* For internal use only
*
* This constructor is used by the library internally to create a
- * list of string from a array for c-Strings (char*)thar was
+ * list of string from an array for c-Strings (char*)that was
* returned by the C-API
*/
StringList(char** values);
return rc;
}
-// checkAcess F (ALL)
+// checkAccess F (ALL)
static int
rbac_check_access( Operation *op, SlapReply *rs )
{
return rs->sr_err;
}
-// checkAcess A loop back
+// checkAccess A loop back
static int
rbac_check_accessA( Operation *op, SlapReply *rs )
{
return rc;
}
-// checkAcess B parse
+// checkAccess B parse
static int
rbac_check_accessB( Operation *op, SlapReply *rs )
{
return rc;
}
-// checkAcess C - parse request & read session record
+// checkAccess C - parse request & read session record
static int
rbac_check_accessC( Operation *op, SlapReply *rs )
{
return rc;
}
-// checkAcess D, parse, read perm
+// checkAccess D, parse, read perm
static int
rbac_check_accessD( Operation *op, SlapReply *rs )
{
return rc;
}
-// checkAcess E everything but the audit insert
+// checkAccess E everything but the audit insert
static int
rbac_check_accessE( Operation *op, SlapReply *rs )
{
Naming context ObjectClass
============================================================
ou=people,dc=... posixAccount
- shadowAcount
+ shadowAccount
ou=group,dc=... posixGroup
ou=services,dc=... ipService
ou=protocols,dc=... ipProtocol
Naming context ObjectClass
============================================================
ou=people,dc=... posixAccount
- shadowAcount
+ shadowAccount
ou=group,dc=... posixGroup
ou=services,dc=... ipService
ou=protocols,dc=... ipProtocol
indicates which access control mechanism is in effect for
the scope of that ldapACISubEntry. The
supportedAccessControlSchemes attribute in the rootDSE
-indicates which acess control mechanisms are supported by
+indicates which access control mechanisms are supported by
the server; those mechanisms are in effect in that server's
DIT unless overridden by a mechanism defined in a
ldapACISubEntry elsewhere in that DIT.
&config_generic,
"( OLcfgBkAt:13.26 "
"NAME 'olcBkLloadIOTimeout' "
- "DESC 'I/O timeout threshold in miliseconds' "
+ "DESC 'I/O timeout threshold in milliseconds' "
"EQUALITY integerMatch "
"SYNTAX OMsInteger "
"SINGLE-VALUE )",
#
# 2) be used to generate the symdummy.c file.
#
-# 3) be used to help create slapd.exp, the binary-formated slapd export file.
+# 3) be used to help create slapd.exp, the binary-formatted slapd export file.
#
# The import library is used by dynamic modules at link time. With this
# library, dynamic modules indicate to the linker that it will resolve
rc = 0;
} else if( rc != LDAP_SUCCESS ) {
Debug( LDAP_DEBUG_TRACE,
- "<= mdb_presense_candidates: (%s) "
+ "<= mdb_presence_candidates: (%s) "
"key read failed (%d)\n",
desc->ad_cname.bv_val, rc );
goto done;
if ( slap_str2ad( "reqType", &ad_reqType, &text ) ) {
Debug( LDAP_DEBUG_ANY, "syncprov_setup_accesslog: "
"couldn't get definition for attribute reqType, "
- "is accessslog configured?\n" );
+ "is accesslog configured?\n" );
return rc;
}
}
if ( slap_str2ad( "reqResult", &ad_reqResult, &text ) ) {
Debug( LDAP_DEBUG_ANY, "syncprov_setup_accesslog: "
"couldn't get definition for attribute reqResult, "
- "is accessslog configured?\n" );
+ "is accesslog configured?\n" );
return rc;
}
}
if ( slap_str2ad( "reqDN", &ad_reqDN, &text ) ) {
Debug( LDAP_DEBUG_ANY, "syncprov_setup_accesslog: "
"couldn't get definition for attribute reqDN, "
- "is accessslog configured?\n" );
+ "is accesslog configured?\n" );
return rc;
}
}
if ( slap_str2ad( "reqEntryUUID", &ad_reqEntryUUID, &text ) ) {
Debug( LDAP_DEBUG_ANY, "syncprov_setup_accesslog: "
"couldn't get definition for attribute reqEntryUUID, "
- "is accessslog configured?\n" );
+ "is accesslog configured?\n" );
return rc;
}
}
RC=$?
if test $RC != 0 ; then
- echo "slapcat -g failed for root databse ($RC)!"
+ echo "slapcat -g failed for root database ($RC)!"
exit $RC
fi
fi
#
-# UNSUCCESFUL SEARCH
+# UNSUCCESSFUL SEARCH
#
echo "Using ldapsearch with idassert-bind..."
$LDAPSEARCH -S "" -b "$BASEDN" -D "cn=Manager,dc=local,dc=com" -H $URI2 -w "secret" \