/*
* set a password with DCERPC/SAMR calls
* 1. connect to the SAMR pipe of users domain PDC (maybe a standalone server or workstation)
- * is it correct to contact the the pdc of the domain of the user who's password should be set?
+ * is it correct to contact the pdc of the domain of the user who's password should be set?
* 2. do a samr_Connect to get a policy handle
* 3. do a samr_LookupDomain to get the domain sid
* 4. do a samr_OpenDomain to get a domain handle
* This could happen for a one-way linked attribute, if the
* target is deleted and then later expunged (thus, the source
* object can be left with a hanging link). Continue to send
- * the the link (the client-side has already tried once with
+ * the link (the client-side has already tried once with
* GET_TGT, so it should just end up ignoring it).
*/
if (ret == LDB_ERR_NO_SUCH_OBJECT) {
(level, ctr) = self.rodc_drs.DsGetNCChanges(self.rodc_drs_handle, 8, req8)
# Get the next replication chunk, but set REPL_SECRET this time. This
- # is following on the the previous accepted request, but we've changed
+ # is following on the previous accepted request, but we've changed
# exop to now request secrets. This request should fail
try:
req8 = self._exop_req8(dest_dsa=str(self.rodc_ctx.ntds_guid),
sid->IdentifierAuthority.Value[1] = 0;
sid->IdentifierAuthority.Value[0] = 0;
- /* now read the the subauthorities */
+ /* now read the subauthorities */
p = q +1;
sid->SubAuthorityCount = 0;