struct ctdb_banning_state,
len);
if (t == NULL) {
- DBG_WARNING("Memory allocation errror");
+ DBG_WARNING("Memory allocation error");
return;
}
rec->banning_state = t;
"types. Future, write based functions need a writable backend (registry).\n"
"\n"
"Note that the registry backend will be provided by a different\n"
-"library module from the source3 tree (implemenation TBD).\n");
+"library module from the source3 tree (implementation TBD).\n");
static struct PyModuleDef moduledef = {
PyModuleDef_HEAD_INIT,
/*
* The "waiter" child.
*/
- process_set_title("tfork waiter", "tfork waiter proces");
+ process_set_title("tfork waiter", "tfork waiter process");
CatchSignal(SIGCHLD, SIG_DFL);
.argInfo = POPT_ARG_STRING,
.arg = &string_arg,
.val = OPT_CHANGE_SECRET_AT,
- .descrip = "Change shared secret at Domain Controler" },
+ .descrip = "Change shared secret at Domain Controller" },
{
.longName = "ping-dc",
.shortName = 'P',
* test SEC_FLAG_MAXIMUM_ALLOWED with not-granted access
*
* When access_mask contains SEC_FLAG_MAXIMUM_ALLOWED, the server must still
- * proces other bits from access_mask. Eg if access_mask contains a right that
+ * process other bits from access_mask. Eg if access_mask contains a right that
* the requester doesn't have, the function must validate that against the
* effective permissions.
*/