error = r2_ctx->ops->get_predefined_key(r2_ctx, HKEY_LOCAL_MACHINE, &key);
torture_assert_werr_ok(tctx, error, "Opening HKEY_LOCAL_MACHINE failed");
error = r2_ctx->ops->create_key(r2_ctx, key, "Software", NULL, NULL, &newkey);
- torture_assert_werr_ok(tctx, error, "Creating HKLM\\Sofware failed");
+ torture_assert_werr_ok(tctx, error, "Creating HKLM\\Software failed");
error = r2_ctx->ops->create_key(r2_ctx, newkey, "Microsoft", NULL, NULL, &newkey);
torture_assert_werr_ok(tctx, error, "Creating HKLM\\Software\\Microsoft failed");
error = r2_ctx->ops->create_key(r2_ctx, newkey, "Windows", NULL, NULL, &newkey);
return STATUS_MORE_ENTRIES;
}
/* The random size sends are incompatible with TLS and SASL
- * sockets, which require re-sends to be consistant */
+ * sockets, which require re-sends to be consistent */
if (!(sock->flags & SOCKET_FLAG_ENCRYPT)) {
blob2.length = 1+(random() % blob2.length);
} else {
/*
call dup() on a socket, and close the old fd. This is used to change
the fd to the lowest available number, to make select() more
- efficient (select speed depends on the maxiumum fd number passed to
+ efficient (select speed depends on the maximum fd number passed to
it)
*/
_PUBLIC_ NTSTATUS socket_dup(struct socket_context *sock)
#define SOCKET_FLAG_ENCRYPT 0x00000008 /* This socket
* implementation requires
* that re-sends be
- * consistant, because it
+ * consistent, because it
* is encrypting data.
* This modifies the
* TESTNONBLOCK case */
call send_callback.
Useful for operations that must occur after sending a message, such
- as the switch to SASL encryption after as sucessful LDAP bind relpy.
+ as the switch to SASL encryption after as successful LDAP bind reply.
*/
_PUBLIC_ NTSTATUS packet_send_callback(struct packet_context *pc, DATA_BLOB blob,
packet_send_callback_fn_t send_callback,