From: Joseph Sutton Date: Thu, 21 Sep 2023 21:16:18 +0000 (+1200) Subject: s4:rpc_server: Fix code spelling X-Git-Tag: talloc-2.4.2~1053 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=fc1fd9c656a7d41960fc13429fe61772ed794d98;p=thirdparty%2Fsamba.git s4:rpc_server: Fix code spelling Signed-off-by: Joseph Sutton Reviewed-by: Andrew Bartlett --- diff --git a/source4/rpc_server/backupkey/dcesrv_backupkey.c b/source4/rpc_server/backupkey/dcesrv_backupkey.c index 47e338f546c..77b8b8c4bf4 100644 --- a/source4/rpc_server/backupkey/dcesrv_backupkey.c +++ b/source4/rpc_server/backupkey/dcesrv_backupkey.c @@ -445,7 +445,7 @@ static WERROR get_and_verify_access_check(TALLOC_CTX *sub_ctx, /* * We free it after the sha1 calculation because blob.data - * point to the same area + * points to the same area */ if (!mem_equal_const_time(hash, uncrypted_accesscheckv2.hash, hash_size)) { @@ -486,7 +486,7 @@ static WERROR get_and_verify_access_check(TALLOC_CTX *sub_ctx, /* * We free it after the sha1 calculation because blob.data - * point to the same area + * points to the same area */ if (!mem_equal_const_time(hash, uncrypted_accesscheckv3.hash, hash_size)) { @@ -1598,7 +1598,7 @@ static WERROR bkrp_generic_decrypt_data(struct dcesrv_call_state *dce_call, TALL * will be stored. There is only one active encryption key per domain, * it is pointed at with G$BCKUPKEY_P in the LSA secrets store. * - * The potentially multiple valid decryptiong keys (and the encryption + * The potentially multiple valid decryption keys (and the encryption * key) are in turn stored in the LSA secrets store as * G$BCKUPKEY_keyGuidString. * diff --git a/source4/rpc_server/drsuapi/getncchanges.c b/source4/rpc_server/drsuapi/getncchanges.c index 2c95b33e822..e33c21200cd 100644 --- a/source4/rpc_server/drsuapi/getncchanges.c +++ b/source4/rpc_server/drsuapi/getncchanges.c @@ -482,7 +482,7 @@ static WERROR get_nc_changes_build_object(struct drsuapi_DsReplicaObjectListItem bool is_schema_nc = getnc_state->is_schema_nc; uint64_t highest_usn = getnc_state->min_usn; - /* make dsdb sytanx context for conversions */ + /* make dsdb syntax context for conversions */ dsdb_syntax_ctx_init(&syntax_ctx, sam_ctx, schema); syntax_ctx.is_schema_nc = is_schema_nc; @@ -2955,7 +2955,7 @@ allowed: } if (req10->replica_flags & DRSUAPI_DRS_FULL_SYNC_PACKET) { - /* Ignore the _in_ uptpdateness vector*/ + /* Ignore the _in_ uptodateness vector*/ req10->uptodateness_vector = NULL; } @@ -3824,7 +3824,7 @@ allowed: * We need to make sure that we never return the * same highwatermark within the same replication * cycle more than once. Otherwise we cannot detect - * when the client uses an unexptected highwatermark. + * when the client uses an unexpected highwatermark. * * This is a HACK which is needed because our * object ordering is wrong and set tmp_highest_usn