}
/*
- * Here we check that the given strucure still contains the
+ * Here we check that the given structure still contains the
* same secrets_domain_info1_change as currently stored.
*
* There's always a gap between secrets_prepare_password_change()
&lm_pw_len, &lm_pw_ptr, /* B */
&nt_pw_len, &nt_pw_ptr, /* B */
&acct_ctrl, /* w */
- &remove_me, /* remove on the next TDB_FORMAT upgarde */ /* d */
+ &remove_me, /* remove on the next TDB_FORMAT upgrade */ /* d */
&logon_divs, /* w */
&hours_len, /* d */
&hourslen, &hours, /* B */
}
/**********************************************************************
- Intialize a struct samu struct from a BYTE buffer of size len
+ Initialize a struct samu struct from a BYTE buffer of size len
*********************************************************************/
bool init_samu_from_buffer(struct samu *sampass, uint32_t level,
}
/**********************************************************************
- Intialize a BYTE buffer from a struct samu struct
+ Initialize a BYTE buffer from a struct samu struct
*********************************************************************/
uint32_t init_buffer_from_samu (uint8_t **buf, struct samu *sampass, bool size_only)
* request to trusted domains are performed through our dc.)
*
* So we simply use our own domain name to retrieve the
- * machine account passowrd and ignore the request domain here.
+ * machine account password and ignore the request domain here.
*/
pwd = secrets_fetch_machine_password(lp_workgroup(), &last_set_time, channel);
/**
* @todo Redefine this to NULL, but this changes the API because
- * much of samba assumes that the pdb_get...() funtions
+ * much of samba assumes that the pdb_get...() functions
* return strings. (ie not null-pointers).
* See also pdb_fill_default_sam().
*/
*
* @param[in] sampass The sam user to check.
*
- * @return True if the function was successfull, false on an error.
+ * @return True if the function was successful, false on an error.
*/
static bool pdb_try_account_unlock(struct samu *sampass)
{
const char *p;
const char **attrs;
- /* Unfortunatly there is no proper way to detect syncrepl-support in
+ /* Unfortunately there is no proper way to detect syncrepl-support in
* smbldap_connect_system(). The syncrepl OIDs are submitted for publication
* but do not show up in the root-DSE yet. Neither we can query the
* subschema-context for the syncProviderSubentry or syncConsumerSubentry
}
/********************************************************************
- Do the actual modification - also change a plaintext passord if
+ Do the actual modification - also change a plaintext password if
it it set.
**********************************************************************/
struct ldapsam_privates {
struct smbldap_state *smbldap_state;
- /* Former statics */
+ /* Former statistics */
LDAPMessage *result;
LDAPMessage *entry;
int index;
}
/**************************************************************
- Intialize a smb_passwd struct
+ Initialize a smb_passwd struct
*************************************************************/
static void pdb_init_smb(struct smb_passwd *user)
* by doing a stat on the filename and an fstat on the fd. If the
* two inodes differ then someone did a rename between the open and
* the lock. Back off and try the open again. Only do this 5 times to
- * prevent infinate loops. JRA.
+ * prevent infinite loops. JRA.
*/
if (sys_stat(pfile, &sbuf1, false) != 0) {
if (!IS_SAM_DEFAULT(sampass, PDB_USERSID)) {
rid = pdb_get_user_rid(sampass);
- /* If the user specified a RID, make sure its able to be both stored and retreived */
+ /* If the user specified a RID, make sure its able to be both stored and retrieved */
if (rid == DOMAIN_RID_GUEST) {
struct passwd *passwd = Get_Pwnam_alloc(NULL, lp_guest_account());
if (!passwd) {
}
/*********************************************************************
- Initialize the tdb sam backend. Setup the dispath table of methods,
+ Initialize the tdb sam backend. Setup the dispatch table of methods,
open the tdb, etc...
*********************************************************************/
Get account policy information as a dictionary." },
{ "set_account_policy", py_pdb_set_account_policy, METH_VARARGS,
"get_account_policy(Mapping) -> None\n\n \
- Set account policy settings from a dicionary." },
+ Set account policy settings from a dictionary." },
/* get_seq_num */
{ "search_users", py_pdb_search_users, METH_VARARGS,
"search_users(acct_flags) -> List\n\n \