From fc1fd9c656a7d41960fc13429fe61772ed794d98 Mon Sep 17 00:00:00 2001 From: Joseph Sutton Date: Fri, 22 Sep 2023 09:16:18 +1200 Subject: [PATCH] s4:rpc_server: Fix code spelling Signed-off-by: Joseph Sutton Reviewed-by: Andrew Bartlett --- source4/rpc_server/backupkey/dcesrv_backupkey.c | 6 +++--- source4/rpc_server/drsuapi/getncchanges.c | 6 +++--- 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/source4/rpc_server/backupkey/dcesrv_backupkey.c b/source4/rpc_server/backupkey/dcesrv_backupkey.c index 47e338f546c..77b8b8c4bf4 100644 --- a/source4/rpc_server/backupkey/dcesrv_backupkey.c +++ b/source4/rpc_server/backupkey/dcesrv_backupkey.c @@ -445,7 +445,7 @@ static WERROR get_and_verify_access_check(TALLOC_CTX *sub_ctx, /* * We free it after the sha1 calculation because blob.data - * point to the same area + * points to the same area */ if (!mem_equal_const_time(hash, uncrypted_accesscheckv2.hash, hash_size)) { @@ -486,7 +486,7 @@ static WERROR get_and_verify_access_check(TALLOC_CTX *sub_ctx, /* * We free it after the sha1 calculation because blob.data - * point to the same area + * points to the same area */ if (!mem_equal_const_time(hash, uncrypted_accesscheckv3.hash, hash_size)) { @@ -1598,7 +1598,7 @@ static WERROR bkrp_generic_decrypt_data(struct dcesrv_call_state *dce_call, TALL * will be stored. There is only one active encryption key per domain, * it is pointed at with G$BCKUPKEY_P in the LSA secrets store. * - * The potentially multiple valid decryptiong keys (and the encryption + * The potentially multiple valid decryption keys (and the encryption * key) are in turn stored in the LSA secrets store as * G$BCKUPKEY_keyGuidString. * diff --git a/source4/rpc_server/drsuapi/getncchanges.c b/source4/rpc_server/drsuapi/getncchanges.c index 2c95b33e822..e33c21200cd 100644 --- a/source4/rpc_server/drsuapi/getncchanges.c +++ b/source4/rpc_server/drsuapi/getncchanges.c @@ -482,7 +482,7 @@ static WERROR get_nc_changes_build_object(struct drsuapi_DsReplicaObjectListItem bool is_schema_nc = getnc_state->is_schema_nc; uint64_t highest_usn = getnc_state->min_usn; - /* make dsdb sytanx context for conversions */ + /* make dsdb syntax context for conversions */ dsdb_syntax_ctx_init(&syntax_ctx, sam_ctx, schema); syntax_ctx.is_schema_nc = is_schema_nc; @@ -2955,7 +2955,7 @@ allowed: } if (req10->replica_flags & DRSUAPI_DRS_FULL_SYNC_PACKET) { - /* Ignore the _in_ uptpdateness vector*/ + /* Ignore the _in_ uptodateness vector*/ req10->uptodateness_vector = NULL; } @@ -3824,7 +3824,7 @@ allowed: * We need to make sure that we never return the * same highwatermark within the same replication * cycle more than once. Otherwise we cannot detect - * when the client uses an unexptected highwatermark. + * when the client uses an unexpected highwatermark. * * This is a HACK which is needed because our * object ordering is wrong and set tmp_highest_usn -- 2.47.3