]> git.ipfire.org Git - thirdparty/samba.git/commitdiff
s4:rpc_server: Fix code spelling
authorJoseph Sutton <josephsutton@catalyst.net.nz>
Thu, 21 Sep 2023 21:16:18 +0000 (09:16 +1200)
committerAndrew Bartlett <abartlet@samba.org>
Wed, 25 Oct 2023 22:23:37 +0000 (22:23 +0000)
Signed-off-by: Joseph Sutton <josephsutton@catalyst.net.nz>
Reviewed-by: Andrew Bartlett <abartlet@samba.org>
source4/rpc_server/backupkey/dcesrv_backupkey.c
source4/rpc_server/drsuapi/getncchanges.c

index 47e338f546c34162d318a6f569b3e48493963a82..77b8b8c4bf4bd41cd1321d80e6fe73ccabd79815 100644 (file)
@@ -445,7 +445,7 @@ static WERROR get_and_verify_access_check(TALLOC_CTX *sub_ctx,
 
                /*
                 * We free it after the sha1 calculation because blob.data
-                * point to the same area
+                * points to the same area
                 */
 
                if (!mem_equal_const_time(hash, uncrypted_accesscheckv2.hash, hash_size)) {
@@ -486,7 +486,7 @@ static WERROR get_and_verify_access_check(TALLOC_CTX *sub_ctx,
 
                /*
                 * We free it after the sha1 calculation because blob.data
-                * point to the same area
+                * points to the same area
                 */
 
                if (!mem_equal_const_time(hash, uncrypted_accesscheckv3.hash, hash_size)) {
@@ -1598,7 +1598,7 @@ static WERROR bkrp_generic_decrypt_data(struct dcesrv_call_state *dce_call, TALL
  * will be stored.  There is only one active encryption key per domain,
  * it is pointed at with G$BCKUPKEY_P in the LSA secrets store.
  *
- * The potentially multiple valid decryptiong keys (and the encryption
+ * The potentially multiple valid decryption keys (and the encryption
  * key) are in turn stored in the LSA secrets store as
  * G$BCKUPKEY_keyGuidString.
  *
index 2c95b33e822213ae72f4d24dad4b56ddf019bb18..e33c21200cd0be3c107cbcd7aa44a34c02b567ac 100644 (file)
@@ -482,7 +482,7 @@ static WERROR get_nc_changes_build_object(struct drsuapi_DsReplicaObjectListItem
        bool is_schema_nc = getnc_state->is_schema_nc;
        uint64_t highest_usn = getnc_state->min_usn;
 
-       /* make dsdb sytanx context for conversions */
+       /* make dsdb syntax context for conversions */
        dsdb_syntax_ctx_init(&syntax_ctx, sam_ctx, schema);
        syntax_ctx.is_schema_nc = is_schema_nc;
 
@@ -2955,7 +2955,7 @@ allowed:
        }
 
        if (req10->replica_flags & DRSUAPI_DRS_FULL_SYNC_PACKET) {
-               /* Ignore the _in_ uptpdateness vector*/
+               /* Ignore the _in_ uptodateness vector*/
                req10->uptodateness_vector = NULL;
        }
 
@@ -3824,7 +3824,7 @@ allowed:
                         * We need to make sure that we never return the
                         * same highwatermark within the same replication
                         * cycle more than once. Otherwise we cannot detect
-                        * when the client uses an unexptected highwatermark.
+                        * when the client uses an unexpected highwatermark.
                         *
                         * This is a HACK which is needed because our
                         * object ordering is wrong and set tmp_highest_usn