dn,
 				   LDB_SCOPE_BASE,
@@ -1220,7 +1220,7 @@ static int objectclass_rename(struct ldb_module *module, struct ldb_request *req
 	}
 
 	/* this looks up the parent object for fetching some important
-	 * informations (objectclasses, DN normalisation...) */
+	 * information (objectclasses, DN normalisation...) */
 	ret = ldb_build_search_req(&search_req, ldb,
 				   ac, parent_dn, LDB_SCOPE_BASE,
 				   "(objectClass=*)",
@@ -1272,7 +1272,7 @@ static int objectclass_do_rename(struct oc_context *ac)
 	ac->search_res = NULL;
 
 	/* this looks up the real existing object for fetching some important
-	 * informations (objectclasses) */
+	 * information (objectclasses) */
 	ret = ldb_build_search_req(&search_req, ldb,
 				   ac, ac->req->op.rename.olddn,
 				   LDB_SCOPE_BASE,
@@ -1451,7 +1451,7 @@ static int objectclass_delete(struct ldb_module *module, struct ldb_request *req
 	}
 
 	/* this looks up the entry object for fetching some important
-	 * informations (object classes, system flags...) */
+	 * information (object classes, system flags...) */
 	ret = ldb_build_search_req(&search_req, ldb,
 				   ac, req->op.del.dn, LDB_SCOPE_BASE,
 				   "(objectClass=*)",
diff --git a/source4/dsdb/samdb/ldb_modules/objectclass_attrs.c b/source4/dsdb/samdb/ldb_modules/objectclass_attrs.c
index e0efd4c..8f6cc66 100644
--- a/source4/dsdb/samdb/ldb_modules/objectclass_attrs.c
+++ b/source4/dsdb/samdb/ldb_modules/objectclass_attrs.c
@@ -299,7 +299,7 @@ static int attr_handler2(struct oc_context *ac)
 		}
 
 		/* We can use "str_list_check" with "strcmp" here since the
-		 * attribute informations from the schema are always equal
+		 * attribute information from the schema are always equal
 		 * up-down-cased. */
 		found = str_list_check(must_contain, attr->lDAPDisplayName);
 		if (found) {
diff --git a/source4/dsdb/samdb/ldb_modules/samldb.c b/source4/dsdb/samdb/ldb_modules/samldb.c
index b11fc55..d9b4a49 100644
--- a/source4/dsdb/samdb/ldb_modules/samldb.c
+++ b/source4/dsdb/samdb/ldb_modules/samldb.c
@@ -556,7 +556,7 @@ static int samldb_fill_object(struct samldb_ctx *ac)
 	struct ldb_context *ldb = ldb_module_get_ctx(ac->module);
 	int ret;
 
-	/* Add informations for the different account types */
+	/* Add information for the different account types */
 	if (strcmp(ac->type, "user") == 0) {
 		struct ldb_control *rodc_control = ldb_request_get_control(ac->req,
 									   LDB_CONTROL_RODC_DCPROMO_OID);
@@ -1074,7 +1074,7 @@ static int samldb_prim_group_change(struct samldb_ctx *ac)
 		return LDB_SUCCESS;
 	}
 
-	/* Fetch informations from the existing object */
+	/* Fetch information from the existing object */
 
 	ret = dsdb_module_search(ac->module, ac, &res, ac->msg->dn, LDB_SCOPE_BASE, attrs,
 				 DSDB_FLAG_NEXT_MODULE, ac->req, NULL);
@@ -1467,7 +1467,7 @@ static int samldb_member_check(struct samldb_ctx *ac)
 	int cnt;
 	int ret;
 
-	/* Fetch informations from the existing object */
+	/* Fetch information from the existing object */
 
 	ret = dsdb_module_search(ac->module, ac, &res, ac->msg->dn, LDB_SCOPE_BASE, attrs,
 				 DSDB_FLAG_NEXT_MODULE, ac->req, NULL);
@@ -1581,7 +1581,7 @@ static int samldb_description_check(struct samldb_ctx *ac, bool *modified)
 	unsigned int i;
 	int ret;
 
-	/* Fetch informations from the existing object */
+	/* Fetch information from the existing object */
 	ret = dsdb_module_search(ac->module, ac, &res, ac->msg->dn, LDB_SCOPE_BASE, attrs,
 				 DSDB_FLAG_NEXT_MODULE | DSDB_SEARCH_SHOW_DELETED, ac->req,
 				 "(|(objectclass=user)(objectclass=group)(objectclass=samDomain)(objectclass=samServer))");
@@ -1717,7 +1717,7 @@ static int samldb_service_principal_names_change(struct samldb_ctx *ac)
 	}
 
 	if ((dns_hostname == NULL) && (sam_accountname == NULL)) {
-		/* Well, there are informations missing (old name(s)) or the
+		/* Well, there are information missing (old name(s)) or the
 		 * names didn't change. We've nothing to do and can exit here */
 		return LDB_SUCCESS;
 	}
diff --git a/source4/rpc_server/netlogon/dcerpc_netlogon.c b/source4/rpc_server/netlogon/dcerpc_netlogon.c
index 4d5382f..3e0000c 100644
--- a/source4/rpc_server/netlogon/dcerpc_netlogon.c
+++ b/source4/rpc_server/netlogon/dcerpc_netlogon.c
@@ -1470,7 +1470,7 @@ static NTSTATUS dcesrv_netr_LogonGetDomainInfo(struct dcesrv_call_state *dce_cal
 			update_dns_hostname = false;
 		}
 
-		/* Gets host informations and put them into our directory */
+		/* Gets host information and put them into our directory */
 
 		new_msg = ldb_msg_new(mem_ctx);
 		NT_STATUS_HAVE_NO_MEMORY(new_msg);
@@ -1486,7 +1486,7 @@ static NTSTATUS dcesrv_netr_LogonGetDomainInfo(struct dcesrv_call_state *dce_cal
 		}
 
 		/*
-		 * Sets informations from "os_version". On an empty structure
+		 * Sets information from "os_version". On an empty structure
 		 * the values are cleared.
 		 */
 		if (r->in.query->workstation_info->os_version.os != NULL) {
@@ -1620,7 +1620,7 @@ static NTSTATUS dcesrv_netr_LogonGetDomainInfo(struct dcesrv_call_state *dce_cal
 			"msDS-SupportedEncryptionTypes",
 			default_supported_enc_types);
 
-		/* Other host domain informations */
+		/* Other host domain information */
 
 		lsa_policy_info = talloc(mem_ctx,
 			struct netr_LsaPolicyInformation);
diff --git a/source4/torture/ldap/basic.c b/source4/torture/ldap/basic.c
index 1efdc06..8a9a57f 100644
--- a/source4/torture/ldap/basic.c
+++ b/source4/torture/ldap/basic.c
@@ -63,7 +63,7 @@ static bool test_multibind(struct ldap_connection *conn, const char *userdn, con
 {
 	bool ret = true;
 
-	printf("Testing multiple binds on a single connnection as anonymous and user\n");
+	printf("Testing multiple binds on a single connection as anonymous and user\n");
 
 	ret = test_bind_simple(conn, NULL, NULL);
 	if (!ret) {
diff --git a/source4/torture/rpc/forest_trust.c b/source4/torture/rpc/forest_trust.c
index 2abb489..3ef3f1d 100644
--- a/source4/torture/rpc/forest_trust.c
+++ b/source4/torture/rpc/forest_trust.c
@@ -156,7 +156,7 @@ static bool test_create_trust_and_set_info(struct dcerpc_pipe *p,
 		} else {
 			if (strcmp(info->info_ex.netbios_name.string, trustinfo.netbios_name.string) != 0) {
 				torture_comment(tctx,
-						"QueryTrustedDomainInfo returned inconsistant short name: %s != %s\n",
+						"QueryTrustedDomainInfo returned inconsistent short name: %s != %s\n",
 						info->info_ex.netbios_name.string,
 						trustinfo.netbios_name.string);
 				ret = false;
diff --git a/source4/torture/rpc/lsa.c b/source4/torture/rpc/lsa.c
index 7bfd80f..aee0264 100644
--- a/source4/torture/rpc/lsa.c
+++ b/source4/torture/rpc/lsa.c
@@ -2353,7 +2353,7 @@ static bool test_CreateTrustedDomain(struct dcerpc_binding_handle *b,
 				ret = false;
 			} else {
 				if (strcmp(info->info_ex.netbios_name.string, trustinfo.name.string) != 0) {
-					torture_comment(tctx, "QueryTrustedDomainInfo returned inconsistant short name: %s != %s\n",
+					torture_comment(tctx, "QueryTrustedDomainInfo returned inconsistent short name: %s != %s\n",
 					       info->info_ex.netbios_name.string, trustinfo.name.string);
 					ret = false;
 				}
@@ -2509,7 +2509,7 @@ static bool test_CreateTrustedDomainEx2(struct dcerpc_pipe *p,
 				ret = false;
 			} else {
 				if (strcmp(info->info_ex.netbios_name.string, trustinfo.netbios_name.string) != 0) {
-					torture_comment(tctx, "QueryTrustedDomainInfo returned inconsistant short name: %s != %s\n",
+					torture_comment(tctx, "QueryTrustedDomainInfo returned inconsistent short name: %s != %s\n",
 					       info->info_ex.netbios_name.string, trustinfo.netbios_name.string);
 					ret = false;
 				}
diff --git a/source4/torture/rpc/netlogon.c b/source4/torture/rpc/netlogon.c
index e05fe9b..70e1fd9 100644
--- a/source4/torture/rpc/netlogon.c
+++ b/source4/torture/rpc/netlogon.c
@@ -590,7 +590,7 @@ static bool test_SetPassword2(struct torture_context *tctx,
 	new_password.length = IVAL(password_buf.data, 512);
 
 	torture_comment(tctx, 
-		"Testing a third ServerPasswordSet2 on machine account, with a compleatly random password\n");
+		"Testing a third ServerPasswordSet2 on machine account, with a completely random password\n");
 
 	netlogon_creds_client_authenticator(creds, &credential);
 
diff --git a/source4/torture/winbind/struct_based.c b/source4/torture/winbind/struct_based.c
index cb35315..e15c3b5 100644
--- a/source4/torture/winbind/struct_based.c
+++ b/source4/torture/winbind/struct_based.c
@@ -782,7 +782,7 @@ static bool torture_winbind_struct_show_sequence(struct torture_context *torture
 		uint32_t seq;
 
 		torture_assert(torture, s[i].netbios_name,
-			       "more domains recieved in second run");
+			       "more domains received in second run");
 		torture_assert_str_equal(torture, domlist[i].netbios_name,
 					 s[i].netbios_name,
 					 "inconsistent order of domain lists");


-- 
Samba Shared Repository


More information about the samba-cvs mailing list