The branch, master has been updated
       via  340797f... Fix typo in comments.
      from  892213c... testprogs: fix boolean return code of test_PrinterData.

http://gitweb.samba.org/?p=samba.git;a=shortlog;h=master


- Log -----------------------------------------------------------------
commit 340797f3fa39278c214c12cbe374a29f0988ecd3
Author: Karolin Seeger <[email protected]>
Date:   Wed Mar 3 16:03:13 2010 +0100

    Fix typo in comments.

-----------------------------------------------------------------------

Summary of changes:
 lib/zlib/contrib/ada/zlib-streams.ads |    6 +++---
 lib/zlib/contrib/ada/zlib-thin.ads    |    2 +-
 libcli/auth/ntlm_check.c              |    2 +-
 source3/libsmb/ntlmssp_sign.c         |    4 ++--
 source3/utils/net.c                   |    2 +-
 source4/auth/ntlmssp/ntlmssp_sign.c   |    4 ++--
 6 files changed, 10 insertions(+), 10 deletions(-)


Changeset truncated at 500 lines:

diff --git a/lib/zlib/contrib/ada/zlib-streams.ads 
b/lib/zlib/contrib/ada/zlib-streams.ads
index f0193c6..f3352d3 100644
--- a/lib/zlib/contrib/ada/zlib-streams.ads
+++ b/lib/zlib/contrib/ada/zlib-streams.ads
@@ -31,7 +31,7 @@ package ZLib.Streams is
       Mode   : in     Flush_Mode := Sync_Flush);
    --  Flush the written data to the back stream,
    --  all data placed to the compressor is flushing to the Back stream.
-   --  Should not be used untill necessary, becouse it is decreasing
+   --  Should not be used untill necessary, because it is decreasing
    --  compression.
 
    function Read_Total_In (Stream : in Stream_Type) return Count;
@@ -97,13 +97,13 @@ private
       Rest_Last  : Stream_Element_Offset;
       --  Buffer for Read operation.
       --  We need to have this buffer in the record
-      --  becouse not all read data from back stream
+      --  because not all read data from back stream
       --  could be processed during the read operation.
 
       Buffer_Size : Stream_Element_Offset;
       --  Buffer size for write operation.
       --  We do not need to have this buffer
-      --  in the record becouse all data could be
+      --  in the record because all data could be
       --  processed in the write operation.
 
       Back       : Stream_Access;
diff --git a/lib/zlib/contrib/ada/zlib-thin.ads 
b/lib/zlib/contrib/ada/zlib-thin.ads
index d4407eb..810173c 100644
--- a/lib/zlib/contrib/ada/zlib-thin.ads
+++ b/lib/zlib/contrib/ada/zlib-thin.ads
@@ -436,7 +436,7 @@ private
 
    pragma Import (C, inflateBackInit, "inflateBackInit_");
 
-   --  I stopped binding the inflateBack routines, becouse realize that
+   --  I stopped binding the inflateBack routines, because realize that
    --  it does not support zlib and gzip headers for now, and have no
    --  symmetric deflateBack routines.
    --  ZLib-Ada is symmetric regarding deflate/inflate data transformation
diff --git a/libcli/auth/ntlm_check.c b/libcli/auth/ntlm_check.c
index 978f0fe..9f968ef 100644
--- a/libcli/auth/ntlm_check.c
+++ b/libcli/auth/ntlm_check.c
@@ -416,7 +416,7 @@ NTSTATUS ntlm_password_check(TALLOC_CTX *mem_ctx,
                } else {
                        DEBUG(2,("ntlm_password_check: NTLMv1 passwords NOT 
PERMITTED for user %s\n",
                                 username));                    
-                       /* no return, becouse we might pick up LMv2 in the LM 
field */
+                       /* no return, because we might pick up LMv2 in the LM 
field */
                }
        }
        
diff --git a/source3/libsmb/ntlmssp_sign.c b/source3/libsmb/ntlmssp_sign.c
index 3fd22ce..7aa3386 100644
--- a/source3/libsmb/ntlmssp_sign.c
+++ b/source3/libsmb/ntlmssp_sign.c
@@ -256,7 +256,7 @@ NTSTATUS ntlmssp_seal_packet(struct ntlmssp_state 
*ntlmssp_state,
        dump_data_pw("ntlmssp clear data\n", data, length);
        if (ntlmssp_state->neg_flags & NTLMSSP_NEGOTIATE_NTLM2) {
                /* The order of these two operations matters - we must first 
seal the packet,
-                  then seal the sequence number - this is becouse the 
send_seal_hash is not
+                  then seal the sequence number - this is because the 
send_seal_hash is not
                   constant, but is is rather updated with each iteration */
                NTSTATUS nt_status = 
ntlmssp_make_packet_signature(ntlmssp_state,
                                                        data, length,
@@ -278,7 +278,7 @@ NTSTATUS ntlmssp_seal_packet(struct ntlmssp_state 
*ntlmssp_state,
                }
 
                /* The order of these two operations matters - we must first 
seal the packet,
-                  then seal the sequence number - this is becouse the 
ntlmv1_arc4_state is not
+                  then seal the sequence number - this is because the 
ntlmv1_arc4_state is not
                   constant, but is is rather updated with each iteration */
 
                dump_arc4_state("ntlmv1 arc4 state:\n",
diff --git a/source3/utils/net.c b/source3/utils/net.c
index 0c5f080..6e39e26 100644
--- a/source3/utils/net.c
+++ b/source3/utils/net.c
@@ -897,7 +897,7 @@ static struct functable net_func[] = {
        load_interfaces();
 
        /* this makes sure that when we do things like call scripts,
-          that it won't assert becouse we are not root */
+          that it won't assert because we are not root */
        sec_init();
 
        if (c->opt_machine_pass) {
diff --git a/source4/auth/ntlmssp/ntlmssp_sign.c 
b/source4/auth/ntlmssp/ntlmssp_sign.c
index 9e0d80f..b327701 100644
--- a/source4/auth/ntlmssp/ntlmssp_sign.c
+++ b/source4/auth/ntlmssp/ntlmssp_sign.c
@@ -229,7 +229,7 @@ NTSTATUS gensec_ntlmssp_seal_packet(struct gensec_security 
*gensec_security,
        dump_data_pw("ntlmssp clear data\n", data, length);
        if (gensec_ntlmssp_state->neg_flags & NTLMSSP_NEGOTIATE_NTLM2) {
                /* The order of these two operations matters - we must first 
seal the packet,
-                  then seal the sequence number - this is becouse the 
send_seal_hash is not
+                  then seal the sequence number - this is because the 
send_seal_hash is not
                   constant, but is is rather updated with each iteration */
                nt_status = ntlmssp_make_packet_signature(gensec_ntlmssp_state, 
sig_mem_ctx, 
                                                          data, length, 
@@ -249,7 +249,7 @@ NTSTATUS gensec_ntlmssp_seal_packet(struct gensec_security 
*gensec_security,
 
                /* The order of these two operations matters - we must
                   first seal the packet, then seal the sequence
-                  number - this is becouse the ntlmssp_hash is not
+                  number - this is because the ntlmssp_hash is not
                   constant, but is is rather updated with each
                   iteration */
 


-- 
Samba Shared Repository

Reply via email to