summaryrefslogtreecommitdiff
path: root/source3
diff options
context:
space:
mode:
Diffstat (limited to 'source3')
-rw-r--r--source3/auth/auth_sam.c4
-rw-r--r--source3/libsmb/cliconnect.c2
-rw-r--r--source3/libsmb/clientgen.c2
-rw-r--r--source3/libsmb/smb_signing.c2
-rw-r--r--source3/passdb/passdb.c4
-rw-r--r--source3/passdb/pdb_get_set.c2
-rw-r--r--source3/smbd/chgpasswd.c4
-rw-r--r--source3/smbd/service.c2
-rw-r--r--source3/smbd/session.c2
-rw-r--r--source3/smbd/sesssetup.c2
-rw-r--r--source3/tdb/tdbutil.c4
11 files changed, 15 insertions, 15 deletions
diff --git a/source3/auth/auth_sam.c b/source3/auth/auth_sam.c
index 634afc633d..d46d362a92 100644
--- a/source3/auth/auth_sam.c
+++ b/source3/auth/auth_sam.c
@@ -225,7 +225,7 @@ static NTSTATUS sam_password_ok(const struct auth_context *auth_context,
}
} else {
DEBUG(2,("sam_password_ok: NTLMv1 passwords NOT PERMITTED for user %s\n",pdb_get_username(sampass)));
- /* no return, becouse we might pick up LMv2 in the LM feild */
+ /* no return, because we might pick up LMv2 in the LM feild */
}
}
@@ -420,7 +420,7 @@ static NTSTATUS check_sam_security(const struct auth_context *auth_context,
return NT_STATUS_UNSUCCESSFUL;
}
- /* Can't use the talloc version here, becouse the returned struct gets
+ /* Can't use the talloc version here, because the returned struct gets
kept on the server_info */
if (!NT_STATUS_IS_OK(nt_status = pdb_init_sam(&sampass))) {
return nt_status;
diff --git a/source3/libsmb/cliconnect.c b/source3/libsmb/cliconnect.c
index f58a458aba..154a7cae58 100644
--- a/source3/libsmb/cliconnect.c
+++ b/source3/libsmb/cliconnect.c
@@ -295,7 +295,7 @@ static BOOL cli_session_setup_nt1(struct cli_state *cli, const char *user,
} else {
/* pre-encrypted password supplied. Only used for
security=server, can't do
- signing becouse we don't have oringial key */
+ signing because we don't have original key */
lm_response = data_blob(pass, passlen);
nt_response = data_blob(ntpass, ntpasslen);
diff --git a/source3/libsmb/clientgen.c b/source3/libsmb/clientgen.c
index 81cb61d757..8d4e8a266c 100644
--- a/source3/libsmb/clientgen.c
+++ b/source3/libsmb/clientgen.c
@@ -274,7 +274,7 @@ struct cli_state *cli_initialise(struct cli_state *cli)
memset(cli->outbuf, 0, cli->bufsize);
memset(cli->inbuf, 0, cli->bufsize);
- /* just becouse we over-allocate, doesn't mean it's right to use it */
+ /* just because we over-allocate, doesn't mean it's right to use it */
clobber_region(FUNCTION_MACRO, __LINE__, cli->outbuf+cli->bufsize, SAFETY_MARGIN);
clobber_region(FUNCTION_MACRO, __LINE__, cli->inbuf+cli->bufsize, SAFETY_MARGIN);
diff --git a/source3/libsmb/smb_signing.c b/source3/libsmb/smb_signing.c
index 0f56cd15d9..eedf7f401f 100644
--- a/source3/libsmb/smb_signing.c
+++ b/source3/libsmb/smb_signing.c
@@ -112,7 +112,7 @@ static void cli_simple_sign_outgoing_message(struct cli_state *cli)
* Firstly put the sequence number into the first 4 bytes.
* and zero out the next 4 bytes.
*
- * We put the sequence into the packet, becouse we are going
+ * We put the sequence into the packet, because we are going
* to copy over it anyway.
*/
SIVAL(cli->outbuf, smb_ss_field,
diff --git a/source3/passdb/passdb.c b/source3/passdb/passdb.c
index d262b09520..f34513b225 100644
--- a/source3/passdb/passdb.c
+++ b/source3/passdb/passdb.c
@@ -183,7 +183,7 @@ NTSTATUS pdb_fill_sam_pw(SAM_ACCOUNT *sam_account, const struct passwd *pwd)
mechinism, we should call it here.
We can't just set this to 0 or allow it only to be filled
- in when added to the backend, becouse the user's SID
+ in when added to the backend, because the user's SID
may already be in security descriptors etc.
-- abartlet 11-May-02
@@ -629,7 +629,7 @@ uint32 pdb_gid_to_group_rid(gid_t gid)
static BOOL pdb_rid_is_well_known(uint32 rid)
{
- /* Not using rid_offset here, becouse this is the actual
+ /* Not using rid_offset here, because this is the actual
NT fixed value (1000) */
return (rid < BASE_RID);
diff --git a/source3/passdb/pdb_get_set.c b/source3/passdb/pdb_get_set.c
index 4370dc2c36..c95719451a 100644
--- a/source3/passdb/pdb_get_set.c
+++ b/source3/passdb/pdb_get_set.c
@@ -28,7 +28,7 @@
#define DBGC_CLASS DBGC_PASSDB
/**
- * @todo Redefine this to NULL, but this changes the API becouse
+ * @todo Redefine this to NULL, but this changes the API because
* much of samba assumes that the pdb_get...() funtions
* return pstrings. (ie not null-pointers).
* See also pdb_fill_default_sam().
diff --git a/source3/smbd/chgpasswd.c b/source3/smbd/chgpasswd.c
index 3d25f33f45..5c1d9a79a6 100644
--- a/source3/smbd/chgpasswd.c
+++ b/source3/smbd/chgpasswd.c
@@ -980,10 +980,10 @@ NTSTATUS change_oem_password(SAM_ACCOUNT *hnd, char *old_passwd, char *new_passw
* the /etc/passwd database first. Return failure if this cannot
* be done.
*
- * This occurs before the oem change, becouse we don't want to
+ * This occurs before the oem change, because we don't want to
* update it if chgpasswd failed.
*
- * Conditional on lp_unix_password_sync() becouse we don't want
+ * Conditional on lp_unix_password_sync() because we don't want
* to touch the unix db unless we have admin permission.
*/
diff --git a/source3/smbd/service.c b/source3/smbd/service.c
index 0e4c87c7fb..4d515e90f5 100644
--- a/source3/smbd/service.c
+++ b/source3/smbd/service.c
@@ -790,7 +790,7 @@ connection_struct *make_connection(const char *service_in, DATA_BLOB password,
if(lp_security() != SEC_SHARE) {
DATA_BLOB no_pw = data_blob(NULL, 0);
if (vuser->homes_snum == -1) {
- DEBUG(2, ("[homes] share not available for this user becouse it was not found or created at session setup time\n"));
+ DEBUG(2, ("[homes] share not available for this user because it was not found or created at session setup time\n"));
*status = NT_STATUS_BAD_NETWORK_NAME;
return NULL;
}
diff --git a/source3/smbd/session.c b/source3/smbd/session.c
index ac06b9872d..b7f3bc43e7 100644
--- a/source3/smbd/session.c
+++ b/source3/smbd/session.c
@@ -100,7 +100,7 @@ BOOL session_claim(user_struct *vuser)
}
/* If 'hostname lookup' == yes, then do the DNS lookup. This is
- needed becouse utmp and PAM both expect DNS names
+ needed because utmp and PAM both expect DNS names
client_name() handles this case internally.
*/
diff --git a/source3/smbd/sesssetup.c b/source3/smbd/sesssetup.c
index a9842424a5..fc223ecf37 100644
--- a/source3/smbd/sesssetup.c
+++ b/source3/smbd/sesssetup.c
@@ -644,7 +644,7 @@ int reply_sesssetup_and_X(connection_struct *conn, char *inbuf,char *outbuf,
if (*user) {
if (global_spnego_negotiated) {
- /* This has to be here, becouse this is a perfectly valid behaviour for guest logons :-( */
+ /* This has to be here, because this is a perfectly valid behaviour for guest logons :-( */
DEBUG(0,("reply_sesssetup_and_X: Rejecting attempt at 'normal' session setup after negotiating spnego.\n"));
return ERROR_NT(NT_STATUS_UNSUCCESSFUL);
diff --git a/source3/tdb/tdbutil.c b/source3/tdb/tdbutil.c
index 69b282cda0..19dfe642df 100644
--- a/source3/tdb/tdbutil.c
+++ b/source3/tdb/tdbutil.c
@@ -311,7 +311,7 @@ int32 tdb_change_int32_atomic(TDB_CONTEXT *tdb, const char *keystr, int32 *oldva
if ((val = tdb_fetch_int32(tdb, keystr)) == -1) {
/* The lookup failed */
if (tdb_error(tdb) != TDB_ERR_NOEXIST) {
- /* but not becouse it didn't exist */
+ /* but not because it didn't exist */
goto err_out;
}
@@ -352,7 +352,7 @@ BOOL tdb_change_uint32_atomic(TDB_CONTEXT *tdb, const char *keystr, uint32 *oldv
if (!tdb_fetch_uint32(tdb, keystr, &val)) {
/* It failed */
if (tdb_error(tdb) != TDB_ERR_NOEXIST) {
- /* and not becouse it didn't exist */
+ /* and not because it didn't exist */
goto err_out;
}