spelling: connnect encrytion exisit expection explicit invalide missmatch paramater...
authorMichael Tokarev <mjt@tls.msk.ru>
Fri, 1 Apr 2022 07:07:47 +0000 (10:07 +0300)
committerJeremy Allison <jra@samba.org>
Fri, 10 Jun 2022 18:12:33 +0000 (18:12 +0000)
Tree-wide spellcheck for some common misspellings.

source3/utils/status.c has misspelled local variable (unkown_dialect).

"missmatch" is a known historical misspelling, only the incorrect
misspellings are fixed.

source3/locale/net/de.po has the spelling error (unkown) in two msgids -
it probably should be updated with current source.

Signed-off-by: Michael Tokarev <mjt@tls.msk.ru>
Reviewed-by: Andrew Bartlett <abartlet@samba.org>
Reviewed-by: Jeremy Allison <jra@samba.org>
25 files changed:
auth/gensec/gensec.h
docs-xml/build/DTD/samba.entities
docs-xml/manpages/net.8.xml
docs-xml/manpages/smbcacls.1.xml
docs-xml/manpages/vfs_widelinks.8.xml
docs-xml/smbdotconf/security/clientusekerberos.xml
docs-xml/smbdotconf/security/ntlmauth.xml
docs-xml/smbdotconf/security/serverschannel.xml
docs-xml/smbdotconf/tuning/usemmap.xml
libcli/smb/smbXcli_base.c
librpc/idl/netlogon.idl
python/samba/tests/smb-notify.py
source3/locale/net/de.po
source3/rpc_client/cli_mdssvc.c
source3/rpc_server/mdssvc/marshalling.c
source3/rpc_server/mdssvc/mdssvc.c
source3/smbd/files.c
source3/utils/smbcacls.c
source3/utils/status.c
source3/winbindd/winbindd.c
source4/dsdb/samdb/ldb_modules/partition.c
source4/scripting/bin/samba_upgradedns
source4/torture/libsmbclient/libsmbclient.c
source4/torture/rpc/samba3rpc.c
source4/torture/smb2/session.c

index 53fb1e43244f9c2ba8d94c7c9c16c9a5d3b6ca7e..29d5e92c130fff40914e0b5c07391aac2f352838 100644 (file)
@@ -158,7 +158,7 @@ NTSTATUS gensec_update_recv(struct tevent_req *req, TALLOC_CTX *out_mem_ctx, DAT
  * The features must be requested before starting the
  * gensec_update*() loop.
  *
- * The current expection is GENSEC_FEATURE_SIGN_PKT_HEADER,
+ * The current exception is GENSEC_FEATURE_SIGN_PKT_HEADER,
  * it can also be requested once the gensec_update*() loop
  * returned NT_STATUS_OK.
  *
@@ -181,7 +181,7 @@ void gensec_want_feature(struct gensec_security *gensec_security,
  * The features must be requested after the finished
  * gensec_update*() loop.
  *
- * The current expection is GENSEC_FEATURE_SIGN_PKT_HEADER,
+ * The current exception is GENSEC_FEATURE_SIGN_PKT_HEADER,
  * it can also be requested before the gensec_update*() loop,
  * as the return value only indicates if the backend supports
  * dcerpc header signing, not if header signing will be used
index 0a4a21db63e9fecf27ee753394c8a352943f6fca..15a5ba83fb929d0eb56417bdb8156b1ccfc2bbd3 100644 (file)
                        prompted. The client will first check the
                        <envar>USER</envar> environment variable
                        (which is also permitted to also contain the
-                       password seperated by a &pct;), then the
+                       password separated by a &pct;), then the
                        <envar>LOGNAME</envar> variable (which is not
                        permitted to contain a password) and if either exists,
                        the value is used. If these environmental
                         This parameter determines whether Samba client tools
                         will try to authenticate using Kerberos. For Kerberos
                         authentication you need to use dns names instead of IP
-                        addresses when connnecting to a service.
+                        addresses when connecting to a service.
                </para>
 
                <para>
index 1bd829331373dd8f405a66ff72e37878ff2aab92..5a37119aa20aed7713415974eaede03bc3343642 100644 (file)
@@ -3045,7 +3045,7 @@ Provisions a machine account in AD. This command needs network connectivity to t
 
 <listitem><para><replaceable>DEFPWD</replaceable> is an optional parameter that can be set to enforce using the default machine account password. The use of this parameter is not recommended as the default machine account password can be easily guessed. </para></listitem>
 
-<listitem><para><replaceable>REUSE</replaceable> is an optional parameter that can be set to enforce reusing an exisiting machine account in AD.</para></listitem>
+<listitem><para><replaceable>REUSE</replaceable> is an optional parameter that can be set to enforce reusing an existing machine account in AD.</para></listitem>
 
 <listitem><para><replaceable>SAVEFILE</replaceable> is an optional parameter to store the generated provisioning data on disk.</para></listitem>
 
index 9cc2d66a8989f3dd45593651819a30a7a958d324..ef504b41051ae8d8e078a8ba49b1f7133f665e42 100644 (file)
@@ -356,7 +356,7 @@ ACL:&lt;sid or name&gt;:&lt;type&gt;/&lt;flags&gt;/&lt;mask&gt;
                flag is set. </para>
                </listitem>
                <listitem><para>When an ACE with the (OI) flag alone set is
-               progagated to a child folder the inheritance only flag (IO) is
+               propagated to a child folder the inheritance only flag (IO) is
                also applied. This indicates the permissions associated with
                the ACE don't apply to the folder itself (only to it's
                child files). When applying the ACE to a child file the ACE is
index b8973701d236362995d48551f38a9b92cf602522..38246508905ab3e9527282c3a5283ec05edebacc 100644 (file)
@@ -31,7 +31,7 @@
 
        <para>The <command>vfs_widelinks</command> VFS module
        hides the existence of symbolic links in the filesystem
-       inside a share. It is used in Samba verson 4.13 and above
+       inside a share. It is used in Samba version 4.13 and above
        to implement the <filename>smb.conf</filename>"wide links = yes"
        functionality that used to be inside the core smbd code.
        The module should not be loaded explicitly by smb.conf
index 33dd2ac8e230bd70766b77e4edb823add62782f1..ad35dcf3acacb298aef9a9914f5b5e062cdf3d70 100644 (file)
@@ -8,7 +8,7 @@
        <para>
                This parameter determines whether Samba client tools will try
                to authenticate using Kerberos. For Kerberos authentication you
-               need to use dns names instead of IP addresses when connnecting
+               need to use dns names instead of IP addresses when connecting
                to a service.
        </para>
 
index 84b3488e4116aada89dfc3a228bd9efb57abbf31..8d31c98eb0595ad6382ac670de781c47c8d31694 100644 (file)
@@ -9,7 +9,7 @@
     authenticate users using the NTLM encrypted password response for
     this local passdb (SAM or account database). </para>
 
-    <para>If disabled, both NTLM and LanMan authencication against the
+    <para>If disabled, both NTLM and LanMan authentication against the
     local passdb is disabled.</para>
 
     <para>Note that these settings apply only to local users,
index b682d086f76b238155c5234c5875fabed8c2ce92..cd2543113f3eb7a1cc573aae413bec46fe60fa46 100644 (file)
@@ -37,7 +37,7 @@
 <description>
 
     <para>If you still have legacy domain members, which required "server schannel = auto" before,
-       it is possible to specify explicit expection per computer account
+       it is possible to specify explicit exception per computer account
        by using 'server require schannel:COMPUTERACCOUNT = no' as option.
        Note that COMPUTERACCOUNT has to be the sAMAccountName value of
        the computer account (including the trailing '$' sign).
index 9a02501fad991ba0a40b398f89be985fba0ca274..40ca7b99d81cfd1a9e7354250dc2f99a74a3d795 100644 (file)
@@ -6,7 +6,7 @@
     <para>This global parameter determines if the tdb internals of Samba can
     depend on mmap working correctly on the running system. Samba requires a coherent
     mmap/read-write system memory cache. Currently only OpenBSD and HPUX do not have such a
-    coherent cache, and on those platforms this paramter is overridden internally
+    coherent cache, and on those platforms this parameter is overridden internally
     to be effeceively <constant>no</constant>. On all systems this parameter should be left alone. This
     parameter is provided to help the Samba developers track down problems with
     the tdb internal code.
index a8e5aa4fdaa3481dd1fe11fda4b94c8eb9eb0e05..d2f55966c3a26d85e5b55cb91c655ec7c99c6be6 100644 (file)
@@ -1761,7 +1761,7 @@ static NTSTATUS smb1cli_req_writev_submit(struct tevent_req *req,
        }
 
        /*
-        * If we supported multiple encrytion contexts
+        * If we supported multiple encryption contexts
         * here we'd look up based on tid.
         */
        if (common_encryption_on(state->conn->smb1.trans_enc)) {
@@ -2228,7 +2228,7 @@ static NTSTATUS smb1cli_conn_dispatch_incoming(struct smbXcli_conn *conn,
        }
 
        /*
-        * If we supported multiple encrytion contexts
+        * If we supported multiple encryption contexts
         * here we'd look up based on tid.
         */
        if (common_encryption_on(conn->smb1.trans_enc)
index 05c592be7e5092f25362c602d1a98d2ddaa6210f..6756cc538f26bb7aa601cb11a31c227b1abb7a79 100644 (file)
@@ -1132,7 +1132,7 @@ interface netlogon
        /*****************/
        /* Function 0x14 */
 
-       /* one unkown bit still: DS_IP_VERSION_AGNOSTIC - gd*/
+       /* one unknown bit still: DS_IP_VERSION_AGNOSTIC - gd*/
 
        const int DSGETDC_VALID_FLAGS = (DS_FORCE_REDISCOVERY |
                                         DS_DIRECTORY_SERVICE_REQUIRED |
index 2f42263be25fa270d1e4fc18810397fd617ce4b7..c06eabe30c70381734377237c25dd917cc78a43a 100755 (executable)
@@ -295,14 +295,14 @@ class SMBNotifyTests(TestCase):
         set_secinfo = security.SECINFO_GROUP | security.SECINFO_DACL | security.SECINFO_PROTECTED_DACL
         smb_helper.set_acl(private_path, private_path_sd_new, sinfo=set_secinfo)
 
-        # setup notification request as priviliged user
+        # setup notification request as privileged user
         monitor_priv_fnum = self.smb_conn.create(Name=monitor_path, ShareAccess=1)
         notify_priv = self.smb_conn.notify(fnum=monitor_priv_fnum,
                                            buffer_size=0xffff,
                                            completion_filter=libsmb.FILE_NOTIFY_CHANGE_ALL,
                                            recursive=True)
 
-        # setup notification request as unpriviliged user
+        # setup notification request as unprivileged user
         monitor_unpriv_fnum = self.smb_conn_unpriv.create(Name=monitor_path, ShareAccess=1)
         notify_unpriv = self.smb_conn_unpriv.notify(fnum=monitor_unpriv_fnum,
                                                     buffer_size=0xffff,
index c71ffbb9ed84f09ba123303940558c0b567a105f..95d62990dbb70205f78634f5557149fcefed5920 100644 (file)
@@ -6335,7 +6335,7 @@ msgstr ""
 
 #: ../../utils/net_rpc_printer.c:1305
 #, c-format
-msgid "unkown action: %d\n"
+msgid "unknown action: %d\n"
 msgstr ""
 
 #: ../../utils/net_rpc_printer.c:1331
@@ -6365,7 +6365,7 @@ msgstr ""
 
 #: ../../utils/net_rpc_printer.c:1458
 #, c-format
-msgid "unkown state: %d\n"
+msgid "unknown state: %d\n"
 msgstr "unbekannter Status: %d\n"
 
 #: ../../utils/net_rpc_printer.c:1528 ../../utils/net_rpc_printer.c:1675 ../../utils/net_rpc_printer.c:1858 ../../utils/net_rpc_printer.c:2047 ../../utils/net_rpc_printer.c:2214
index 82d14372fe45938accad71842fb9cfe38a280ce2..046d37135cbccc1b0a88d180cb8320eb93f01109 100644 (file)
@@ -347,7 +347,7 @@ static void mdscli_search_cmd_done(struct tevent_req *subreq)
                             "DALLOC_CTX", 0,
                             "uint64_t", 0);
        if (uint64p == NULL) {
-               DBG_DEBUG("Unexpected mds reponse: %s", dalloc_dump(d, 0));
+               DBG_DEBUG("Unexpected mds response: %s", dalloc_dump(d, 0));
                tevent_req_nterror(req, NT_STATUS_INTERNAL_ERROR);
                return;
        }
@@ -531,7 +531,7 @@ static void mdscli_get_results_cmd_done(struct tevent_req *subreq)
                             "DALLOC_CTX", 0,
                             "uint64_t", 0);
        if (uint64p == NULL) {
-               DBG_DEBUG("Unexpected mds reponse: %s", dalloc_dump(d, 0));
+               DBG_DEBUG("Unexpected mds response: %s", dalloc_dump(d, 0));
                tevent_req_nterror(req, NT_STATUS_INTERNAL_ERROR);
                return;
        }
@@ -755,7 +755,7 @@ static void mdscli_get_path_done(struct tevent_req *subreq)
                          "DALLOC_CTX", 1,
                          "char *", 0);
        if (path == NULL) {
-               DBG_DEBUG("No path in mds reponse: %s", dalloc_dump(d, 0));
+               DBG_DEBUG("No path in mds response: %s", dalloc_dump(d, 0));
                tevent_req_nterror(req, NT_STATUS_INTERNAL_ERROR);
                return;
        }
index 1aa750413cda48e7189d3b79846a533769389b79..9ba6ef571f2466f299d2992bc44e15754242b542 100644 (file)
@@ -1050,7 +1050,7 @@ static ssize_t sl_unpack_cpx(DALLOC_CTX *query,
                break;
 
        default:
-               DEBUG(1, ("unkown complex query type: %u", cpx_query_type));
+               DEBUG(1, ("unknown complex query type: %u", cpx_query_type));
                return -1;
        }
 
index d159b86e64d7c1c9d7cc8cee15ea21cb30a6b14f..21212cb5c033a8c8b4c105143fdbf4749d85e8b7 100644 (file)
@@ -464,7 +464,7 @@ static bool inode_map_add(struct sl_query *slq, uint64_t ino, const char *path)
                 */
 
                if (value.dsize != sizeof(void *)) {
-                       DEBUG(1, ("invalide dsize\n"));
+                       DEBUG(1, ("invalid dsize\n"));
                        return false;
                }
                memcpy(&p, value.dptr, sizeof(p));
index 7a41cff565444cf611924aefd6bab67a8cc51e4d..f4737278dd0986dfb10c884b9cb175a8fbb00518 100644 (file)
@@ -552,7 +552,7 @@ NTSTATUS openat_pathref_fsp(const struct files_struct *dirfsp,
                {
                        /*
                         * streams_xattr return NT_STATUS_NOT_FOUND for
-                        * opens of not yet exisiting streams.
+                        * opens of not yet existing streams.
                         *
                         * ELOOP maps to NT_STATUS_OBJECT_PATH_NOT_FOUND
                         * and this will result from a open request from
index 004f2ff12664f02b637802fb3eda604325e62d92..7ce7d2415dc5e4084505d215761e9d462c195bf4 100644 (file)
@@ -1174,7 +1174,7 @@ static NTSTATUS prepare_inheritance_propagation(TALLOC_CTX *ctx, char *filename,
        for (j = 0; sd->dacl && j < sd->dacl->num_aces; j++) {
                struct security_ace *ace = &sd->dacl->aces[j];
                if (ace->flags & SEC_ACE_FLAG_INHERITED_ACE) {
-                       d_printf("Illegal paramater %s\n", the_acl);
+                       d_printf("Illegal parameter %s\n", the_acl);
                        result = NT_STATUS_UNSUCCESSFUL;
                        goto out;
                }
index f982edfa834082e7b64325e3f1846a08b066941b..e860436d72bdff703982a2537e24aed1621f6916 100644 (file)
@@ -288,7 +288,7 @@ static void print_brl(struct file_id id,
 
 static const char *session_dialect_str(uint16_t dialect)
 {
-       static fstring unkown_dialect;
+       static fstring unknown_dialect;
 
        switch(dialect){
        case SMB2_DIALECT_REVISION_000:
@@ -311,8 +311,8 @@ static const char *session_dialect_str(uint16_t dialect)
                return "SMB3_11";
        }
 
-       fstr_sprintf(unkown_dialect, "Unknown (0x%04x)", dialect);
-       return unkown_dialect;
+       fstr_sprintf(unknown_dialect, "Unknown (0x%04x)", dialect);
+       return unknown_dialect;
 }
 
 static int traverse_connections(const struct connections_data *crec,
index 710df3c74d5b251ad0258c2467d1011a1d7dee56..d32a493118f93071952b5f3430559f60bf0b7bbf 100644 (file)
@@ -1511,7 +1511,7 @@ int main(int argc, const char **argv)
                size_t sun_path_len = sizeof(un.sun_path);
 
                if (winbindd_priv_socket_len >= sun_path_len) {
-                       DBG_ERR("The winbind priviliged socket path [%s/%s] is too long "
+                       DBG_ERR("The winbind privileged socket path [%s/%s] is too long "
                                "(%zu >= %zu)\n",
                                winbindd_priv_socket_dir,
                                WINBINDD_SOCKET_NAME,
index 2544a106d131e11f0e1f30d4b40aa77b4caf47c8..0f9d9c199a90aacabee35f6b62bff7afef9e789f 100644 (file)
@@ -1224,7 +1224,7 @@ int partition_del_trans(struct ldb_module *module)
        bool trace = module && ldb_module_flags(ldb) & LDB_FLG_ENABLE_TRACING;
 
        if (data == NULL) {
-               DEBUG(0,("partion delete transaction with no private data\n"));
+               DEBUG(0,("partition delete transaction with no private data\n"));
                return ldb_operr(ldb);
        }
 
index ac2fdfca5efbb2e571347be4235c230b59e37599..afc580779b7bdbba8e9e86a863e3247c4ca61ef4 100755 (executable)
@@ -527,7 +527,7 @@ if __name__ == '__main__':
     elif opts.dns_backend == "SAMBA_INTERNAL":
         # Make sure to remove everything from the bind-dns directory to avoid
         # possible security issues with the named group having write access
-        # to all AD partions
+        # to all AD partitions
         cleanup_remove_file(os.path.join(paths.binddns_dir, "dns.keytab"))
         cleanup_remove_file(os.path.join(paths.binddns_dir, "named.conf"))
         cleanup_remove_file(os.path.join(paths.binddns_dir, "named.conf.update"))
index b04dbde04acba33f9a72d4e0436888d4edb6a34b..82f64c38b692cc8f024587854d5c8e205f97b797 100644 (file)
@@ -668,7 +668,7 @@ static bool torture_libsmbclient_readdirplus_seek(struct torture_context *tctx)
                success,
                done,
                talloc_asprintf(tctx,
-                               "after seek (20) readdir name missmatch "
+                               "after seek (20) readdir name mismatch "
                                "file %s - got %s\n",
                                dirent_20->name,
                                getdentries[0].name));
@@ -700,7 +700,7 @@ static bool torture_libsmbclient_readdirplus_seek(struct torture_context *tctx)
                success,
                done,
                talloc_asprintf(tctx,
-                               "after seek (20) readdirplus name missmatch "
+                               "after seek (20) readdirplus name mismatch "
                                "file %s - got %s\n",
                                dirent_20->name,
                                direntries_20->name));
@@ -733,7 +733,7 @@ static bool torture_libsmbclient_readdirplus_seek(struct torture_context *tctx)
                success,
                done,
                talloc_asprintf(tctx,
-                               "after seek (20) readdirplus2 name missmatch "
+                               "after seek (20) readdirplus2 name mismatch "
                                "file %s - got %s\n",
                                dirent_20->name,
                                direntries_20->name));
@@ -937,7 +937,7 @@ static bool torture_libsmbclient_readdirplus2(struct torture_context *tctx)
                success,
                done,
                talloc_asprintf(tctx,
-                       "filename '%s' ino missmatch. "
+                       "filename '%s' ino mismatch. "
                        "From smbc_readdirplus2 = %"PRIx64" "
                        "From smbc_stat = %"PRIx64"",
                        filename,
index ff5dc1d680030a1d1fe5be1049303ddb7edb8495..39e43e5fcdbe61cbe8fd3993db5043815f61abc6 100644 (file)
@@ -4626,7 +4626,7 @@ static bool torture_rpc_pipes_supported_interfaces(
        struct dcerpc_pipe *pipe2;
        struct dcerpc_pipe *pipe3;
 
-       torture_comment(torture, "Testing only appropiate interfaces are "
+       torture_comment(torture, "Testing only appropriate interfaces are "
                        "available in smb pipes\n");
 
        mem_ctx = talloc_init("torture_samba3_rpc_pipes_supported_interfaces");
index fdfd947d5e3759ecf89b53b22f77a04381b7ec3a..92f9e638ff47f0c67c0531e45605e31056e2565c 100644 (file)
@@ -2724,7 +2724,7 @@ static bool test_session_bind_negative_smb202(struct torture_context *tctx, stru
        encrypted = smb2cli_tcon_is_encryption_on(tree0->smbXcli);
        if (encrypted) {
                torture_skip(tctx,
-                            "Can't test SMB 2.02 if encrytion is required");
+                            "Can't test SMB 2.02 if encryption is required");
        }
 
        options1 = transport0->options;