summaryrefslogtreecommitdiffstats
path: root/source
diff options
context:
space:
mode:
authorTim Potter <tpot@samba.org>2002-03-05 00:53:46 +0000
committerTim Potter <tpot@samba.org>2002-03-05 00:53:46 +0000
commita7fa0733badad66ae610eac5e01569cf264976f3 (patch)
tree19fd5aca7b59ec69dd2abeaf92598173cc65e163 /source
parent472acd89b2bf5ec2a471957aaff42e560053f60e (diff)
downloadsamba-a7fa0733badad66ae610eac5e01569cf264976f3.tar.gz
samba-a7fa0733badad66ae610eac5e01569cf264976f3.tar.xz
samba-a7fa0733badad66ae610eac5e01569cf264976f3.zip
Spelling fixes.
Diffstat (limited to 'source')
-rw-r--r--source/include/ntdomain.h2
-rw-r--r--source/rpc_server/srv_netlog_nt.c6
2 files changed, 4 insertions, 4 deletions
diff --git a/source/include/ntdomain.h b/source/include/ntdomain.h
index 779c2deedd8..57eb4f43311 100644
--- a/source/include/ntdomain.h
+++ b/source/include/ntdomain.h
@@ -159,7 +159,7 @@ struct dcinfo
fstring remote_machine; /* Machine name we've authenticated. */
- BOOL challange_sent;
+ BOOL challenge_sent;
BOOL got_session_key;
BOOL authenticated;
diff --git a/source/rpc_server/srv_netlog_nt.c b/source/rpc_server/srv_netlog_nt.c
index 72b8569b43d..92ebfd97c5c 100644
--- a/source/rpc_server/srv_netlog_nt.c
+++ b/source/rpc_server/srv_netlog_nt.c
@@ -242,7 +242,7 @@ NTSTATUS _net_req_chal(pipes_struct *p, NET_Q_REQ_CHAL *q_u, NET_R_REQ_CHAL *r_u
memset((char *)p->dc.sess_key, '\0', sizeof(p->dc.sess_key));
- p->dc.challange_sent = True;
+ p->dc.challenge_sent = True;
/* set up the LSA REQUEST CHALLENGE response */
init_net_r_req_chal(r_u, &p->dc.srv_chal, status);
@@ -274,7 +274,7 @@ NTSTATUS _net_auth(pipes_struct *p, NET_Q_AUTH *q_u, NET_R_AUTH *r_u)
rpcstr_pull(mach_acct, q_u->clnt_id.uni_acct_name.buffer,sizeof(fstring),q_u->clnt_id.uni_acct_name.uni_str_len*2,0);
- if (p->dc.challange_sent && get_md4pw((char *)p->dc.md4pw, mach_acct)) {
+ if (p->dc.challenge_sent && get_md4pw((char *)p->dc.md4pw, mach_acct)) {
/* from client / server challenges and md4 password, generate sess key */
cred_session_key(&p->dc.clnt_chal, &p->dc.srv_chal,
@@ -336,7 +336,7 @@ NTSTATUS _net_auth_2(pipes_struct *p, NET_Q_AUTH_2 *q_u, NET_R_AUTH_2 *r_u)
rpcstr_pull(mach_acct, q_u->clnt_id.uni_acct_name.buffer,sizeof(fstring),q_u->clnt_id.uni_acct_name.uni_str_len*2,0);
- if (p->dc.challange_sent && get_md4pw((char *)p->dc.md4pw, mach_acct)) {
+ if (p->dc.challenge_sent && get_md4pw((char *)p->dc.md4pw, mach_acct)) {
/* from client / server challenges and md4 password, generate sess key */
cred_session_key(&p->dc.clnt_chal, &p->dc.srv_chal,