summaryrefslogtreecommitdiff
path: root/source3/auth/auth_sam.c
diff options
context:
space:
mode:
authorTim Potter <tpot@samba.org>2001-11-26 04:05:28 +0000
committerTim Potter <tpot@samba.org>2001-11-26 04:05:28 +0000
commit178f6a64b26d828db6b516392d7072e9c29f6233 (patch)
treedc7f83d479cf9994e8c751f4bd475174071cac38 /source3/auth/auth_sam.c
parentabe6aff924ed56a36ba6390d692446019bef0f21 (diff)
downloadsamba-178f6a64b26d828db6b516392d7072e9c29f6233.tar.gz
samba-178f6a64b26d828db6b516392d7072e9c29f6233.tar.bz2
samba-178f6a64b26d828db6b516392d7072e9c29f6233.zip
challange -> challenge
(This used to be commit d6318add27f6bca5be00cbedf2226b642341297a)
Diffstat (limited to 'source3/auth/auth_sam.c')
-rw-r--r--source3/auth/auth_sam.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/source3/auth/auth_sam.c b/source3/auth/auth_sam.c
index 24a4d4e4e4..421349a765 100644
--- a/source3/auth/auth_sam.c
+++ b/source3/auth/auth_sam.c
@@ -41,7 +41,7 @@ static BOOL smb_pwd_check_ntlmv1(DATA_BLOB nt_response,
}
if (sec_blob.length != 8) {
- DEBUG(0, ("smb_pwd_check_ntlmv1: incorrect challange size (%d)\n", sec_blob.length));
+ DEBUG(0, ("smb_pwd_check_ntlmv1: incorrect challenge size (%d)\n", sec_blob.length));
return False;
}
@@ -174,7 +174,7 @@ static NTSTATUS sam_password_ok(SAM_ACCOUNT *sampass,
*/
DEBUG(4,("smb_password_ok: Checking NTLMv2 password\n"));
if (smb_pwd_check_ntlmv2( user_info->nt_resp,
- nt_pw, auth_info->challange,
+ nt_pw, auth_info->challenge,
user_info->smb_name.str,
user_info->client_domain.str,
user_sess_key))
@@ -191,7 +191,7 @@ static NTSTATUS sam_password_ok(SAM_ACCOUNT *sampass,
*/
DEBUG(4,("smb_password_ok: Checking NT MD4 password\n"));
if (smb_pwd_check_ntlmv1(user_info->nt_resp,
- nt_pw, auth_info->challange,
+ nt_pw, auth_info->challenge,
user_sess_key))
{
return NT_STATUS_OK;
@@ -224,7 +224,7 @@ static NTSTATUS sam_password_ok(SAM_ACCOUNT *sampass,
DEBUG(4,("smb_password_ok: Checking LM password\n"));
if (smb_pwd_check_ntlmv1(user_info->lm_resp,
- lm_pw, auth_info->challange,
+ lm_pw, auth_info->challenge,
user_sess_key))
{
return NT_STATUS_OK;