]> git.ipfire.org Git - thirdparty/samba.git/commitdiff
Fix spelling mistakes.
authorMichael Tokarev <mjt@tls.msk.ru>
Fri, 9 Sep 2022 20:45:38 +0000 (13:45 -0700)
committerJeremy Allison <jra@samba.org>
Mon, 12 Sep 2022 02:29:32 +0000 (02:29 +0000)
Signed-off-by: Michael Tokarev <mjt@tls.msk.ru>
Reviewed-by: Jeremy Allison <jra@samba.org>
Reviewed-by: Martin Schwenke <martin@meltin.net>
Autobuild-User(master): Jeremy Allison <jra@samba.org>
Autobuild-Date(master): Mon Sep 12 02:29:32 UTC 2022 on sn-devel-184

ctdb/common/system.c
docs-xml/manpages/vfs_fruit.8.xml
source3/smbd/msdfs.c
source3/smbd/smbXsrv_client.c
source3/winbindd/wb_sids2xids.c
source4/torture/smb2/ea.c
source4/torture/smb2/session.c

index 08dc68284fd840f4eca30365285c465336cd0a11..05a95647233c4c5461ccf0f9feb1926605997e6c 100644 (file)
@@ -157,7 +157,7 @@ bool ctdb_sys_check_iface_exists(const char *iface)
 
        ifnis = if_nameindex();
        if (ifnis == NULL) {
-               DBG_ERR("Failed to retrieve inteface list\n");
+               DBG_ERR("Failed to retrieve interface list\n");
                return false;
        }
 
index 4caf308a6126b69e9d99d1ae15e24f3b3f979183..6950898a7d156d9ecbece4c11d1d3ed0da0c5106 100644 (file)
              on-disk file identifier to have the semantics of HFS+ Catalog Node
              Identifier (CNID). Samba provides File-IDs based on a file's inode
              number which gets recycled across file creation and deletion and
-             can therefor not be used for Mac client. Returning a file identifier of
+             can therefore not be used for Mac client. Returning a file identifier of
              zero causes the Mac client to stop using and trusting the file id
              returned from the server.</para>
              <para>The default is <emphasis>yes</emphasis>.</para>
index ce7d0f7dd56227a141c76fe6f2322235426a5eea..b5fd7608e07605391301bfa510124fe5a831f1a1 100644 (file)
@@ -1090,7 +1090,7 @@ static NTSTATUS dfs_path_lookup(TALLOC_CTX *ctx,
                }
                removed_components--;
                if (p == NULL && removed_components != 0) {
-                       DBG_ERR("Component missmatch. path = %s, "
+                       DBG_ERR("Component mismatch. path = %s, "
                                "%zu components left\n",
                                canon_dfspath,
                                removed_components);
index d7a6fa35bf0743f0447734135a87ccb74e279e5a..14d00f4aca1f273798fdaf0bbd138948461327fc 100644 (file)
@@ -1242,7 +1242,7 @@ static void smbXsrv_client_connection_drop_loop(struct tevent_req *subreq)
        {
                struct GUID_txt_buf buf1, buf2;
 
-               DBG_WARNING("client's client_guid [%s] != droped guid [%s]\n",
+               DBG_WARNING("client's client_guid [%s] != dropped guid [%s]\n",
                            GUID_buf_string(&client->global->client_guid,
                                            &buf1),
                            GUID_buf_string(&drop_info0->client_guid,
@@ -1257,7 +1257,7 @@ static void smbXsrv_client_connection_drop_loop(struct tevent_req *subreq)
            drop_info0->client_connect_time)
        {
                DBG_WARNING("client's initial connect time [%s] (%llu) != "
-                       "droped initial connect time [%s] (%llu)\n",
+                       "dropped initial connect time [%s] (%llu)\n",
                        nt_time_string(talloc_tos(),
                                       client->global->initial_connect_time),
                        (unsigned long long)client->global->initial_connect_time,
index 179a51f81e452d00ee2616dd6a4c0ed91a7afcf7..9a3507ba7026a032fc1e697ff618579d5b8303ea 100644 (file)
@@ -233,7 +233,7 @@ static void wb_sids2xids_idmap_setup_done(struct tevent_req *subreq)
 
                sid_copy(&domain_sid, &state->sids[i]);
                sid_split_rid(&domain_sid, &rid);
-               D_DEBUG("%"PRIu32": Splitted SID %s into domain SID %s and RID %"PRIu32"\n",
+               D_DEBUG("%"PRIu32": Split SID %s into domain SID %s and RID %"PRIu32"\n",
                        i,
                        dom_sid_str_buf(&state->sids[i], &buf0),
                        dom_sid_str_buf(&domain_sid, &buf1),
index becacaed77e1649064d774e1360ca43751c37b9d..2467610f688bc435b814e6b6017317049c2e2100 100644 (file)
@@ -91,7 +91,7 @@ static bool torture_smb2_acl_xattr(struct torture_context *tctx,
 
        status = smb2_setinfo_file(tree, &sfinfo);
        torture_assert_ntstatus_ok_goto(tctx, status, ret, done,
-                                       "Setting EA should faild\n");
+                                       "Setting EA should fail\n");
 
        /*
         * 2. Verify NT ACL EA is not listed
index 92f9e638ff47f0c67c0531e45605e31056e2565c..fe2beafbe9baa36de2a96bd91025fa3af4a67a5e 100644 (file)
@@ -2754,7 +2754,7 @@ static bool test_session_bind_negative_smb210s(struct torture_context *tctx, str
        encrypted = smb2cli_tcon_is_encryption_on(tree0->smbXcli);
        if (encrypted) {
                torture_skip(tctx,
-                            "Can't test SMB 2.10 if encrytion is required");
+                            "Can't test SMB 2.10 if encryption is required");
        }
 
        options1 = transport0->options;
@@ -2785,7 +2785,7 @@ static bool test_session_bind_negative_smb210d(struct torture_context *tctx, str
        encrypted = smb2cli_tcon_is_encryption_on(tree0->smbXcli);
        if (encrypted) {
                torture_skip(tctx,
-                            "Can't test SMB 2.10 if encrytion is required");
+                            "Can't test SMB 2.10 if encryption is required");
        }
 
        options1 = transport0->options;
@@ -2817,7 +2817,7 @@ static bool test_session_bind_negative_smb2to3s(struct torture_context *tctx, st
        encrypted = smb2cli_tcon_is_encryption_on(tree0->smbXcli);
        if (encrypted) {
                torture_skip(tctx,
-                            "Can't test SMB 2.10 if encrytion is required");
+                            "Can't test SMB 2.10 if encryption is required");
        }
 
        if (smbXcli_conn_protocol(transport0->conn) < PROTOCOL_SMB3_00) {
@@ -2862,7 +2862,7 @@ static bool test_session_bind_negative_smb2to3d(struct torture_context *tctx, st
        encrypted = smb2cli_tcon_is_encryption_on(tree0->smbXcli);
        if (encrypted) {
                torture_skip(tctx,
-                            "Can't test SMB 2.10 if encrytion is required");
+                            "Can't test SMB 2.10 if encryption is required");
        }
 
        if (smbXcli_conn_protocol(transport0->conn) < PROTOCOL_SMB3_00) {
@@ -2908,7 +2908,7 @@ static bool test_session_bind_negative_smb3to2s(struct torture_context *tctx, st
        encrypted = smb2cli_tcon_is_encryption_on(tree0->smbXcli);
        if (encrypted) {
                torture_skip(tctx,
-                            "Can't test SMB 2.10 if encrytion is required");
+                            "Can't test SMB 2.10 if encryption is required");
        }
 
        if (smbXcli_conn_protocol(transport0->conn) < PROTOCOL_SMB3_00) {
@@ -2959,7 +2959,7 @@ static bool test_session_bind_negative_smb3to2d(struct torture_context *tctx, st
        encrypted = smb2cli_tcon_is_encryption_on(tree0->smbXcli);
        if (encrypted) {
                torture_skip(tctx,
-                            "Can't test SMB 2.10 if encrytion is required");
+                            "Can't test SMB 2.10 if encryption is required");
        }
 
        if (smbXcli_conn_protocol(transport0->conn) < PROTOCOL_SMB3_00) {
@@ -4548,7 +4548,7 @@ static bool test_session_bind_negative_smb3signH2XtoGs(struct torture_context *t
        encrypted = smb2cli_tcon_is_encryption_on(tree0->smbXcli);
        if (encrypted) {
                torture_skip(tctx,
-                            "Can't test SMB 2.10 if encrytion is required");
+                            "Can't test SMB 2.10 if encryption is required");
        }
 
        if (smbXcli_conn_protocol(transport0->conn) < PROTOCOL_SMB3_11) {
@@ -4608,7 +4608,7 @@ static bool test_session_bind_negative_smb3signH2XtoGd(struct torture_context *t
        encrypted = smb2cli_tcon_is_encryption_on(tree0->smbXcli);
        if (encrypted) {
                torture_skip(tctx,
-                            "Can't test SMB 2.10 if encrytion is required");
+                            "Can't test SMB 2.10 if encryption is required");
        }
 
        if (smbXcli_conn_protocol(transport0->conn) < PROTOCOL_SMB3_11) {
@@ -4788,7 +4788,7 @@ static bool test_session_bind_negative_smb3signGtoH2Xs(struct torture_context *t
        encrypted = smb2cli_tcon_is_encryption_on(tree0->smbXcli);
        if (encrypted) {
                torture_skip(tctx,
-                            "Can't test SMB 2.10 if encrytion is required");
+                            "Can't test SMB 2.10 if encryption is required");
        }
 
        if (smbXcli_conn_protocol(transport0->conn) < PROTOCOL_SMB3_11) {
@@ -4854,7 +4854,7 @@ static bool test_session_bind_negative_smb3signGtoH2Xd(struct torture_context *t
        encrypted = smb2cli_tcon_is_encryption_on(tree0->smbXcli);
        if (encrypted) {
                torture_skip(tctx,
-                            "Can't test SMB 2.10 if encrytion is required");
+                            "Can't test SMB 2.10 if encryption is required");
        }
 
        if (smbXcli_conn_protocol(transport0->conn) < PROTOCOL_SMB3_11) {
@@ -5066,7 +5066,7 @@ static bool test_session_signing_hmac_sha_256(struct torture_context *tctx, stru
        encrypted = smb2cli_tcon_is_encryption_on(tree0->smbXcli);
        if (encrypted) {
                torture_skip(tctx,
-                            "Can't test signing only if encrytion is required");
+                            "Can't test signing only if encryption is required");
        }
 
        if (smbXcli_conn_protocol(transport0->conn) < PROTOCOL_SMB3_11) {
@@ -5110,7 +5110,7 @@ static bool test_session_signing_aes_128_cmac(struct torture_context *tctx, stru
        encrypted = smb2cli_tcon_is_encryption_on(tree0->smbXcli);
        if (encrypted) {
                torture_skip(tctx,
-                            "Can't test signing only if encrytion is required");
+                            "Can't test signing only if encryption is required");
        }
 
        if (smbXcli_conn_protocol(transport0->conn) < PROTOCOL_SMB3_11) {
@@ -5154,7 +5154,7 @@ static bool test_session_signing_aes_128_gmac(struct torture_context *tctx, stru
        encrypted = smb2cli_tcon_is_encryption_on(tree0->smbXcli);
        if (encrypted) {
                torture_skip(tctx,
-                            "Can't test signing only if encrytion is required");
+                            "Can't test signing only if encryption is required");
        }
 
        if (smbXcli_conn_protocol(transport0->conn) < PROTOCOL_SMB3_11) {