}
/* reset the original gensec_features (on the credentials
- * context, so we don't tatoo it ) */
+ * context, so we don't tattoo it ) */
cli_credentials_set_gensec_features(creds,
old_gensec_features,
CRED_SPECIFIED);
}
/**
- create a new ldap_connection stucture. The event context is optional
+ create a new ldap_connection structure. The event context is optional
*/
_PUBLIC_ struct ldap_connection *ldap4_new_connection(TALLOC_CTX *mem_ctx,
struct ntvfs_handle;
/*
- * a generic container for file handles or file pathes
+ * a generic container for file handles or file paths
* for qfileinfo/setfileinfo and qpathinfo/setpathinfo
*/
union smb_handle_or_path {
union smb_open {
/*
* because the *.out.file structs are not aligned to the same offset for each level
- * we provide a hepler macro that should be used to find the current smb_handle structure
+ * we provide a helper macro that should be used to find the current smb_handle structure
*/
#define SMB_OPEN_OUT_FILE(op, file) do { \
switch (op->generic.level) { \
const char *fname;
/* these last 2 elements are only used in the
- NTTRANS varient of the call */
+ NTTRANS variant of the call */
struct security_descriptor *sec_desc;
struct smb_ea_list *ea_list;
- /* some optional parameters from the SMB2 varient */
+ /* some optional parameters from the SMB2 variant */
bool query_maximal_access;
bool query_on_disk_id;
uint32_t pid; /* 16 bits in SMB1 */
uint64_t offset;
uint64_t count;
- } *locks; /* unlocks are first in the arrray */
+ } *locks; /* unlocks are first in the array */
} in;
} generic, lockx;
the user to control these for torture testing */
uint16_t flags2;
- /* the spnego context if we use extented security */
+ /* the spnego context if we use extended security */
struct gensec_security *gensec;
struct smbcli_session_options {
struct smb_nttrans nttrans;
/* information on what to do with a reply when it is received
- asyncronously. If this is not setup when a reply is received then
+ asynchronously. If this is not setup when a reply is received then
the reply is discarded
The private pointer is private to the caller of the client
{
switch (level) {
case RAW_FILEINFO_BASIC_INFORMATION:
- /* some servers return 40 bytes and some 36. w2k3 return 40, so thats
+ /* some servers return 40 bytes and some 36. w2k3 return 40, so that's
what we should do, but we need to accept 36 */
if (blob->length != 36) {
FINFO_CHECK_SIZE(40);
TALLOC_CTX *mem_ctx,
union smb_fileinfo *parms)
{
- /* recv is idential to fileinfo */
+ /* recv is identical to fileinfo */
return smb_raw_fileinfo_recv(req, mem_ctx, parms);
}
/*
* Global value meaning that the smb_uid field should be
- * ingored (in share level security and protocol level == CORE)
+ * ignored (in share level security and protocol level == CORE)
*/
#define UID_FIELD_INVALID 0
if (qtype == QTYPE_AAAA && a_num == 0) {
/*
* DNS server didn't returned A when asked for AAAA records.
- * Most of the server do it, let's ask for A specificaly.
+ * Most of the server do it, let's ask for A specifically.
*/
err = dns_lookup(tmp_ctx, name, QTYPE_A, &reply);
if (ERR_DNS_IS_OK(err)) {
/*
- a varient of smb2_find_recv that parses the resulting blob into
+ a variant of smb2_find_recv that parses the resulting blob into
smb_search_data structures
*/
NTSTATUS smb2_find_level_recv(struct smb2_request *req, TALLOC_CTX *mem_ctx,
}
/*
- a varient of smb2_find that parses the resulting blob into
+ a variant of smb2_find that parses the resulting blob into
smb_search_data structures
*/
NTSTATUS smb2_find_level(struct smb2_tree *tree, TALLOC_CTX *mem_ctx,
pull a uint16_t ofs/ uint32_t length/blob triple from a data blob
the ptr points to the start of the offset/length pair
- In this varient the uint16_t is padded by an extra 2 bytes, making
+ In this variant the uint16_t is padded by an extra 2 bytes, making
the size aligned on 4 byte boundary
*/
NTSTATUS smb2_pull_o16As32_blob(struct smb2_request_buffer *buf, TALLOC_CTX *mem_ctx, uint8_t *ptr, DATA_BLOB *blob)
uint16_t credit_charge;
/* information on what to do with a reply when it is received
- asyncronously. If this is not setup when a reply is received then
+ asynchronously. If this is not setup when a reply is received then
the reply is discarded
The private pointer is private to the caller of the client
/*
- a composite API for quering file system information
+ a composite API for querying file system information
*/
#include "includes.h"
/* This doesn't work, as this only happens on old
* protocols, where this comparison won't match. */
if (NT_STATUS_EQUAL(c->status, NT_STATUS_LOGON_FAILURE)) {
- /* we neet to reset the vuid for a new try */
+ /* we need to reset the vuid for a new try */
session->vuid = 0;
if (cli_credentials_wrong_password(state->io->in.credentials)) {
nt_status = session_setup_old(c, session,
/*
composite session setup function that hides the details of all the
- different session setup varients, including the multi-pass nature of
- the spnego varient
+ different session setup variants, including the multi-pass nature of
+ the spnego variant
*/
struct composite_context *smb_composite_sesssetup_send(struct smbcli_session *session,
struct smb_composite_sesssetup *io)
talloc_set_destructor(state, sesssetup_state_destructor);
- /* no session setup at all in earliest protocol varients */
+ /* no session setup at all in earliest protocol variants */
if (session->transport->negotiate.protocol < PROTOCOL_LANMAN1) {
if (krb5_state == CRED_USE_KERBEROS_REQUIRED) {
composite_error(c, NT_STATUS_NETWORK_CREDENTIAL_CONFLICT);
/*
generic session setup interface that takes care of which
- session setup varient to use
+ session setup variant to use
*/
struct smb_composite_sesssetup {
struct {