The branch, master has been updated
       via  3ce1d2fde5d Fix spelling mistakes.
      from  dadd3223882 tests/krb5: Add claims tests

https://git.samba.org/?p=samba.git;a=shortlog;h=master


- Log -----------------------------------------------------------------
commit 3ce1d2fde5dac8a9da2ff0a91ec104cb52d0c6bd
Author: Michael Tokarev <m...@tls.msk.ru>
Date:   Fri Sep 9 13:45:38 2022 -0700

    Fix spelling mistakes.
    
    Signed-off-by: Michael Tokarev <m...@tls.msk.ru>
    Reviewed-by: Jeremy Allison <j...@samba.org>
    Reviewed-by: Martin Schwenke <mar...@meltin.net>
    
    Autobuild-User(master): Jeremy Allison <j...@samba.org>
    Autobuild-Date(master): Mon Sep 12 02:29:32 UTC 2022 on sn-devel-184

-----------------------------------------------------------------------

Summary of changes:
 ctdb/common/system.c              |  2 +-
 docs-xml/manpages/vfs_fruit.8.xml |  2 +-
 source3/smbd/msdfs.c              |  2 +-
 source3/smbd/smbXsrv_client.c     |  4 ++--
 source3/winbindd/wb_sids2xids.c   |  2 +-
 source4/torture/smb2/ea.c         |  2 +-
 source4/torture/smb2/session.c    | 26 +++++++++++++-------------
 7 files changed, 20 insertions(+), 20 deletions(-)


Changeset truncated at 500 lines:

diff --git a/ctdb/common/system.c b/ctdb/common/system.c
index 08dc68284fd..05a95647233 100644
--- a/ctdb/common/system.c
+++ b/ctdb/common/system.c
@@ -157,7 +157,7 @@ bool ctdb_sys_check_iface_exists(const char *iface)
 
        ifnis = if_nameindex();
        if (ifnis == NULL) {
-               DBG_ERR("Failed to retrieve inteface list\n");
+               DBG_ERR("Failed to retrieve interface list\n");
                return false;
        }
 
diff --git a/docs-xml/manpages/vfs_fruit.8.xml 
b/docs-xml/manpages/vfs_fruit.8.xml
index 4caf308a612..6950898a7d1 100644
--- a/docs-xml/manpages/vfs_fruit.8.xml
+++ b/docs-xml/manpages/vfs_fruit.8.xml
@@ -399,7 +399,7 @@
              on-disk file identifier to have the semantics of HFS+ Catalog Node
              Identifier (CNID). Samba provides File-IDs based on a file's inode
              number which gets recycled across file creation and deletion and
-             can therefor not be used for Mac client. Returning a file 
identifier of
+             can therefore not be used for Mac client. Returning a file 
identifier of
              zero causes the Mac client to stop using and trusting the file id
              returned from the server.</para>
              <para>The default is <emphasis>yes</emphasis>.</para>
diff --git a/source3/smbd/msdfs.c b/source3/smbd/msdfs.c
index ce7d0f7dd56..b5fd7608e07 100644
--- a/source3/smbd/msdfs.c
+++ b/source3/smbd/msdfs.c
@@ -1090,7 +1090,7 @@ static NTSTATUS dfs_path_lookup(TALLOC_CTX *ctx,
                }
                removed_components--;
                if (p == NULL && removed_components != 0) {
-                       DBG_ERR("Component missmatch. path = %s, "
+                       DBG_ERR("Component mismatch. path = %s, "
                                "%zu components left\n",
                                canon_dfspath,
                                removed_components);
diff --git a/source3/smbd/smbXsrv_client.c b/source3/smbd/smbXsrv_client.c
index d7a6fa35bf0..14d00f4aca1 100644
--- a/source3/smbd/smbXsrv_client.c
+++ b/source3/smbd/smbXsrv_client.c
@@ -1242,7 +1242,7 @@ static void smbXsrv_client_connection_drop_loop(struct 
tevent_req *subreq)
        {
                struct GUID_txt_buf buf1, buf2;
 
-               DBG_WARNING("client's client_guid [%s] != droped guid [%s]\n",
+               DBG_WARNING("client's client_guid [%s] != dropped guid [%s]\n",
                            GUID_buf_string(&client->global->client_guid,
                                            &buf1),
                            GUID_buf_string(&drop_info0->client_guid,
@@ -1257,7 +1257,7 @@ static void smbXsrv_client_connection_drop_loop(struct 
tevent_req *subreq)
            drop_info0->client_connect_time)
        {
                DBG_WARNING("client's initial connect time [%s] (%llu) != "
-                       "droped initial connect time [%s] (%llu)\n",
+                       "dropped initial connect time [%s] (%llu)\n",
                        nt_time_string(talloc_tos(),
                                       client->global->initial_connect_time),
                        (unsigned long 
long)client->global->initial_connect_time,
diff --git a/source3/winbindd/wb_sids2xids.c b/source3/winbindd/wb_sids2xids.c
index 179a51f81e4..9a3507ba702 100644
--- a/source3/winbindd/wb_sids2xids.c
+++ b/source3/winbindd/wb_sids2xids.c
@@ -233,7 +233,7 @@ static void wb_sids2xids_idmap_setup_done(struct tevent_req 
*subreq)
 
                sid_copy(&domain_sid, &state->sids[i]);
                sid_split_rid(&domain_sid, &rid);
-               D_DEBUG("%"PRIu32": Splitted SID %s into domain SID %s and RID 
%"PRIu32"\n",
+               D_DEBUG("%"PRIu32": Split SID %s into domain SID %s and RID 
%"PRIu32"\n",
                        i,
                        dom_sid_str_buf(&state->sids[i], &buf0),
                        dom_sid_str_buf(&domain_sid, &buf1),
diff --git a/source4/torture/smb2/ea.c b/source4/torture/smb2/ea.c
index becacaed77e..2467610f688 100644
--- a/source4/torture/smb2/ea.c
+++ b/source4/torture/smb2/ea.c
@@ -91,7 +91,7 @@ static bool torture_smb2_acl_xattr(struct torture_context 
*tctx,
 
        status = smb2_setinfo_file(tree, &sfinfo);
        torture_assert_ntstatus_ok_goto(tctx, status, ret, done,
-                                       "Setting EA should faild\n");
+                                       "Setting EA should fail\n");
 
        /*
         * 2. Verify NT ACL EA is not listed
diff --git a/source4/torture/smb2/session.c b/source4/torture/smb2/session.c
index 92f9e638ff4..fe2beafbe9b 100644
--- a/source4/torture/smb2/session.c
+++ b/source4/torture/smb2/session.c
@@ -2754,7 +2754,7 @@ static bool test_session_bind_negative_smb210s(struct 
torture_context *tctx, str
        encrypted = smb2cli_tcon_is_encryption_on(tree0->smbXcli);
        if (encrypted) {
                torture_skip(tctx,
-                            "Can't test SMB 2.10 if encrytion is required");
+                            "Can't test SMB 2.10 if encryption is required");
        }
 
        options1 = transport0->options;
@@ -2785,7 +2785,7 @@ static bool test_session_bind_negative_smb210d(struct 
torture_context *tctx, str
        encrypted = smb2cli_tcon_is_encryption_on(tree0->smbXcli);
        if (encrypted) {
                torture_skip(tctx,
-                            "Can't test SMB 2.10 if encrytion is required");
+                            "Can't test SMB 2.10 if encryption is required");
        }
 
        options1 = transport0->options;
@@ -2817,7 +2817,7 @@ static bool test_session_bind_negative_smb2to3s(struct 
torture_context *tctx, st
        encrypted = smb2cli_tcon_is_encryption_on(tree0->smbXcli);
        if (encrypted) {
                torture_skip(tctx,
-                            "Can't test SMB 2.10 if encrytion is required");
+                            "Can't test SMB 2.10 if encryption is required");
        }
 
        if (smbXcli_conn_protocol(transport0->conn) < PROTOCOL_SMB3_00) {
@@ -2862,7 +2862,7 @@ static bool test_session_bind_negative_smb2to3d(struct 
torture_context *tctx, st
        encrypted = smb2cli_tcon_is_encryption_on(tree0->smbXcli);
        if (encrypted) {
                torture_skip(tctx,
-                            "Can't test SMB 2.10 if encrytion is required");
+                            "Can't test SMB 2.10 if encryption is required");
        }
 
        if (smbXcli_conn_protocol(transport0->conn) < PROTOCOL_SMB3_00) {
@@ -2908,7 +2908,7 @@ static bool test_session_bind_negative_smb3to2s(struct 
torture_context *tctx, st
        encrypted = smb2cli_tcon_is_encryption_on(tree0->smbXcli);
        if (encrypted) {
                torture_skip(tctx,
-                            "Can't test SMB 2.10 if encrytion is required");
+                            "Can't test SMB 2.10 if encryption is required");
        }
 
        if (smbXcli_conn_protocol(transport0->conn) < PROTOCOL_SMB3_00) {
@@ -2959,7 +2959,7 @@ static bool test_session_bind_negative_smb3to2d(struct 
torture_context *tctx, st
        encrypted = smb2cli_tcon_is_encryption_on(tree0->smbXcli);
        if (encrypted) {
                torture_skip(tctx,
-                            "Can't test SMB 2.10 if encrytion is required");
+                            "Can't test SMB 2.10 if encryption is required");
        }
 
        if (smbXcli_conn_protocol(transport0->conn) < PROTOCOL_SMB3_00) {
@@ -4548,7 +4548,7 @@ static bool 
test_session_bind_negative_smb3signH2XtoGs(struct torture_context *t
        encrypted = smb2cli_tcon_is_encryption_on(tree0->smbXcli);
        if (encrypted) {
                torture_skip(tctx,
-                            "Can't test SMB 2.10 if encrytion is required");
+                            "Can't test SMB 2.10 if encryption is required");
        }
 
        if (smbXcli_conn_protocol(transport0->conn) < PROTOCOL_SMB3_11) {
@@ -4608,7 +4608,7 @@ static bool 
test_session_bind_negative_smb3signH2XtoGd(struct torture_context *t
        encrypted = smb2cli_tcon_is_encryption_on(tree0->smbXcli);
        if (encrypted) {
                torture_skip(tctx,
-                            "Can't test SMB 2.10 if encrytion is required");
+                            "Can't test SMB 2.10 if encryption is required");
        }
 
        if (smbXcli_conn_protocol(transport0->conn) < PROTOCOL_SMB3_11) {
@@ -4788,7 +4788,7 @@ static bool 
test_session_bind_negative_smb3signGtoH2Xs(struct torture_context *t
        encrypted = smb2cli_tcon_is_encryption_on(tree0->smbXcli);
        if (encrypted) {
                torture_skip(tctx,
-                            "Can't test SMB 2.10 if encrytion is required");
+                            "Can't test SMB 2.10 if encryption is required");
        }
 
        if (smbXcli_conn_protocol(transport0->conn) < PROTOCOL_SMB3_11) {
@@ -4854,7 +4854,7 @@ static bool 
test_session_bind_negative_smb3signGtoH2Xd(struct torture_context *t
        encrypted = smb2cli_tcon_is_encryption_on(tree0->smbXcli);
        if (encrypted) {
                torture_skip(tctx,
-                            "Can't test SMB 2.10 if encrytion is required");
+                            "Can't test SMB 2.10 if encryption is required");
        }
 
        if (smbXcli_conn_protocol(transport0->conn) < PROTOCOL_SMB3_11) {
@@ -5066,7 +5066,7 @@ static bool test_session_signing_hmac_sha_256(struct 
torture_context *tctx, stru
        encrypted = smb2cli_tcon_is_encryption_on(tree0->smbXcli);
        if (encrypted) {
                torture_skip(tctx,
-                            "Can't test signing only if encrytion is 
required");
+                            "Can't test signing only if encryption is 
required");
        }
 
        if (smbXcli_conn_protocol(transport0->conn) < PROTOCOL_SMB3_11) {
@@ -5110,7 +5110,7 @@ static bool test_session_signing_aes_128_cmac(struct 
torture_context *tctx, stru
        encrypted = smb2cli_tcon_is_encryption_on(tree0->smbXcli);
        if (encrypted) {
                torture_skip(tctx,
-                            "Can't test signing only if encrytion is 
required");
+                            "Can't test signing only if encryption is 
required");
        }
 
        if (smbXcli_conn_protocol(transport0->conn) < PROTOCOL_SMB3_11) {
@@ -5154,7 +5154,7 @@ static bool test_session_signing_aes_128_gmac(struct 
torture_context *tctx, stru
        encrypted = smb2cli_tcon_is_encryption_on(tree0->smbXcli);
        if (encrypted) {
                torture_skip(tctx,
-                            "Can't test signing only if encrytion is 
required");
+                            "Can't test signing only if encryption is 
required");
        }
 
        if (smbXcli_conn_protocol(transport0->conn) < PROTOCOL_SMB3_11) {


-- 
Samba Shared Repository

Reply via email to