nbt_srv_addr = socket_address_from_strings(tctx, ctx->nbtsock_srv->sock->backend_name, ctx->myaddr->addr, lpcfg_nbt_port(tctx->lp_ctx));
if (!nbt_srv_addr) return NULL;
- /* And if possible, bind to it. This won't work unless we are root or in sockewrapper */
+ /* And if possible, bind to it. This won't work unless we are root or in socketwrapper */
status = socket_listen(ctx->nbtsock_srv->sock, nbt_srv_addr, 0, 0);
talloc_free(nbt_srv_addr);
if (!NT_STATUS_IS_OK(status)) {
lpcfg_nbt_port(tctx->lp_ctx));
if (!nbt_srv_addr) return NULL;
- /* And if possible, bind to it. This won't work unless we are root or in sockewrapper */
+ /* And if possible, bind to it. This won't work unless we are root or in socketwrapper */
status = socket_listen(ctx->nbtsock_srv2->sock, ctx->myaddr2, 0, 0);
talloc_free(nbt_srv_addr);
if (!NT_STATUS_IS_OK(status)) {
.num_ips = ARRAY_SIZE(addresses_B_3_4),
.ips = addresses_B_3_4,
},{
- /* the last one should always be a unique,tomstone record! */
+ /* the last one should always be a unique,tombstone record! */
.type = WREPL_TYPE_UNIQUE,
.state = WREPL_STATE_TOMBSTONE,
.node = WREPL_NODE_B,
torture_assert_str_equal(tctx, r->in.trusted_domain_name->string, "f1.test", "trusted domain name");
torture_assert_int_equal(tctx, r->in.highest_record_type, 2, "highest record type");
torture_assert(tctx, r->in.forest_trust_info != NULL, "forest trust info");
- torture_assert_int_equal(tctx, r->in.forest_trust_info->count, 2, "number fo forest trust records");
+ torture_assert_int_equal(tctx, r->in.forest_trust_info->count, 2, "number of forest trust records");
torture_assert_int_equal(tctx, r->in.forest_trust_info->entries[0]->flags, 0, "first entry flags");
torture_assert_int_equal(tctx, r->in.forest_trust_info->entries[0]->type, 0, "first entry type");
torture_assert_int_equal(tctx, r->in.forest_trust_info->entries[0]->time, 0, "first entry time");
lock[0].pid--;
/*
- * demonstrate the a successful lock with count = 0 and the same offset,
+ * demonstrate that a successful lock with count = 0 and the same offset,
* doesn't reset the error cache
*/
lock[0].offset = 100;
CHECK_STATUS(status, NT_STATUS_FILE_LOCK_CONFLICT);
/*
- * demonstrate the a successful lock with count = 0 and outside the locked range,
+ * demonstrate that a successful lock with count = 0 and outside the locked range,
* doesn't reset the error cache
*/
lock[0].offset = 110;
CHECK_STATUS(status, NT_STATUS_FILE_LOCK_CONFLICT);
/*
- * demonstrate the a lock with count = 0 and inside the locked range,
+ * demonstrate that a lock with count = 0 and inside the locked range,
* fails and resets the error cache
*/
lock[0].offset = 101;
status = smb_raw_lock(cli->tree, &io);
CHECK_STATUS(status, NT_STATUS_FILE_LOCK_CONFLICT);
- /* demonstrate the a changing offset, resets the error cache */
+ /* demonstrate that a changing offset resets the error cache */
lock[0].offset = 105;
lock[0].count = 10;
io.lockx.in.file.fnum = fnum;
CHECK_STATUS(status, NT_STATUS_FILE_LOCK_CONFLICT);
/*
- * demonstrate the a successful lock in a different range,
+ * demonstrate that a successful lock in a different range
* doesn't reset the cache, the failing lock on the 2nd handle
* resets the cache
*/
/* form up a user@DOMAIN */
user_principal_name_short = talloc_asprintf(mem_ctx, "%s$@%s", test_dc, nt4_domain);
- /* variable nt4_domain includs a trailing \ */
+ /* variable nt4_domain includes a trailing \ */
user_principal_name_short[strlen(user_principal_name_short) - 1] = '\0';
service_principal_name = talloc_asprintf(mem_ctx, "HOST/%s", test_dc);
* because dcerpc_netr_LogonGetCapabilities with
* an unknown query level returns DCERPC_NCA_S_FAULT_INVALID_TAG
* => NT_STATUS_RPC_ENUM_VALUE_OUT_OF_RANGE
- * without looking a the authenticator.
+ * without looking at the authenticator.
*/
tmp_creds = *creds;
netlogon_creds_client_authenticator(&tmp_creds, &auth);
* because dcerpc_netr_LogonGetCapabilities with
* an unknown query level returns DCERPC_NCA_S_FAULT_INVALID_TAG
* => NT_STATUS_RPC_ENUM_VALUE_OUT_OF_RANGE
- * without looking a the authenticator.
+ * without looking at the authenticator.
*/
tmp_creds = *creds;
netlogon_creds_client_authenticator(&tmp_creds, &auth);
* we need to operate on a temporary copy of creds
* because dcerpc_netr_LogonGetCapabilities was
* dcerpc_netr_DummyFunction and returns NT_STATUS_NOT_IMPLEMENTED
- * without looking a the authenticator.
+ * without looking at the authenticator.
*/
tmp_creds = *creds;
netlogon_creds_client_authenticator(&tmp_creds, &auth);
* because dcerpc_netr_LogonGetCapabilities with
* an query level 2 may returns DCERPC_NCA_S_FAULT_INVALID_TAG
* => NT_STATUS_RPC_ENUM_VALUE_OUT_OF_RANGE
- * without looking a the authenticator.
+ * without looking at the authenticator.
*/
tmp_creds = *creds;
netlogon_creds_client_authenticator(&tmp_creds, &auth);