summaryrefslogtreecommitdiffstats
path: root/libcli
diff options
context:
space:
mode:
authorJelmer Vernooij <jelmer@samba.org>2014-03-30 04:01:06 +0200
committerJelmer Vernooij <jelmer@samba.org>2014-04-14 03:51:15 +0200
commite0cddcd5c44a22a36a156079f8546d3b8e7ee0c1 (patch)
treec5795a3804899b5ee7f49162444da5501dbbd726 /libcli
parent986e53967a84f8bcabfc333198159ef7ebe9efe0 (diff)
downloadsamba-e0cddcd5c44a22a36a156079f8546d3b8e7ee0c1.tar.gz
samba-e0cddcd5c44a22a36a156079f8546d3b8e7ee0c1.tar.xz
samba-e0cddcd5c44a22a36a156079f8546d3b8e7ee0c1.zip
Typo: s/preceeded/preceded/
Caught by lintian, the Debian package linter :) Change-Id: Ia7162ea8c2b1845155345526b66d71ae64f15227 Reviewed-on: https://gerrit.samba.org/216 Reviewed-by: Andrew Bartlett <abartlet@samba.org> Autobuild-User(master): Jelmer Vernooij <jelmer@samba.org> Autobuild-Date(master): Mon Apr 14 03:51:15 CEST 2014 on sn-devel-104
Diffstat (limited to 'libcli')
-rw-r--r--libcli/auth/ntlm_check.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/libcli/auth/ntlm_check.c b/libcli/auth/ntlm_check.c
index dc70957f4f9..7f91b52a5fd 100644
--- a/libcli/auth/ntlm_check.c
+++ b/libcli/auth/ntlm_check.c
@@ -485,7 +485,7 @@ NTSTATUS ntlm_password_check(TALLOC_CTX *mem_ctx,
client_domain,
&tmp_sess_key)) {
if (nt_response->length > 24) {
- /* If NTLMv2 authentication has preceeded us
+ /* If NTLMv2 authentication has preceded us
* (even if it failed), then use the session
* key from that. See the RPC-SAMLOGON
* torture test */
@@ -514,7 +514,7 @@ NTSTATUS ntlm_password_check(TALLOC_CTX *mem_ctx,
upper_client_domain,
&tmp_sess_key)) {
if (nt_response->length > 24) {
- /* If NTLMv2 authentication has preceeded us
+ /* If NTLMv2 authentication has preceded us
* (even if it failed), then use the session
* key from that. See the RPC-SAMLOGON
* torture test */
@@ -542,7 +542,7 @@ NTSTATUS ntlm_password_check(TALLOC_CTX *mem_ctx,
"",
&tmp_sess_key)) {
if (nt_response->length > 24) {
- /* If NTLMv2 authentication has preceeded us
+ /* If NTLMv2 authentication has preceded us
* (even if it failed), then use the session
* key from that. See the RPC-SAMLOGON
* torture test */