gid = atoi(argv[3]);
fd = atoi(argv[1]);
if (fd < 0 || fd >= 1024) {
- printf("fchown: faliure=%d (file descriptor out of range)\n", EBADF);
+ printf("fchown: failure=%d (file descriptor out of range)\n", EBADF);
return NT_STATUS_OK;
}
if (vfs->files[fd] == NULL) {
correct = False;
}
- printf("finshed denytest1\n");
+ printf("finished denytest1\n");
return correct;
}
correct = False;
}
- printf("finshed denytest2\n");
+ printf("finished denytest2\n");
return correct;
}
if (!dom_sid_equal(info3_sam->base.domain_sid, info3_auth->base.domain_sid)) {
struct dom_sid_buf buf1, buf2;
- DEBUG(0, ("domain_sid in SAM info3 %s does not match domain_sid in AUTH info3 %s\n",
+ DEBUG(0, ("domain_sid in SAM info3 %s does not match domain_sid in AUTH info3 %s\n",
dom_sid_str_buf(info3_sam->base.domain_sid, &buf1),
dom_sid_str_buf(info3_auth->base.domain_sid,
&buf2)));
return False;
}
-
- /* TODO:
- * Compre more details from the two info3 structures,
+
+ /* TODO:
+ * Compare more details from the two info3 structures,
* then test that an expired/disabled/pwdmustchange account
* returns the correct errors
*/
goto done;
}
- /* Tell the parent we are ready to receive mesages. */
+ /* Tell the parent we are ready to receive messages. */
bytes = write(ready_fd, &c, 1);
if (bytes != 1) {
perror("child: failed to write to ready_fd");
struct security_ace *ace = &sd->dacl->aces[i];
if (ace->flags & (SEC_ACE_FLAG_OBJECT_INHERIT|
SEC_ACE_FLAG_CONTAINER_INHERIT)) {
- printf("security descritor on directory %s already "
+ printf("security descriptor on directory %s already "
"contains inheritance flags\n",
dname);
sec_desc_print(NULL, stdout, sd, true);
}
if (!got_inherit) {
- printf("security descritor on directory %s does not "
+ printf("security descriptor on directory %s does not "
"contain inheritance flags\n",
dname);
sec_desc_print(NULL, stdout, sd, true);
if (!equal) {
struct timeval_buf test_buf;
struct timeval_buf tomatch_buf;
- printf("%s: crtime missmatch "
+ printf("%s: crtime mismatch "
"%s:crtime_tomatch=%s, %s:test_crtime = %s\n",
__func__,
match_pathname,
10, /* max returned param */
NULL, /* data */
0, /* num_data */
- SMB_BUFFER_SIZE_MAX, /* max retured data */
+ SMB_BUFFER_SIZE_MAX, /* max returned data */
/* Return values from here on.. */
&recv_flags2, /* recv_flags2 */
NULL, /* rsetup */
bool match = strequal_m(finfo[i].name,
root_finfo[i].name);
if (!match) {
- printf("%s:%d Missmatch. For %s, at position %zu, "
+ printf("%s:%d Mismatch. For %s, at position %zu, "
"finfo[i].name = %s, "
"root_finfo[i].name = %s\n",
__FILE__,
}
equal = (timespec_compare(&testfile_crtime, &open_crtime) == 0);
if (!equal) {
- printf("%s:%d crtime missmatch of test file %s\n",
+ printf("%s:%d crtime mismatch of test file %s\n",
__FILE__,
__LINE__,
"\\BAD\\BAD\\openfile");
2, /* max returned param */
NULL, /* data */
0, /* num_data */
- SMB_BUFFER_SIZE_MAX, /* max retured data */
+ SMB_BUFFER_SIZE_MAX, /* max returned data */
/* Return values from here on.. */
NULL, /* recv_flags2 */
NULL, /* rsetup */
return false;
}
if (test_ino != ino_tomatch) {
- printf("%s: Inode missmatch, ino_tomatch (%s) "
+ printf("%s: Inode mismatch, ino_tomatch (%s) "
"ino=%"PRIu64" test (%s) "
"ino=%"PRIu64"\n",
__func__,
fail:
/* FIXME: This will crash if we aborted before cli2 got
- * intialized, because these functions don't handle
+ * initialized, because these functions don't handle
* uninitialized connections. */
if (fnum1 != (uint16_t)-1) cli_close(cli1, fnum1);
/*
- tries varients of chkpath
+ tries variants of chkpath
*/
bool torture_chkpath_test(int dummy)
{
}
/* Setting EA's to zero length deletes them. Test this */
- printf("Now deleting all EA's - case indepenent....\n");
+ printf("Now deleting all EA's - case independent....\n");
#if 1
cli_set_ea_path(cli, fname, "", "", 0);
correct = False;
/* Ensure if we have the "must have" bits we only see the
- * relevent entries.
+ * relevant entries.
*/
num_seen = 0;
cli_list_old(cli, "\\LISTDIR\\*", (FILE_ATTRIBUTE_DIRECTORY<<8)|FILE_ATTRIBUTE_DIRECTORY, list_fn, &num_seen);