Tree-wide spellcheck for some common misspellings.
source3/utils/status.c has misspelled local variable (unkown_dialect).
"missmatch" is a known historical misspelling, only the incorrect
misspellings are fixed.
source3/locale/net/de.po has the spelling error (unkown) in two msgids -
it probably should be updated with current source.
Signed-off-by: Michael Tokarev <mjt@tls.msk.ru>
Reviewed-by: Andrew Bartlett <abartlet@samba.org>
Reviewed-by: Jeremy Allison <jra@samba.org>
* The features must be requested before starting the
* gensec_update*() loop.
*
- * The current expection is GENSEC_FEATURE_SIGN_PKT_HEADER,
+ * The current exception is GENSEC_FEATURE_SIGN_PKT_HEADER,
* it can also be requested once the gensec_update*() loop
* returned NT_STATUS_OK.
*
* The features must be requested after the finished
* gensec_update*() loop.
*
- * The current expection is GENSEC_FEATURE_SIGN_PKT_HEADER,
+ * The current exception is GENSEC_FEATURE_SIGN_PKT_HEADER,
* it can also be requested before the gensec_update*() loop,
* as the return value only indicates if the backend supports
* dcerpc header signing, not if header signing will be used
prompted. The client will first check the
<envar>USER</envar> environment variable
(which is also permitted to also contain the
- password seperated by a &pct;), then the
+ password separated by a &pct;), then the
<envar>LOGNAME</envar> variable (which is not
permitted to contain a password) and if either exists,
the value is used. If these environmental
This parameter determines whether Samba client tools
will try to authenticate using Kerberos. For Kerberos
authentication you need to use dns names instead of IP
- addresses when connnecting to a service.
+ addresses when connecting to a service.
</para>
<para>
<listitem><para><replaceable>DEFPWD</replaceable> is an optional parameter that can be set to enforce using the default machine account password. The use of this parameter is not recommended as the default machine account password can be easily guessed. </para></listitem>
-<listitem><para><replaceable>REUSE</replaceable> is an optional parameter that can be set to enforce reusing an exisiting machine account in AD.</para></listitem>
+<listitem><para><replaceable>REUSE</replaceable> is an optional parameter that can be set to enforce reusing an existing machine account in AD.</para></listitem>
<listitem><para><replaceable>SAVEFILE</replaceable> is an optional parameter to store the generated provisioning data on disk.</para></listitem>
flag is set. </para>
</listitem>
<listitem><para>When an ACE with the (OI) flag alone set is
- progagated to a child folder the inheritance only flag (IO) is
+ propagated to a child folder the inheritance only flag (IO) is
also applied. This indicates the permissions associated with
the ACE don't apply to the folder itself (only to it's
child files). When applying the ACE to a child file the ACE is
<para>The <command>vfs_widelinks</command> VFS module
hides the existence of symbolic links in the filesystem
- inside a share. It is used in Samba verson 4.13 and above
+ inside a share. It is used in Samba version 4.13 and above
to implement the <filename>smb.conf</filename>"wide links = yes"
functionality that used to be inside the core smbd code.
The module should not be loaded explicitly by smb.conf
<para>
This parameter determines whether Samba client tools will try
to authenticate using Kerberos. For Kerberos authentication you
- need to use dns names instead of IP addresses when connnecting
+ need to use dns names instead of IP addresses when connecting
to a service.
</para>
authenticate users using the NTLM encrypted password response for
this local passdb (SAM or account database). </para>
- <para>If disabled, both NTLM and LanMan authencication against the
+ <para>If disabled, both NTLM and LanMan authentication against the
local passdb is disabled.</para>
<para>Note that these settings apply only to local users,
<description>
<para>If you still have legacy domain members, which required "server schannel = auto" before,
- it is possible to specify explicit expection per computer account
+ it is possible to specify explicit exception per computer account
by using 'server require schannel:COMPUTERACCOUNT = no' as option.
Note that COMPUTERACCOUNT has to be the sAMAccountName value of
the computer account (including the trailing '$' sign).
<para>This global parameter determines if the tdb internals of Samba can
depend on mmap working correctly on the running system. Samba requires a coherent
mmap/read-write system memory cache. Currently only OpenBSD and HPUX do not have such a
- coherent cache, and on those platforms this paramter is overridden internally
+ coherent cache, and on those platforms this parameter is overridden internally
to be effeceively <constant>no</constant>. On all systems this parameter should be left alone. This
parameter is provided to help the Samba developers track down problems with
the tdb internal code.
}
/*
- * If we supported multiple encrytion contexts
+ * If we supported multiple encryption contexts
* here we'd look up based on tid.
*/
if (common_encryption_on(state->conn->smb1.trans_enc)) {
}
/*
- * If we supported multiple encrytion contexts
+ * If we supported multiple encryption contexts
* here we'd look up based on tid.
*/
if (common_encryption_on(conn->smb1.trans_enc)
/*****************/
/* Function 0x14 */
- /* one unkown bit still: DS_IP_VERSION_AGNOSTIC - gd*/
+ /* one unknown bit still: DS_IP_VERSION_AGNOSTIC - gd*/
const int DSGETDC_VALID_FLAGS = (DS_FORCE_REDISCOVERY |
DS_DIRECTORY_SERVICE_REQUIRED |
set_secinfo = security.SECINFO_GROUP | security.SECINFO_DACL | security.SECINFO_PROTECTED_DACL
smb_helper.set_acl(private_path, private_path_sd_new, sinfo=set_secinfo)
- # setup notification request as priviliged user
+ # setup notification request as privileged user
monitor_priv_fnum = self.smb_conn.create(Name=monitor_path, ShareAccess=1)
notify_priv = self.smb_conn.notify(fnum=monitor_priv_fnum,
buffer_size=0xffff,
completion_filter=libsmb.FILE_NOTIFY_CHANGE_ALL,
recursive=True)
- # setup notification request as unpriviliged user
+ # setup notification request as unprivileged user
monitor_unpriv_fnum = self.smb_conn_unpriv.create(Name=monitor_path, ShareAccess=1)
notify_unpriv = self.smb_conn_unpriv.notify(fnum=monitor_unpriv_fnum,
buffer_size=0xffff,
#: ../../utils/net_rpc_printer.c:1305
#, c-format
-msgid "unkown action: %d\n"
+msgid "unknown action: %d\n"
msgstr ""
#: ../../utils/net_rpc_printer.c:1331
#: ../../utils/net_rpc_printer.c:1458
#, c-format
-msgid "unkown state: %d\n"
+msgid "unknown state: %d\n"
msgstr "unbekannter Status: %d\n"
#: ../../utils/net_rpc_printer.c:1528 ../../utils/net_rpc_printer.c:1675 ../../utils/net_rpc_printer.c:1858 ../../utils/net_rpc_printer.c:2047 ../../utils/net_rpc_printer.c:2214
"DALLOC_CTX", 0,
"uint64_t", 0);
if (uint64p == NULL) {
- DBG_DEBUG("Unexpected mds reponse: %s", dalloc_dump(d, 0));
+ DBG_DEBUG("Unexpected mds response: %s", dalloc_dump(d, 0));
tevent_req_nterror(req, NT_STATUS_INTERNAL_ERROR);
return;
}
"DALLOC_CTX", 0,
"uint64_t", 0);
if (uint64p == NULL) {
- DBG_DEBUG("Unexpected mds reponse: %s", dalloc_dump(d, 0));
+ DBG_DEBUG("Unexpected mds response: %s", dalloc_dump(d, 0));
tevent_req_nterror(req, NT_STATUS_INTERNAL_ERROR);
return;
}
"DALLOC_CTX", 1,
"char *", 0);
if (path == NULL) {
- DBG_DEBUG("No path in mds reponse: %s", dalloc_dump(d, 0));
+ DBG_DEBUG("No path in mds response: %s", dalloc_dump(d, 0));
tevent_req_nterror(req, NT_STATUS_INTERNAL_ERROR);
return;
}
break;
default:
- DEBUG(1, ("unkown complex query type: %u", cpx_query_type));
+ DEBUG(1, ("unknown complex query type: %u", cpx_query_type));
return -1;
}
*/
if (value.dsize != sizeof(void *)) {
- DEBUG(1, ("invalide dsize\n"));
+ DEBUG(1, ("invalid dsize\n"));
return false;
}
memcpy(&p, value.dptr, sizeof(p));
{
/*
* streams_xattr return NT_STATUS_NOT_FOUND for
- * opens of not yet exisiting streams.
+ * opens of not yet existing streams.
*
* ELOOP maps to NT_STATUS_OBJECT_PATH_NOT_FOUND
* and this will result from a open request from
for (j = 0; sd->dacl && j < sd->dacl->num_aces; j++) {
struct security_ace *ace = &sd->dacl->aces[j];
if (ace->flags & SEC_ACE_FLAG_INHERITED_ACE) {
- d_printf("Illegal paramater %s\n", the_acl);
+ d_printf("Illegal parameter %s\n", the_acl);
result = NT_STATUS_UNSUCCESSFUL;
goto out;
}
static const char *session_dialect_str(uint16_t dialect)
{
- static fstring unkown_dialect;
+ static fstring unknown_dialect;
switch(dialect){
case SMB2_DIALECT_REVISION_000:
return "SMB3_11";
}
- fstr_sprintf(unkown_dialect, "Unknown (0x%04x)", dialect);
- return unkown_dialect;
+ fstr_sprintf(unknown_dialect, "Unknown (0x%04x)", dialect);
+ return unknown_dialect;
}
static int traverse_connections(const struct connections_data *crec,
size_t sun_path_len = sizeof(un.sun_path);
if (winbindd_priv_socket_len >= sun_path_len) {
- DBG_ERR("The winbind priviliged socket path [%s/%s] is too long "
+ DBG_ERR("The winbind privileged socket path [%s/%s] is too long "
"(%zu >= %zu)\n",
winbindd_priv_socket_dir,
WINBINDD_SOCKET_NAME,
bool trace = module && ldb_module_flags(ldb) & LDB_FLG_ENABLE_TRACING;
if (data == NULL) {
- DEBUG(0,("partion delete transaction with no private data\n"));
+ DEBUG(0,("partition delete transaction with no private data\n"));
return ldb_operr(ldb);
}
elif opts.dns_backend == "SAMBA_INTERNAL":
# Make sure to remove everything from the bind-dns directory to avoid
# possible security issues with the named group having write access
- # to all AD partions
+ # to all AD partitions
cleanup_remove_file(os.path.join(paths.binddns_dir, "dns.keytab"))
cleanup_remove_file(os.path.join(paths.binddns_dir, "named.conf"))
cleanup_remove_file(os.path.join(paths.binddns_dir, "named.conf.update"))
success,
done,
talloc_asprintf(tctx,
- "after seek (20) readdir name missmatch "
+ "after seek (20) readdir name mismatch "
"file %s - got %s\n",
dirent_20->name,
getdentries[0].name));
success,
done,
talloc_asprintf(tctx,
- "after seek (20) readdirplus name missmatch "
+ "after seek (20) readdirplus name mismatch "
"file %s - got %s\n",
dirent_20->name,
direntries_20->name));
success,
done,
talloc_asprintf(tctx,
- "after seek (20) readdirplus2 name missmatch "
+ "after seek (20) readdirplus2 name mismatch "
"file %s - got %s\n",
dirent_20->name,
direntries_20->name));
success,
done,
talloc_asprintf(tctx,
- "filename '%s' ino missmatch. "
+ "filename '%s' ino mismatch. "
"From smbc_readdirplus2 = %"PRIx64" "
"From smbc_stat = %"PRIx64"",
filename,
struct dcerpc_pipe *pipe2;
struct dcerpc_pipe *pipe3;
- torture_comment(torture, "Testing only appropiate interfaces are "
+ torture_comment(torture, "Testing only appropriate interfaces are "
"available in smb pipes\n");
mem_ctx = talloc_init("torture_samba3_rpc_pipes_supported_interfaces");
encrypted = smb2cli_tcon_is_encryption_on(tree0->smbXcli);
if (encrypted) {
torture_skip(tctx,
- "Can't test SMB 2.02 if encrytion is required");
+ "Can't test SMB 2.02 if encryption is required");
}
options1 = transport0->options;