NTSTATUS status;
/*
- * here we basicaly need to return our certificate
+ * here we basically need to return our certificate
* search for lsa secret BCKUPKEY_PREFERRED first
*/
/*
* We need to make sure every argument
- * stays arround for the lifetime of 'samdb',
+ * stays around for the lifetime of 'samdb',
* typically it is allocated on the scope of
* an assoc group, so we can't reference dce_call->conn,
* as the assoc group may stay when the current connection
return WERR_NOT_ENOUGH_MEMORY;
}
-/* Intialize tree with given name as the root */
+/* Initialize tree with given name as the root */
static struct dns_tree *dns_tree_init(TALLOC_CTX *mem_ctx, const char *name, void *data)
{
struct dns_tree *tree;
/*
* The "process identifier" of the client.
- * According to the WSPP docs, sectin 5.35, this is
+ * According to the WSPP docs, section 5.35, this is
* for informational and debugging purposes only.
* The assignment is implementation specific.
*/
v = ldb_msg_find_attr_as_string(msg, "isDeleted", "FALSE");
if (strncmp(v, "TRUE", 4) == 0) {
/*
- * Note: we skip the transmition of the deleted link even if the other part used to
+ * Note: we skip the transmission of the deleted link even if the other part used to
* know about it because when we transmit the deletion of the object, the link will
* be deleted too due to deletion of object where link points and Windows do so.
*/
v = ldb_msg_find_attr_as_string(msg, "isRecycled", "FALSE");
/*
* On Windows 2008R2 isRecycled is always present even if FL or DL are < FL 2K8R2
- * if it join an existing domain with deleted objets, it firsts impose to have a
+ * if it join an existing domain with deleted objects, it firsts impose to have a
* schema with the is-Recycled object and for all deleted objects it adds the isRecycled
* either during initial replication or after the getNCChanges.
* Behavior of samba has been changed to always have this attribute if it's present in the schema.
*
* If this object has changed lately we better
* let the destination dsa refetch the change.
- * This is better than the risk of loosing some
+ * This is better than the risk of losing some
* objects or linked attributes.
*/
return;
struct lsa_CloseTrustedDomainEx *r)
{
/* The result of a bad hair day from an IDL programmer? Not
- * implmented in Win2k3. You should always just lsa_Close
+ * implemented in Win2k3. You should always just lsa_Close
* anyway. */
return NT_STATUS_NOT_IMPLEMENTED;
}
case SECURITY_ADMINISTRATOR:
break;
default:
- /* Users and annonymous are not allowed create secrets */
+ /* Users and anonymous are not allowed create secrets */
return NT_STATUS_ACCESS_DENIED;
}
case SECURITY_ADMINISTRATOR:
break;
default:
- /* Users and annonymous are not allowed to access secrets */
+ /* Users and anonymous are not allowed to access secrets */
return NT_STATUS_ACCESS_DENIED;
}
case SECURITY_ADMINISTRATOR:
break;
default:
- /* Users and annonymous are not allowed to read secrets */
+ /* Users and anonymous are not allowed to read secrets */
return NT_STATUS_ACCESS_DENIED;
}
return status;
}
-/* A random hexidecimal number (honest!) */
+/* A random hexadecimal number (honest!) */
#define LSA_SERVER_IMPLICIT_POLICY_STATE_MAGIC 0xc0c99e00
/*
/*
* This will talloc_steal() policy_state onto the
* connection, which has longer lifetime than the
- * immidiate caller requires
+ * immediate caller requires
*/
status = dcesrv_iface_state_store_conn(dce_call,
LSA_SERVER_IMPLICIT_POLICY_STATE_MAGIC,
reject_des_client = !allow_nt4_crypto;
/*
- * If weak cryto is disabled, do not announce that we support RC4.
+ * If weak crypto is disabled, do not announce that we support RC4.
*/
if (lpcfg_weak_crypto(lp_ctx) == SAMBA_WEAK_CRYPTO_DISALLOWED) {
/* Without RC4 and DES we require AES */
NETLOGON_NEG_AUTHENTICATED_RPC;
/*
- * If weak cryto is disabled, do not announce that we support RC4.
+ * If weak crypto is disabled, do not announce that we support RC4.
*/
if (lpcfg_weak_crypto(dce_call->conn->dce_ctx->lp_ctx) ==
SAMBA_WEAK_CRYPTO_DISALLOWED) {
return NT_STATUS_OK;
}
- /* Until we get an implemetnation of these other packages */
+ /* Until we get an implementation of these other packages */
return NT_STATUS_INVALID_PARAMETER;
}
default:
}
/*
- * TODO: Should we also varify that only valid
+ * TODO: Should we also verify that only valid
* netbios name characters are used?
*/
}
ZERO_STRUCTP(domain_info);
- /* Informations about the local and trusted domains */
+ /* Information about the local and trusted domains */
status = fill_our_one_domain_info(mem_ctx,
our_tdo,
This call uses transactions to ensure we don't get a new conflicting
user while we are processing this, and to ensure the user either
- completly exists, or does not.
+ completely exists, or does not.
*/
static NTSTATUS dcesrv_samr_CreateUser2(struct dcesrv_call_state *dce_call, TALLOC_CTX *mem_ctx,
struct samr_CreateUser2 *r)
return status;
}
-#if 0 /* TODO: fix access cecking */
+#if 0 /* TODO: fix access checking */
if (!socket_check_access(dce_call->connection->socket,
scfg->name,
share_string_list_option(scfg, SHARE_HOSTS_ALLOW),
talloc_set_destructor(c, srvsvc_ntvfs_ctx_destructor);
/*
- * NOTE: we only set the addr callbacks as we're not interesseted in oplocks or in getting file handles
+ * NOTE: we only set the addr callbacks as we're not interested in oplocks or in getting file handles
*/
local_address = dcesrv_connection_get_local_address(dce_call->conn);
remote_address = dcesrv_connection_get_remote_address(dce_call->conn);
struct dcesrv_context *dce_ctx = dce_call->conn->dce_ctx;
struct dcerpc_server_info *server_info = lpcfg_dcerpc_server_info(mem_ctx, dce_ctx->lp_ctx);
- /* NOTE: win2k3 ignores r->in.server_name completly so we do --metze */
+ /* NOTE: win2k3 ignores r->in.server_name completely so we do --metze */
switch(r->in.level) {
case 100: