From 402fbc518a5489b33f1c5eafb8e6acb9ee5addbd Mon Sep 17 00:00:00 2001 From: Tim Potter Date: Wed, 14 May 2003 00:46:43 +0000 Subject: spelling (This used to be commit 865c11275685c85124b506c9bbd2a8bde2e760b9) --- source3/auth/auth_sam.c | 4 ++-- source3/libsmb/cliconnect.c | 2 +- source3/libsmb/clientgen.c | 2 +- source3/libsmb/smb_signing.c | 2 +- source3/passdb/passdb.c | 4 ++-- source3/passdb/pdb_get_set.c | 2 +- source3/smbd/chgpasswd.c | 4 ++-- source3/smbd/service.c | 2 +- source3/smbd/session.c | 2 +- source3/smbd/sesssetup.c | 2 +- source3/tdb/tdbutil.c | 4 ++-- 11 files changed, 15 insertions(+), 15 deletions(-) diff --git a/source3/auth/auth_sam.c b/source3/auth/auth_sam.c index 634afc633d..d46d362a92 100644 --- a/source3/auth/auth_sam.c +++ b/source3/auth/auth_sam.c @@ -225,7 +225,7 @@ static NTSTATUS sam_password_ok(const struct auth_context *auth_context, } } else { DEBUG(2,("sam_password_ok: NTLMv1 passwords NOT PERMITTED for user %s\n",pdb_get_username(sampass))); - /* no return, becouse we might pick up LMv2 in the LM feild */ + /* no return, because we might pick up LMv2 in the LM feild */ } } @@ -420,7 +420,7 @@ static NTSTATUS check_sam_security(const struct auth_context *auth_context, return NT_STATUS_UNSUCCESSFUL; } - /* Can't use the talloc version here, becouse the returned struct gets + /* Can't use the talloc version here, because the returned struct gets kept on the server_info */ if (!NT_STATUS_IS_OK(nt_status = pdb_init_sam(&sampass))) { return nt_status; diff --git a/source3/libsmb/cliconnect.c b/source3/libsmb/cliconnect.c index f58a458aba..154a7cae58 100644 --- a/source3/libsmb/cliconnect.c +++ b/source3/libsmb/cliconnect.c @@ -295,7 +295,7 @@ static BOOL cli_session_setup_nt1(struct cli_state *cli, const char *user, } else { /* pre-encrypted password supplied. Only used for security=server, can't do - signing becouse we don't have oringial key */ + signing because we don't have original key */ lm_response = data_blob(pass, passlen); nt_response = data_blob(ntpass, ntpasslen); diff --git a/source3/libsmb/clientgen.c b/source3/libsmb/clientgen.c index 81cb61d757..8d4e8a266c 100644 --- a/source3/libsmb/clientgen.c +++ b/source3/libsmb/clientgen.c @@ -274,7 +274,7 @@ struct cli_state *cli_initialise(struct cli_state *cli) memset(cli->outbuf, 0, cli->bufsize); memset(cli->inbuf, 0, cli->bufsize); - /* just becouse we over-allocate, doesn't mean it's right to use it */ + /* just because we over-allocate, doesn't mean it's right to use it */ clobber_region(FUNCTION_MACRO, __LINE__, cli->outbuf+cli->bufsize, SAFETY_MARGIN); clobber_region(FUNCTION_MACRO, __LINE__, cli->inbuf+cli->bufsize, SAFETY_MARGIN); diff --git a/source3/libsmb/smb_signing.c b/source3/libsmb/smb_signing.c index 0f56cd15d9..eedf7f401f 100644 --- a/source3/libsmb/smb_signing.c +++ b/source3/libsmb/smb_signing.c @@ -112,7 +112,7 @@ static void cli_simple_sign_outgoing_message(struct cli_state *cli) * Firstly put the sequence number into the first 4 bytes. * and zero out the next 4 bytes. * - * We put the sequence into the packet, becouse we are going + * We put the sequence into the packet, because we are going * to copy over it anyway. */ SIVAL(cli->outbuf, smb_ss_field, diff --git a/source3/passdb/passdb.c b/source3/passdb/passdb.c index d262b09520..f34513b225 100644 --- a/source3/passdb/passdb.c +++ b/source3/passdb/passdb.c @@ -183,7 +183,7 @@ NTSTATUS pdb_fill_sam_pw(SAM_ACCOUNT *sam_account, const struct passwd *pwd) mechinism, we should call it here. We can't just set this to 0 or allow it only to be filled - in when added to the backend, becouse the user's SID + in when added to the backend, because the user's SID may already be in security descriptors etc. -- abartlet 11-May-02 @@ -629,7 +629,7 @@ uint32 pdb_gid_to_group_rid(gid_t gid) static BOOL pdb_rid_is_well_known(uint32 rid) { - /* Not using rid_offset here, becouse this is the actual + /* Not using rid_offset here, because this is the actual NT fixed value (1000) */ return (rid < BASE_RID); diff --git a/source3/passdb/pdb_get_set.c b/source3/passdb/pdb_get_set.c index 4370dc2c36..c95719451a 100644 --- a/source3/passdb/pdb_get_set.c +++ b/source3/passdb/pdb_get_set.c @@ -28,7 +28,7 @@ #define DBGC_CLASS DBGC_PASSDB /** - * @todo Redefine this to NULL, but this changes the API becouse + * @todo Redefine this to NULL, but this changes the API because * much of samba assumes that the pdb_get...() funtions * return pstrings. (ie not null-pointers). * See also pdb_fill_default_sam(). diff --git a/source3/smbd/chgpasswd.c b/source3/smbd/chgpasswd.c index 3d25f33f45..5c1d9a79a6 100644 --- a/source3/smbd/chgpasswd.c +++ b/source3/smbd/chgpasswd.c @@ -980,10 +980,10 @@ NTSTATUS change_oem_password(SAM_ACCOUNT *hnd, char *old_passwd, char *new_passw * the /etc/passwd database first. Return failure if this cannot * be done. * - * This occurs before the oem change, becouse we don't want to + * This occurs before the oem change, because we don't want to * update it if chgpasswd failed. * - * Conditional on lp_unix_password_sync() becouse we don't want + * Conditional on lp_unix_password_sync() because we don't want * to touch the unix db unless we have admin permission. */ diff --git a/source3/smbd/service.c b/source3/smbd/service.c index 0e4c87c7fb..4d515e90f5 100644 --- a/source3/smbd/service.c +++ b/source3/smbd/service.c @@ -790,7 +790,7 @@ connection_struct *make_connection(const char *service_in, DATA_BLOB password, if(lp_security() != SEC_SHARE) { DATA_BLOB no_pw = data_blob(NULL, 0); if (vuser->homes_snum == -1) { - DEBUG(2, ("[homes] share not available for this user becouse it was not found or created at session setup time\n")); + DEBUG(2, ("[homes] share not available for this user because it was not found or created at session setup time\n")); *status = NT_STATUS_BAD_NETWORK_NAME; return NULL; } diff --git a/source3/smbd/session.c b/source3/smbd/session.c index ac06b9872d..b7f3bc43e7 100644 --- a/source3/smbd/session.c +++ b/source3/smbd/session.c @@ -100,7 +100,7 @@ BOOL session_claim(user_struct *vuser) } /* If 'hostname lookup' == yes, then do the DNS lookup. This is - needed becouse utmp and PAM both expect DNS names + needed because utmp and PAM both expect DNS names client_name() handles this case internally. */ diff --git a/source3/smbd/sesssetup.c b/source3/smbd/sesssetup.c index a9842424a5..fc223ecf37 100644 --- a/source3/smbd/sesssetup.c +++ b/source3/smbd/sesssetup.c @@ -644,7 +644,7 @@ int reply_sesssetup_and_X(connection_struct *conn, char *inbuf,char *outbuf, if (*user) { if (global_spnego_negotiated) { - /* This has to be here, becouse this is a perfectly valid behaviour for guest logons :-( */ + /* This has to be here, because this is a perfectly valid behaviour for guest logons :-( */ DEBUG(0,("reply_sesssetup_and_X: Rejecting attempt at 'normal' session setup after negotiating spnego.\n")); return ERROR_NT(NT_STATUS_UNSUCCESSFUL); diff --git a/source3/tdb/tdbutil.c b/source3/tdb/tdbutil.c index 69b282cda0..19dfe642df 100644 --- a/source3/tdb/tdbutil.c +++ b/source3/tdb/tdbutil.c @@ -311,7 +311,7 @@ int32 tdb_change_int32_atomic(TDB_CONTEXT *tdb, const char *keystr, int32 *oldva if ((val = tdb_fetch_int32(tdb, keystr)) == -1) { /* The lookup failed */ if (tdb_error(tdb) != TDB_ERR_NOEXIST) { - /* but not becouse it didn't exist */ + /* but not because it didn't exist */ goto err_out; } @@ -352,7 +352,7 @@ BOOL tdb_change_uint32_atomic(TDB_CONTEXT *tdb, const char *keystr, uint32 *oldv if (!tdb_fetch_uint32(tdb, keystr, &val)) { /* It failed */ if (tdb_error(tdb) != TDB_ERR_NOEXIST) { - /* and not becouse it didn't exist */ + /* and not because it didn't exist */ goto err_out; } -- cgit