summaryrefslogtreecommitdiff
path: root/source3/rpc_server/srv_netlog_nt.c
diff options
context:
space:
mode:
authorTim Potter <tpot@samba.org>2002-03-05 00:53:46 +0000
committerTim Potter <tpot@samba.org>2002-03-05 00:53:46 +0000
commit308b222ffd4705d8f4ff53fbb76fc7c1db29bd27 (patch)
tree67a849d982212b2bd1fc963241d866b988fbb912 /source3/rpc_server/srv_netlog_nt.c
parentdb4dd16d8d61883f8b011ae3ea948578ddba8beb (diff)
downloadsamba-308b222ffd4705d8f4ff53fbb76fc7c1db29bd27.tar.gz
samba-308b222ffd4705d8f4ff53fbb76fc7c1db29bd27.tar.bz2
samba-308b222ffd4705d8f4ff53fbb76fc7c1db29bd27.zip
Spelling fixes.
(This used to be commit a7fa0733badad66ae610eac5e01569cf264976f3)
Diffstat (limited to 'source3/rpc_server/srv_netlog_nt.c')
-rw-r--r--source3/rpc_server/srv_netlog_nt.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/source3/rpc_server/srv_netlog_nt.c b/source3/rpc_server/srv_netlog_nt.c
index 72b8569b43..92ebfd97c5 100644
--- a/source3/rpc_server/srv_netlog_nt.c
+++ b/source3/rpc_server/srv_netlog_nt.c
@@ -242,7 +242,7 @@ NTSTATUS _net_req_chal(pipes_struct *p, NET_Q_REQ_CHAL *q_u, NET_R_REQ_CHAL *r_u
memset((char *)p->dc.sess_key, '\0', sizeof(p->dc.sess_key));
- p->dc.challange_sent = True;
+ p->dc.challenge_sent = True;
/* set up the LSA REQUEST CHALLENGE response */
init_net_r_req_chal(r_u, &p->dc.srv_chal, status);
@@ -274,7 +274,7 @@ NTSTATUS _net_auth(pipes_struct *p, NET_Q_AUTH *q_u, NET_R_AUTH *r_u)
rpcstr_pull(mach_acct, q_u->clnt_id.uni_acct_name.buffer,sizeof(fstring),q_u->clnt_id.uni_acct_name.uni_str_len*2,0);
- if (p->dc.challange_sent && get_md4pw((char *)p->dc.md4pw, mach_acct)) {
+ if (p->dc.challenge_sent && get_md4pw((char *)p->dc.md4pw, mach_acct)) {
/* from client / server challenges and md4 password, generate sess key */
cred_session_key(&p->dc.clnt_chal, &p->dc.srv_chal,
@@ -336,7 +336,7 @@ NTSTATUS _net_auth_2(pipes_struct *p, NET_Q_AUTH_2 *q_u, NET_R_AUTH_2 *r_u)
rpcstr_pull(mach_acct, q_u->clnt_id.uni_acct_name.buffer,sizeof(fstring),q_u->clnt_id.uni_acct_name.uni_str_len*2,0);
- if (p->dc.challange_sent && get_md4pw((char *)p->dc.md4pw, mach_acct)) {
+ if (p->dc.challenge_sent && get_md4pw((char *)p->dc.md4pw, mach_acct)) {
/* from client / server challenges and md4 password, generate sess key */
cred_session_key(&p->dc.clnt_chal, &p->dc.srv_chal,