summaryrefslogtreecommitdiff
path: root/source3/smbd
diff options
context:
space:
mode:
authorTim Potter <tpot@samba.org>2001-11-26 04:05:28 +0000
committerTim Potter <tpot@samba.org>2001-11-26 04:05:28 +0000
commit178f6a64b26d828db6b516392d7072e9c29f6233 (patch)
treedc7f83d479cf9994e8c751f4bd475174071cac38 /source3/smbd
parentabe6aff924ed56a36ba6390d692446019bef0f21 (diff)
downloadsamba-178f6a64b26d828db6b516392d7072e9c29f6233.tar.gz
samba-178f6a64b26d828db6b516392d7072e9c29f6233.tar.bz2
samba-178f6a64b26d828db6b516392d7072e9c29f6233.zip
challange -> challenge
(This used to be commit d6318add27f6bca5be00cbedf2226b642341297a)
Diffstat (limited to 'source3/smbd')
-rw-r--r--source3/smbd/negprot.c6
-rw-r--r--source3/smbd/process.c8
-rw-r--r--source3/smbd/sesssetup.c4
3 files changed, 9 insertions, 9 deletions
diff --git a/source3/smbd/negprot.c b/source3/smbd/negprot.c
index a2666ae24e..9cbe0fdb0a 100644
--- a/source3/smbd/negprot.c
+++ b/source3/smbd/negprot.c
@@ -83,7 +83,7 @@ static int reply_lanman1(char *inbuf, char *outbuf)
if (!make_auth_info_subsystem(&negprot_global_auth_info)) {
smb_panic("cannot make_negprot_global_auth_info!\n");
}
- cryptkey = auth_get_challange(negprot_global_auth_info);
+ cryptkey = auth_get_challenge(negprot_global_auth_info);
memcpy(smb_buf(outbuf), cryptkey.data, 8);
data_blob_free(&cryptkey);
}
@@ -129,7 +129,7 @@ static int reply_lanman2(char *inbuf, char *outbuf)
if (!make_auth_info_subsystem(&negprot_global_auth_info)) {
smb_panic("cannot make_negprot_global_auth_info!\n");
}
- cryptkey = auth_get_challange(negprot_global_auth_info);
+ cryptkey = auth_get_challenge(negprot_global_auth_info);
memcpy(smb_buf(outbuf), cryptkey.data, 8);
data_blob_free(&cryptkey);
}
@@ -265,7 +265,7 @@ static int reply_nt1(char *inbuf, char *outbuf)
if (!make_auth_info_subsystem(&negprot_global_auth_info)) {
smb_panic("cannot make_negprot_global_auth_info!\n");
}
- cryptkey = auth_get_challange(negprot_global_auth_info);
+ cryptkey = auth_get_challenge(negprot_global_auth_info);
memcpy(p, cryptkey.data, 8);
data_blob_free(&cryptkey);
}
diff --git a/source3/smbd/process.c b/source3/smbd/process.c
index d9322ae26c..d4881b0ba5 100644
--- a/source3/smbd/process.c
+++ b/source3/smbd/process.c
@@ -1122,10 +1122,10 @@ static BOOL timeout_processing(int deadtime, int *select_timeout, time_t *last_t
This is attached to the auth_info created in the
negprot */
if (negprot_global_auth_info
- && negprot_global_auth_info->challange_set_method
- && negprot_global_auth_info->challange_set_method->send_keepalive) {
- negprot_global_auth_info->challange_set_method->send_keepalive
- (&negprot_global_auth_info->challange_set_method->private_data);
+ && negprot_global_auth_info->challenge_set_method
+ && negprot_global_auth_info->challenge_set_method->send_keepalive) {
+ negprot_global_auth_info->challenge_set_method->send_keepalive
+ (&negprot_global_auth_info->challenge_set_method->private_data);
}
last_keepalive_sent_time = t;
diff --git a/source3/smbd/sesssetup.c b/source3/smbd/sesssetup.c
index 854513bb47..1b6776ed70 100644
--- a/source3/smbd/sesssetup.c
+++ b/source3/smbd/sesssetup.c
@@ -235,7 +235,7 @@ static int reply_spnego_negotiate(connection_struct *conn,
return ERROR_NT(NT_STATUS_NO_MEMORY);
}
- cryptkey = auth_get_challange(ntlmssp_auth_info);
+ cryptkey = auth_get_challenge(ntlmssp_auth_info);
/* Give them the challenge. For now, ignore neg_flags and just
return the flags we want. Obviously this is not correct */
@@ -649,7 +649,7 @@ int reply_sesssetup_and_X(connection_struct *conn, char *inbuf,char *outbuf,
return ERROR_NT(NT_STATUS_NO_MEMORY);
}
- chal = auth_get_challange(plaintext_auth_info);
+ chal = auth_get_challenge(plaintext_auth_info);
if (!make_user_info_for_reply(&user_info,
user, domain, chal.data,