diff options
author | Tim Potter <tpot@samba.org> | 2002-03-05 00:53:46 +0000 |
---|---|---|
committer | Tim Potter <tpot@samba.org> | 2002-03-05 00:53:46 +0000 |
commit | a7fa0733badad66ae610eac5e01569cf264976f3 (patch) | |
tree | 19fd5aca7b59ec69dd2abeaf92598173cc65e163 /source | |
parent | 472acd89b2bf5ec2a471957aaff42e560053f60e (diff) | |
download | samba-a7fa0733badad66ae610eac5e01569cf264976f3.tar.gz samba-a7fa0733badad66ae610eac5e01569cf264976f3.tar.xz samba-a7fa0733badad66ae610eac5e01569cf264976f3.zip |
Spelling fixes.
Diffstat (limited to 'source')
-rw-r--r-- | source/include/ntdomain.h | 2 | ||||
-rw-r--r-- | source/rpc_server/srv_netlog_nt.c | 6 |
2 files changed, 4 insertions, 4 deletions
diff --git a/source/include/ntdomain.h b/source/include/ntdomain.h index 779c2deedd8..57eb4f43311 100644 --- a/source/include/ntdomain.h +++ b/source/include/ntdomain.h @@ -159,7 +159,7 @@ struct dcinfo fstring remote_machine; /* Machine name we've authenticated. */ - BOOL challange_sent; + BOOL challenge_sent; BOOL got_session_key; BOOL authenticated; diff --git a/source/rpc_server/srv_netlog_nt.c b/source/rpc_server/srv_netlog_nt.c index 72b8569b43d..92ebfd97c5c 100644 --- a/source/rpc_server/srv_netlog_nt.c +++ b/source/rpc_server/srv_netlog_nt.c @@ -242,7 +242,7 @@ NTSTATUS _net_req_chal(pipes_struct *p, NET_Q_REQ_CHAL *q_u, NET_R_REQ_CHAL *r_u memset((char *)p->dc.sess_key, '\0', sizeof(p->dc.sess_key)); - p->dc.challange_sent = True; + p->dc.challenge_sent = True; /* set up the LSA REQUEST CHALLENGE response */ init_net_r_req_chal(r_u, &p->dc.srv_chal, status); @@ -274,7 +274,7 @@ NTSTATUS _net_auth(pipes_struct *p, NET_Q_AUTH *q_u, NET_R_AUTH *r_u) rpcstr_pull(mach_acct, q_u->clnt_id.uni_acct_name.buffer,sizeof(fstring),q_u->clnt_id.uni_acct_name.uni_str_len*2,0); - if (p->dc.challange_sent && get_md4pw((char *)p->dc.md4pw, mach_acct)) { + if (p->dc.challenge_sent && get_md4pw((char *)p->dc.md4pw, mach_acct)) { /* from client / server challenges and md4 password, generate sess key */ cred_session_key(&p->dc.clnt_chal, &p->dc.srv_chal, @@ -336,7 +336,7 @@ NTSTATUS _net_auth_2(pipes_struct *p, NET_Q_AUTH_2 *q_u, NET_R_AUTH_2 *r_u) rpcstr_pull(mach_acct, q_u->clnt_id.uni_acct_name.buffer,sizeof(fstring),q_u->clnt_id.uni_acct_name.uni_str_len*2,0); - if (p->dc.challange_sent && get_md4pw((char *)p->dc.md4pw, mach_acct)) { + if (p->dc.challenge_sent && get_md4pw((char *)p->dc.md4pw, mach_acct)) { /* from client / server challenges and md4 password, generate sess key */ cred_session_key(&p->dc.clnt_chal, &p->dc.srv_chal, |