Fix typos.
authorKarolin Seeger <kseeger@samba.org>
Fri, 18 Jul 2008 13:31:36 +0000 (15:31 +0200)
committerKarolin Seeger <kseeger@samba.org>
Fri, 18 Jul 2008 13:36:20 +0000 (15:36 +0200)
the user have -> has

Karolin

source/rpc_server/srv_lsa_nt.c

index 95e10ac28e298eca91d590400e65fb6f8b216b7a..94517f347879f1d779b217a46eea169548d8714f 100644 (file)
@@ -487,7 +487,7 @@ NTSTATUS _lsa_EnumTrustDom(pipes_struct *p,
        if (!find_policy_by_hnd(p, r->in.handle, (void **)(void *)&info))
                return NT_STATUS_INVALID_HANDLE;
 
-       /* check if the user have enough rights */
+       /* check if the user has enough rights */
        if (!(info->access & LSA_POLICY_VIEW_LOCAL_INFORMATION))
                return NT_STATUS_ACCESS_DENIED;
 
@@ -568,7 +568,7 @@ NTSTATUS _lsa_QueryInfoPolicy(pipes_struct *p,
 
                uint32 policy_def = LSA_AUDIT_POLICY_ALL;
 
-               /* check if the user have enough rights */
+               /* check if the user has enough rights */
                if (!(handle->access & LSA_POLICY_VIEW_AUDIT_INFORMATION)) {
                        DEBUG(10,("_lsa_QueryInfoPolicy: insufficient access rights\n"));
                        return NT_STATUS_ACCESS_DENIED;
@@ -596,7 +596,7 @@ NTSTATUS _lsa_QueryInfoPolicy(pipes_struct *p,
                break;
                }
        case 0x03:
-               /* check if the user have enough rights */
+               /* check if the user has enough rights */
                if (!(handle->access & LSA_POLICY_VIEW_LOCAL_INFORMATION))
                        return NT_STATUS_ACCESS_DENIED;
 
@@ -632,7 +632,7 @@ NTSTATUS _lsa_QueryInfoPolicy(pipes_struct *p,
                init_dom_query_3(&info->domain, name, sid);
                break;
        case 0x05:
-               /* check if the user have enough rights */
+               /* check if the user has enough rights */
                if (!(handle->access & LSA_POLICY_VIEW_LOCAL_INFORMATION))
                        return NT_STATUS_ACCESS_DENIED;
 
@@ -643,7 +643,7 @@ NTSTATUS _lsa_QueryInfoPolicy(pipes_struct *p,
                init_dom_query_5(&info->account_domain, name, sid);
                break;
        case 0x06:
-               /* check if the user have enough rights */
+               /* check if the user has enough rights */
                if (!(handle->access & LSA_POLICY_VIEW_LOCAL_INFORMATION))
                        return NT_STATUS_ACCESS_DENIED;
 
@@ -884,7 +884,7 @@ NTSTATUS _lsa_LookupSids2(pipes_struct *p,
                        return NT_STATUS_INVALID_HANDLE;
                }
 
-               /* check if the user have enough rights */
+               /* check if the user has enough rights */
                if (!(handle->access & LSA_POLICY_LOOKUP_NAMES)) {
                        return NT_STATUS_ACCESS_DENIED;
                }
@@ -1016,7 +1016,7 @@ NTSTATUS _lsa_LookupNames(pipes_struct *p,
                goto done;
        }
 
-       /* check if the user have enough rights */
+       /* check if the user has enough rights */
        if (!(handle->access & LSA_POLICY_LOOKUP_NAMES)) {
                status = NT_STATUS_ACCESS_DENIED;
                goto done;
@@ -1155,7 +1155,7 @@ NTSTATUS _lsa_LookupNames3(pipes_struct *p,
                        goto done;
                }
 
-               /* check if the user have enough rights */
+               /* check if the user has enough rights */
                if (!(handle->access & LSA_POLICY_LOOKUP_NAMES)) {
                        status = NT_STATUS_ACCESS_DENIED;
                        goto done;
@@ -1308,7 +1308,7 @@ NTSTATUS _lsa_EnumPrivs(pipes_struct *p,
        if (!find_policy_by_hnd(p, r->in.handle, (void **)(void *)&handle))
                return NT_STATUS_INVALID_HANDLE;
 
-       /* check if the user have enough rights
+       /* check if the user has enough rights
           I don't know if it's the right one. not documented.  */
 
        if (!(handle->access & LSA_POLICY_VIEW_LOCAL_INFORMATION))
@@ -1364,7 +1364,7 @@ NTSTATUS _lsa_LookupPrivDisplayName(pipes_struct *p,
        if (!find_policy_by_hnd(p, r->in.handle, (void **)(void *)&handle))
                return NT_STATUS_INVALID_HANDLE;
 
-       /* check if the user have enough rights */
+       /* check if the user has enough rights */
 
        /*
         * I don't know if it's the right one. not documented.
@@ -1514,7 +1514,7 @@ NTSTATUS _lsa_CreateAccount(pipes_struct *p,
        if (!find_policy_by_hnd(p, r->in.handle, (void **)(void *)&handle))
                return NT_STATUS_INVALID_HANDLE;
 
-       /* check if the user have enough rights */
+       /* check if the user has enough rights */
 
        /*
         * I don't know if it's the right one. not documented.
@@ -1563,7 +1563,7 @@ NTSTATUS _lsa_OpenAccount(pipes_struct *p,
        if (!find_policy_by_hnd(p, r->in.handle, (void **)(void *)&handle))
                return NT_STATUS_INVALID_HANDLE;
 
-       /* check if the user have enough rights */
+       /* check if the user has enough rights */
 
        /*
         * I don't know if it's the right one. not documented.
@@ -1812,7 +1812,7 @@ NTSTATUS _lsa_QuerySecurity(pipes_struct *p,
        if (!find_policy_by_hnd(p, r->in.handle, (void **)(void *)&handle))
                return NT_STATUS_INVALID_HANDLE;
 
-       /* check if the user have enough rights */
+       /* check if the user has enough rights */
        if (!(handle->access & LSA_POLICY_VIEW_LOCAL_INFORMATION))
                return NT_STATUS_ACCESS_DENIED;
 
@@ -1869,7 +1869,7 @@ NTSTATUS _lsa_QuerySecurity(pipes_struct *p,
 
        switch (q_u->info_class) {
        case 0x0c:
-               /* check if the user have enough rights */
+               /* check if the user has enough rights */
                if (!(handle->access & LSA_POLICY_VIEW_LOCAL_INFORMATION))
                        return NT_STATUS_ACCESS_DENIED;