]> git.ipfire.org Git - thirdparty/samba.git/commitdiff
s4:torture:rpc: Fix code spelling
authorAndreas Schneider <asn@samba.org>
Thu, 3 Aug 2023 13:45:20 +0000 (15:45 +0200)
committerAndrew Bartlett <abartlet@samba.org>
Mon, 14 Aug 2023 21:45:30 +0000 (21:45 +0000)
Signed-off-by: Andreas Schneider <asn@samba.org>
Reviewed-by: Andrew Bartlett <abartlet@samba.org>
14 files changed:
source4/torture/rpc/alter_context.c
source4/torture/rpc/backupkey.c
source4/torture/rpc/drsuapi.c
source4/torture/rpc/iremotewinspool_driver.c
source4/torture/rpc/lsa.c
source4/torture/rpc/mdssvc.c
source4/torture/rpc/netlogon.c
source4/torture/rpc/remote_pac.c
source4/torture/rpc/samba3rpc.c
source4/torture/rpc/samlogon.c
source4/torture/rpc/samr.c
source4/torture/rpc/samr_accessmask.c
source4/torture/rpc/schannel.c
source4/torture/rpc/testjoin.c

index 22abd97e2fc39777a4182d80fae94bd8a6332a05..9b697279c8581ae6f6659c7dfa532011f11dc320 100644 (file)
@@ -89,7 +89,7 @@ bool torture_rpc_alter_context(struct torture_context *torture)
                                               NT_STATUS_CONNECTION_RESET);
 
                torture_assert(torture, !dcerpc_binding_handle_is_connected(p->binding_handle),
-                              "dcerpc disonnected");
+                              "dcerpc disconnected");
 
                return ret;
        }
index 9dd6f5eb270c3024ce09fdb986093fb0e2653c0e..23572e82e57f2f9f58400e159f0518d5fe862e65 100644 (file)
@@ -54,7 +54,7 @@ enum test_wrong {
 
 /* Our very special and valued secret */
 /* No need to put const as we cast the array in uint8_t
- * we will get a warning about the discared const
+ * we will get a warning about the discarded const
  */
 static const char secret[] = "tata yoyo mais qu'est ce qu'il y a sous ton grand chapeau ?";
 
@@ -188,7 +188,7 @@ static struct dom_sid *get_user_sid(struct torture_context *tctx,
  * the version depends on the version parameter
  * the structure is returned as a blob.
  * The broken flag is to indicate if we want
- * to create a non conform to specification structre
+ * to create a non conform to specification structure
  */
 static DATA_BLOB *create_unencryptedsecret(TALLOC_CTX *mem_ctx,
                                           bool broken,
@@ -216,7 +216,7 @@ static DATA_BLOB *create_unencryptedsecret(TALLOC_CTX *mem_ctx,
                if (broken) {
                        /* The magic value is correctly set by the NDR push
                         * but we want to test the behavior of the server
-                        * if a differrent value is provided
+                        * if a different value is provided
                         */
                        ((uint8_t*)blob->data)[4] = 79; /* A great year !!! */
                }
@@ -241,7 +241,7 @@ static DATA_BLOB *create_unencryptedsecret(TALLOC_CTX *mem_ctx,
                        /*
                         * The magic value is correctly set by the NDR push
                         * but we want to test the behavior of the server
-                        * if a differrent value is provided
+                        * if a different value is provided
                         */
                        ((uint8_t*)blob->data)[4] = 79; /* A great year !!! */
                }
@@ -252,7 +252,7 @@ static DATA_BLOB *create_unencryptedsecret(TALLOC_CTX *mem_ctx,
 
 /*
  * Create an access check structure, the format depends on the version parameter.
- * If broken is specified then we create a stucture that isn't conform to the
+ * If broken is specified then we create a structure that isn't conform to the
  * specification.
  *
  * If the structure can't be created then NULL is returned.
index d3e18ca246bb7f5ed1602d9a6b226aa2eec2eaf7..4c7e2fc39df8603ffc51eefa095a78d050e123a4 100644 (file)
@@ -690,7 +690,7 @@ bool test_QuerySitesByCost(struct torture_context *tctx,
                                         "dcerpc_drsuapi_QuerySitesByCost");
                torture_assert_int_equal(tctx,
                                         r.out.ctr->ctr1.info[1].site_cost, -1,
-                                        "dcerpc_drsuapi_QuerySitesByCost exptected site cost");
+                                        "dcerpc_drsuapi_QuerySitesByCost expected site cost");
        }
 
        return true;
index f88b13a060b6142c0b74f7c892188545ff24995b..4e558ef742c4f5f5adeda66087cd27912b8de38b 100644 (file)
@@ -672,7 +672,7 @@ static bool test_CopyDriverFiles(struct torture_context *tctx,
        status = smbcli_mkdir(ctx->dinfo->cli->tree, ctx->dinfo->print_upload_guid_dir);
        torture_assert_ntstatus_ok_goto(tctx, status, ok, done, "Failed to create upload directory");
 
-       /* Walk the provided torture option driver_path file tree, creating the directory heirarchy and
+       /* Walk the provided torture option driver_path file tree, creating the directory hierarchy and
         * copying all files to print$/{GUID}/ share */
        ret = tftw(tctx, ctx->dinfo->local_driver_path, copy_driver_files, TFTW_MAX_DEPTH, ctx->dinfo);
        torture_assert_int_equal_goto(tctx, ret, 0, ok, done, "Failed to copy driver files to print$/{GUID}/ dir");
index d22546862d5ba3c25aee261ce1658e6be89726c9..3deb75bb94d355943520763265da6353de562675 100644 (file)
@@ -3636,7 +3636,7 @@ static bool check_pw_with_krb5(struct torture_context *tctx,
                torture_assert_int_not_equal(tctx, t_kvno, 0, assertion_message);
        } else {
                assertion_message = talloc_asprintf(ctx,
-                               "krbtgt_referral_ticket(%s) kvno(NULL) exptected(%u) current(%u)",
+                               "krbtgt_referral_ticket(%s) kvno(NULL) expected(%u) current(%u)",
                                krbtgt_trust_realm_string,
                                (unsigned)expected_kvno,(unsigned)kvno);
                torture_comment(tctx, "%s\n", assertion_message);
index 213ff32ba62abdd76049152df43f22366575672a..2096ed7b9c753a35e3ab0e9e5c098d6d62710cc9 100644 (file)
@@ -1,6 +1,6 @@
 /*
    Unix SMB/CIFS implementation.
-   test suite for the mdssvc RPC serice
+   test suite for the mdssvc RPC service
 
    Copyright (C) Ralph Boehme 2019
 
index a3d190f13dd831d386bcc8113e1843913f40f23e..dbfca5fe1c8fe177ec6bf3952832c878b9c23716 100644 (file)
@@ -2292,7 +2292,7 @@ static bool test_ServerReqChallengeGlobal(struct torture_context *tctx,
 
 /*
  * Test the re-use of the challenge is not possible on a third
- * connection, after first useing it second one.
+ * connection, after first using it second one.
  */
 
 static bool test_ServerReqChallengeReuseGlobal(struct torture_context *tctx,
index edf98a27d118a01a2309e94a431ffa0265148219..8f4ee2bbc445be430206611d885f327f2559c530 100644 (file)
@@ -147,7 +147,7 @@ static const struct PAC_BUFFER *get_pac_buffer(const struct PAC_DATA *pac_data,
        return pac_buf;
 }
 
-/* Also happens to be a really good one-step verfication of our Kerberos stack */
+/* Also happens to be a really good one-step verification of our Kerberos stack */
 
 static bool netlogon_validate_pac(struct torture_context *tctx,
                                  struct dcerpc_pipe *p1,
@@ -1099,7 +1099,7 @@ static bool test_S4U2Self(struct torture_context *tctx,
                torture_assert_u32_equal(tctx, netlogon_user_info_dc->sids[i].attrs, s4u2self_session_info->torture->dc_sids[k].attrs, "Different domain group attrs for S4U2Self");
                torture_assert(tctx, !dom_sid_in_domain(builtin_domain, &s4u2self_session_info->torture->dc_sids[k].sid), "Returned BUILTIN domain in groups for S4U2Self");
                torture_assert(tctx, !dom_sid_in_domain(builtin_domain, &kinit_session_info->torture->dc_sids[j].sid), "Returned BUILTIN domain in groups kinit-based PAC");
-               torture_assert(tctx, !dom_sid_in_domain(builtin_domain, &netlogon_user_info_dc->sids[i].sid), "Returned BUILTIN domian in groups from NETLOGON SamLogon reply");
+               torture_assert(tctx, !dom_sid_in_domain(builtin_domain, &netlogon_user_info_dc->sids[i].sid), "Returned BUILTIN domain in groups from NETLOGON SamLogon reply");
        }
 
        return true;
index 36eabdc488d9e7078ee52bcf978c662a366892a9..10f0fccde73f401c0e42580a4912bab34bacfa21 100644 (file)
@@ -282,7 +282,7 @@ bool torture_bind_authcontext(struct torture_context *torture)
        torture_assert(torture, smbXcli_conn_is_connected(cli->transport->conn),
                       "smb still connected");
        torture_assert(torture, !dcerpc_binding_handle_is_connected(lsa_handle),
-                      "dcerpc disonnected");
+                      "dcerpc disconnected");
 
        if (NT_STATUS_EQUAL(status, NT_STATUS_INVALID_HANDLE)) {
                torture_comment(torture, "dcerpc_lsa_OpenPolicy2 with wrong vuid gave %s, "
index 00a87baee99d917bb7c9cfdae3814852f669bc7f..fa07c65eefc3d80baa008a977f7893cc63cecee5 100644 (file)
@@ -1116,7 +1116,7 @@ static bool test_lmv2_ntlm_break_lm_no_dom(struct samlogon_state *samlogon_state
 }
 
 /*
- * Test the NTLM2 response (extra challenge in LM feild)
+ * Test the NTLM2 response (extra challenge in LM field)
  *
  * This test is the same as the 'break LM' test, but checks that the
  * server implements NTLM2 session security in the right place
@@ -1838,7 +1838,7 @@ bool torture_rpc_samlogon(struct torture_context *torture)
                                     creds = cli_credentials_get_netlogon_creds(machine_credentials),
                                     ret,
                                     failed,
-                                    "obtaining credentails");
+                                    "obtaining credentials");
 
        {
 
index a303c87fd7788fedb4214277b9fa812e6d636b62..22e0606de96e780a7a6c4a2d289846a84ebc7a7b 100644 (file)
@@ -2975,7 +2975,7 @@ bool test_ChangePasswordUser3(struct dcerpc_pipe *p, struct torture_context *tct
                        }
                }
 
-               /* We tested the order of precendence which is as follows:
+               /* We tested the order of precedence which is as follows:
 
                * pwd min_age
                * pwd length
@@ -5742,7 +5742,7 @@ static bool test_user_ops(struct dcerpc_pipe *p,
                                ret = false;
                        }
 
-                       /* Try a compleatly random password */
+                       /* Try a completely random password */
                        if (!test_ChangePasswordRandomBytes(p, tctx, base_acct_name, user_handle, &password)) {
                                ret = false;
                        }
index 0d4c69b9b7f434b2d85c41ef2344244ebbc0fa8e..07b8d44f6c24aaee7f2c723b968dd488f7936411 100644 (file)
@@ -326,12 +326,12 @@ static bool test_samr_connect_user_acl(struct torture_context *tctx,
                printf("Connect5 failed - %s\n", nt_errstr(status));
                return false;
        }
-       /* disconnec the user */
+       /* disconnect the user */
        talloc_free(test_p);
 
 
        /* read the sequrity descriptor back. it should not have changed
-        * eventhough samr_SetSecurity returned SUCCESS
+        * even though samr_SetSecurity returned SUCCESS
         */
        torture_assert_ntstatus_ok(tctx, dcerpc_samr_QuerySecurity_r(b, tctx, &qs),
                "QuerySecurity failed");
@@ -359,7 +359,7 @@ static bool test_samr_connect_user_acl(struct torture_context *tctx,
 
 /*
  * test if the ACLs are enforced for users.
- * a normal testuser only gets the rights provided in hte ACL for
+ * a normal testuser only gets the rights provided in the ACL for
  * Everyone   which does not include the SAMR_ACCESS_SHUTDOWN_SERVER
  * right.  If the ACLs are checked when a user connects
  * a testuser that requests the accessmask with only this bit set
@@ -398,7 +398,7 @@ static bool test_samr_connect_user_acl_enforced(struct torture_context *tctx,
        }
        printf(" OK\n");
 
-       /* disconnec the user */
+       /* disconnect the user */
        talloc_free(test_p);
 
        return ret;
index ed94c912251a0af906c5aefd6b4ebd99ed62a5fc..d6dca3666702f39d3a6cd5ff3c576d0cc48ad7a4 100644 (file)
@@ -215,14 +215,14 @@ bool test_netlogon_ex_ops(struct dcerpc_pipe *p, struct torture_context *tctx,
                        netlogon_creds_arcfour_crypt(creds, base->LMSessKey.key, 8);
                }
 
-               DEBUG(1,("decryped keys validation_level %d\n",
+               DEBUG(1,("decrypted keys validation_level %d\n",
                        validation_levels[i]));
 
                dump_data(1, base->key.key, 16);
                dump_data(1, base->LMSessKey.key, 8);
 
                if (!can_do_validation_6) {
-                       /* we cant compare against unencrypted keys */
+                       /* we can't compare against unencrypted keys */
                        continue;
                }
 
@@ -420,14 +420,14 @@ static bool test_netlogon_ex_bug14932(struct dcerpc_pipe *p,
                        netlogon_creds_arcfour_crypt(creds, base->LMSessKey.key, 8);
                }
 
-               DEBUG(1,("decryped keys validation_level %d\n",
+               DEBUG(1,("decrypted keys validation_level %d\n",
                        validation_levels[i]));
 
                dump_data(1, base->key.key, 16);
                dump_data(1, base->LMSessKey.key, 8);
 
                if (!can_do_validation_6) {
-                       /* we cant compare against unencrypted keys */
+                       /* we can't compare against unencrypted keys */
                        continue;
                }
 
index 0a3c96f55ea8382b1ca87eb6da614c8d32a03ffd..6fb5f8627a1234d4904f42821a09fc28afbc2b1a 100644 (file)
@@ -637,7 +637,7 @@ _PUBLIC_ struct test_join *torture_join_domain(struct torture_context *tctx,
                cli_credentials_set_secure_channel_type(*machine_credentials,
                                                        SEC_CHAN_WKSTA);
        } else {
-               DEBUG(0, ("Invalid account type specificed to torture_join_domain\n"));
+               DEBUG(0, ("Invalid account type specified to torture_join_domain\n"));
                talloc_free(*machine_credentials);
                return NULL;
        }