ret = event_config_init(e_state, &e_state->config);
if (ret != 0) {
- D_ERR("Failed to initalize event config\n");
+ D_ERR("Failed to initialize event config\n");
goto fail;
}
e_state->ev = tevent_context_init(e_state->mem_ctx);
if (e_state->ev == NULL) {
- D_ERR("Failed to initalize tevent\n");
+ D_ERR("Failed to initialize tevent\n");
ret = 1;
goto fail;
}
result->error = ERROR_DNS_SUCCESS;
/*
- * Small inital size to excercise the realloc code
+ * Small initial size to exercise the realloc code
*/
result->size = 2;
* mutex patches, the freelist was already blocked here by the
* allrecord child, which was waiting for the chainlock child to give
* up its chainlock. Make sure that we don't run into this
- * deadlock. To excercise the deadlock, just comment out the "ok"
+ * deadlock. To exercise the deadlock, just comment out the "ok"
* line.
*
* The freelist lock/mutex is independent from the allrecord lock/mutex.
/*
* tevent_re_initialise used to have a bug where it did not
* re-initialise the thread support after taking it
- * down. Excercise that code path.
+ * down. Exercise that code path.
*/
ret = tevent_re_initialise(ev);
torture_assert(test, ret == 0, "tevent_re_initialise failed");
*
* @param[in] stream The stream to read data from.
*
- * @param[in] inital_read_size The initial byte count that is needed to workout
+ * @param[in] initial_read_size The initial byte count that is needed to workout
* the full pdu size.
*
* @param[in] full_fn The callback function that will report the size
struct tevent_req *tstream_read_pdu_blob_send(TALLOC_CTX *mem_ctx,
struct tevent_context *ev,
struct tstream_context *stream,
- size_t inital_read_size,
+ size_t initial_read_size,
tstream_read_pdu_blob_full_fn_t *full_fn,
void *full_private);
/**
# (objectClass).
if list_attid_from_md[0] != 0:
error_count += 1
- self.report("ERROR: Not fixing incorrect inital attributeID in '%s' on '%s', it should be objectClass" %
+ self.report("ERROR: Not fixing incorrect initial attributeID in '%s' on '%s', it should be objectClass" %
(attrname, str(dn)))
got_repl_property_meta_data = True
* snapshot at the given timestamp of the input path.
*
* In the case of a parallel snapdir (specified with an
- * absolute path), this is the inital portion of the
+ * absolute path), this is the initial portion of the
* local path of any snapshot file. The complete path is
* obtained by appending the portion of the file's path
* below the share root's mountpoint.
}
/**
- * Get flags showing what is initalised in the struct samu
+ * Get flags showing what is initialised in the struct samu
* @param sampass the struct samu in question
* @return the flags indicating the members initialised in the struct.
**/
}
/**
- * Set flags showing what is initalised in the struct samu
+ * Set flags showing what is initialised in the struct samu
* @param sampass the struct samu in question
* @param flag The *new* flag to be set. Old flags preserved
* this flag is only added.
return NULL;
}
- /* Initalize list of methods */
+ /* Initialize list of methods */
status = make_pdb_method_name(&methods, url);
if (!NT_STATUS_IS_OK(status)) {
PyErr_Format(py_pdb_error, "Cannot load backend methods for '%s' backend (%d,%s)",
Return domain SID from secrets database." },
{ "reload_static_pdb", py_reload_static_pdb, METH_NOARGS,
"reload_static_pdb() -> None\n\n \
- Re-initalise the static pdb used internally. Needed if 'passdb backend' is changed." },
+ Re-initialise the static pdb used internally. Needed if 'passdb backend' is changed." },
{ NULL },
};
return status;
}
}
- /* Note that here we set the *inital* delete on close flag,
+ /* Note that here we set the *initial* delete on close flag,
not the regular one. The magic gets handled in close. */
fsp->initial_delete_on_close = True;
}
}
if (NT_STATUS_IS_OK(status)) {
- /* Note that here we set the *inital* delete on close flag,
+ /* Note that here we set the *initial* delete on close flag,
not the regular one. The magic gets handled in close. */
fsp->initial_delete_on_close = True;
}
status = can_set_delete_on_close(fsp, 0);
if (NT_STATUS_IS_OK(status)) {
- /* Note that here we set the *inital* delete on close flag,
+ /* Note that here we set the *initial* delete on close flag,
* not the regular one. The magic gets handled in close. */
fsp->initial_delete_on_close = True;
}
* @brief RPC based subcommands for the 'net' utility.
*
* This file should contain much of the functionality that used to
- * be found in rpcclient, execpt that the commands should change
- * less often, and the fucntionality should be sane (the user is not
+ * be found in rpcclient, except that the commands should change
+ * less often, and the functionality should be sane (the user is not
* expected to know a rid/sid before they conduct an operation etc.)
*
* @todo Perhaps eventually these should be split out into a number
}
/**
- * Force a change of the trust acccount password.
+ * Force a change of the trust account password.
*
* All parameters are provided by the run_rpc_command function, except for
* argc, argv which are passed through.
}
/**
- * Force a change of the trust acccount password.
+ * Force a change of the trust account password.
*
* @param argc Standard main() style argc.
* @param argv Standard main() style argv. Initial components are already
* the message to be displayed when oldjoin was explicitly
* requested, but not when it was implied by "net rpc join".
*
- * This uses 'machinename' as the inital password, and changes it.
+ * This uses 'machinename' as the initial password, and changes it.
*
* The password should be created with 'server manager' or equiv first.
*
}
/*
- check what type of join - if the user want's to join as
+ check what type of join - if the user wants to join as
a BDC, the server must agree that we are a BDC.
*/
if (argc >= 0) {
}
/*
- check what type of join - if the user want's to join as
+ check what type of join - if the user wants to join as
a BDC, the server must agree that we are a BDC.
*/
if (argc >= 0) {
}
/*
- * We inject the inital NEGOTIATE message our caller used
- * in order to get the state machine into the correct possition.
+ * We inject the initial NEGOTIATE message our caller used
+ * in order to get the state machine into the correct position.
*/
reply = data_blob_null;
status = gensec_update(auth_generic_state->gensec_security,
headers='rpcsvc/rquota.h',
lib='tirpc')
- # Required fucntion for NFS quote support
+ # Required function for NFS quote support
conf.CHECK_CODE('''
clnt_create("", RQUOTAPROG, RQUOTAVERS, "udp");
''',
}
/*
- * Check this after the modules have be initalised so we
+ * Check this after the modules have be initialised so we
* can actually read the backend DB.
*/
data->userPassword_support
/**
* Sends a request to open a domain in desired service
*
- * @param ctx initalised libnet context
+ * @param ctx initialised libnet context
* @param io arguments and results of the call
* @param monitor pointer to monitor function that is passed monitor message
*/
/**
* Sends a request to list domains on given host
*
- * @param ctx initalised libnet context
+ * @param ctx initialised libnet context
* @param mem_ctx memory context
* @param io arguments and results of the call
* @param monitor pointer to monitor function that is passed monitor messages
}
/*
- * This is a test to excercise some weird Samba3 error paths.
+ * This is a test to exercise some weird Samba3 error paths.
*/
static bool torture_samba3_errorpaths(struct torture_context *tctx)
# This test is a little different in that we're particularly interested
# in exercising the replmd client code on the second DC.
# First, make sure the peer DC has the base OU, then connect to it (so
- # we store its inital HWM)
+ # we store its initial HWM)
self.sync_DCs()
peer_conn = DcConnection(self, self.ldb_dc1, self.dnsname_dc1)