NT_STATUS_CONNECTION_RESET);
torture_assert(torture, !dcerpc_binding_handle_is_connected(p->binding_handle),
- "dcerpc disonnected");
+ "dcerpc disconnected");
return ret;
}
/* Our very special and valued secret */
/* No need to put const as we cast the array in uint8_t
- * we will get a warning about the discared const
+ * we will get a warning about the discarded const
*/
static const char secret[] = "tata yoyo mais qu'est ce qu'il y a sous ton grand chapeau ?";
* the version depends on the version parameter
* the structure is returned as a blob.
* The broken flag is to indicate if we want
- * to create a non conform to specification structre
+ * to create a non conform to specification structure
*/
static DATA_BLOB *create_unencryptedsecret(TALLOC_CTX *mem_ctx,
bool broken,
if (broken) {
/* The magic value is correctly set by the NDR push
* but we want to test the behavior of the server
- * if a differrent value is provided
+ * if a different value is provided
*/
((uint8_t*)blob->data)[4] = 79; /* A great year !!! */
}
/*
* The magic value is correctly set by the NDR push
* but we want to test the behavior of the server
- * if a differrent value is provided
+ * if a different value is provided
*/
((uint8_t*)blob->data)[4] = 79; /* A great year !!! */
}
/*
* Create an access check structure, the format depends on the version parameter.
- * If broken is specified then we create a stucture that isn't conform to the
+ * If broken is specified then we create a structure that isn't conform to the
* specification.
*
* If the structure can't be created then NULL is returned.
"dcerpc_drsuapi_QuerySitesByCost");
torture_assert_int_equal(tctx,
r.out.ctr->ctr1.info[1].site_cost, -1,
- "dcerpc_drsuapi_QuerySitesByCost exptected site cost");
+ "dcerpc_drsuapi_QuerySitesByCost expected site cost");
}
return true;
status = smbcli_mkdir(ctx->dinfo->cli->tree, ctx->dinfo->print_upload_guid_dir);
torture_assert_ntstatus_ok_goto(tctx, status, ok, done, "Failed to create upload directory");
- /* Walk the provided torture option driver_path file tree, creating the directory heirarchy and
+ /* Walk the provided torture option driver_path file tree, creating the directory hierarchy and
* copying all files to print$/{GUID}/ share */
ret = tftw(tctx, ctx->dinfo->local_driver_path, copy_driver_files, TFTW_MAX_DEPTH, ctx->dinfo);
torture_assert_int_equal_goto(tctx, ret, 0, ok, done, "Failed to copy driver files to print$/{GUID}/ dir");
torture_assert_int_not_equal(tctx, t_kvno, 0, assertion_message);
} else {
assertion_message = talloc_asprintf(ctx,
- "krbtgt_referral_ticket(%s) kvno(NULL) exptected(%u) current(%u)",
+ "krbtgt_referral_ticket(%s) kvno(NULL) expected(%u) current(%u)",
krbtgt_trust_realm_string,
(unsigned)expected_kvno,(unsigned)kvno);
torture_comment(tctx, "%s\n", assertion_message);
/*
Unix SMB/CIFS implementation.
- test suite for the mdssvc RPC serice
+ test suite for the mdssvc RPC service
Copyright (C) Ralph Boehme 2019
/*
* Test the re-use of the challenge is not possible on a third
- * connection, after first useing it second one.
+ * connection, after first using it second one.
*/
static bool test_ServerReqChallengeReuseGlobal(struct torture_context *tctx,
return pac_buf;
}
-/* Also happens to be a really good one-step verfication of our Kerberos stack */
+/* Also happens to be a really good one-step verification of our Kerberos stack */
static bool netlogon_validate_pac(struct torture_context *tctx,
struct dcerpc_pipe *p1,
torture_assert_u32_equal(tctx, netlogon_user_info_dc->sids[i].attrs, s4u2self_session_info->torture->dc_sids[k].attrs, "Different domain group attrs for S4U2Self");
torture_assert(tctx, !dom_sid_in_domain(builtin_domain, &s4u2self_session_info->torture->dc_sids[k].sid), "Returned BUILTIN domain in groups for S4U2Self");
torture_assert(tctx, !dom_sid_in_domain(builtin_domain, &kinit_session_info->torture->dc_sids[j].sid), "Returned BUILTIN domain in groups kinit-based PAC");
- torture_assert(tctx, !dom_sid_in_domain(builtin_domain, &netlogon_user_info_dc->sids[i].sid), "Returned BUILTIN domian in groups from NETLOGON SamLogon reply");
+ torture_assert(tctx, !dom_sid_in_domain(builtin_domain, &netlogon_user_info_dc->sids[i].sid), "Returned BUILTIN domain in groups from NETLOGON SamLogon reply");
}
return true;
torture_assert(torture, smbXcli_conn_is_connected(cli->transport->conn),
"smb still connected");
torture_assert(torture, !dcerpc_binding_handle_is_connected(lsa_handle),
- "dcerpc disonnected");
+ "dcerpc disconnected");
if (NT_STATUS_EQUAL(status, NT_STATUS_INVALID_HANDLE)) {
torture_comment(torture, "dcerpc_lsa_OpenPolicy2 with wrong vuid gave %s, "
}
/*
- * Test the NTLM2 response (extra challenge in LM feild)
+ * Test the NTLM2 response (extra challenge in LM field)
*
* This test is the same as the 'break LM' test, but checks that the
* server implements NTLM2 session security in the right place
creds = cli_credentials_get_netlogon_creds(machine_credentials),
ret,
failed,
- "obtaining credentails");
+ "obtaining credentials");
{
}
}
- /* We tested the order of precendence which is as follows:
+ /* We tested the order of precedence which is as follows:
* pwd min_age
* pwd length
ret = false;
}
- /* Try a compleatly random password */
+ /* Try a completely random password */
if (!test_ChangePasswordRandomBytes(p, tctx, base_acct_name, user_handle, &password)) {
ret = false;
}
printf("Connect5 failed - %s\n", nt_errstr(status));
return false;
}
- /* disconnec the user */
+ /* disconnect the user */
talloc_free(test_p);
/* read the sequrity descriptor back. it should not have changed
- * eventhough samr_SetSecurity returned SUCCESS
+ * even though samr_SetSecurity returned SUCCESS
*/
torture_assert_ntstatus_ok(tctx, dcerpc_samr_QuerySecurity_r(b, tctx, &qs),
"QuerySecurity failed");
/*
* test if the ACLs are enforced for users.
- * a normal testuser only gets the rights provided in hte ACL for
+ * a normal testuser only gets the rights provided in the ACL for
* Everyone which does not include the SAMR_ACCESS_SHUTDOWN_SERVER
* right. If the ACLs are checked when a user connects
* a testuser that requests the accessmask with only this bit set
}
printf(" OK\n");
- /* disconnec the user */
+ /* disconnect the user */
talloc_free(test_p);
return ret;
netlogon_creds_arcfour_crypt(creds, base->LMSessKey.key, 8);
}
- DEBUG(1,("decryped keys validation_level %d\n",
+ DEBUG(1,("decrypted keys validation_level %d\n",
validation_levels[i]));
dump_data(1, base->key.key, 16);
dump_data(1, base->LMSessKey.key, 8);
if (!can_do_validation_6) {
- /* we cant compare against unencrypted keys */
+ /* we can't compare against unencrypted keys */
continue;
}
netlogon_creds_arcfour_crypt(creds, base->LMSessKey.key, 8);
}
- DEBUG(1,("decryped keys validation_level %d\n",
+ DEBUG(1,("decrypted keys validation_level %d\n",
validation_levels[i]));
dump_data(1, base->key.key, 16);
dump_data(1, base->LMSessKey.key, 8);
if (!can_do_validation_6) {
- /* we cant compare against unencrypted keys */
+ /* we can't compare against unencrypted keys */
continue;
}
cli_credentials_set_secure_channel_type(*machine_credentials,
SEC_CHAN_WKSTA);
} else {
- DEBUG(0, ("Invalid account type specificed to torture_join_domain\n"));
+ DEBUG(0, ("Invalid account type specified to torture_join_domain\n"));
talloc_free(*machine_credentials);
return NULL;
}