summaryrefslogtreecommitdiff
path: root/source3/smbd
diff options
context:
space:
mode:
authorTim Potter <tpot@samba.org>2002-01-20 22:50:23 +0000
committerTim Potter <tpot@samba.org>2002-01-20 22:50:23 +0000
commit1f670cfb275ee34e66f504cd35b1c790840999bf (patch)
tree514ac3583c4472490ca4b0a2aa28c5bf01366d22 /source3/smbd
parent03a4ebbfac78bff612b3973c4cc612f0eb95ade6 (diff)
downloadsamba-1f670cfb275ee34e66f504cd35b1c790840999bf.tar.gz
samba-1f670cfb275ee34e66f504cd35b1c790840999bf.tar.bz2
samba-1f670cfb275ee34e66f504cd35b1c790840999bf.zip
Spelling fixes.
(This used to be commit e67c7c5852624bcdd5c565ea5f00b143aaf7fee4)
Diffstat (limited to 'source3/smbd')
-rw-r--r--source3/smbd/negprot.c14
1 files changed, 7 insertions, 7 deletions
diff --git a/source3/smbd/negprot.c b/source3/smbd/negprot.c
index 5899f0af52..04e6eb445b 100644
--- a/source3/smbd/negprot.c
+++ b/source3/smbd/negprot.c
@@ -29,23 +29,23 @@ BOOL global_encrypted_passwords_negotiated = False;
BOOL global_spnego_negotiated = False;
struct auth_context *negprot_global_auth_context = NULL;
-static void get_challange(char buff[8])
+static void get_challenge(char buff[8])
{
NTSTATUS nt_status;
const uint8 *cryptkey;
/* We might be called more than once, muliple negprots are premitted */
if (negprot_global_auth_context) {
- DEBUG(3, ("get challange: is this a secondary negprot? negprot_global_auth_context is non-NULL!\n"));
+ DEBUG(3, ("get challenge: is this a secondary negprot? negprot_global_auth_context is non-NULL!\n"));
(negprot_global_auth_context->free)(&negprot_global_auth_context);
}
- DEBUG(10, ("get challange: creating negprot_global_auth_context\n"));
+ DEBUG(10, ("get challenge: creating negprot_global_auth_context\n"));
if (!NT_STATUS_IS_OK(nt_status = make_auth_context_subsystem(&negprot_global_auth_context))) {
DEBUG(0, ("make_auth_context_subsystem returned %s", get_nt_error_msg(nt_status)));
smb_panic("cannot make_negprot_global_auth_context!\n");
}
- DEBUG(10, ("get challange: getting challange\n"));
+ DEBUG(10, ("get challenge: getting challenge\n"));
cryptkey = negprot_global_auth_context->get_ntlm_challenge(negprot_global_auth_context);
memcpy(buff, cryptkey, 8);
}
@@ -100,7 +100,7 @@ static int reply_lanman1(char *inbuf, char *outbuf)
SSVAL(outbuf,smb_vwv1,secword);
/* Create a token value and add it to the outgoing packet. */
if (global_encrypted_passwords_negotiated) {
- get_challange(smb_buf(outbuf));
+ get_challenge(smb_buf(outbuf));
}
Protocol = PROTOCOL_LANMAN1;
@@ -141,7 +141,7 @@ static int reply_lanman2(char *inbuf, char *outbuf)
/* Create a token value and add it to the outgoing packet. */
if (global_encrypted_passwords_negotiated) {
- get_challange(smb_buf(outbuf));
+ get_challenge(smb_buf(outbuf));
}
Protocol = PROTOCOL_LANMAN2;
@@ -286,7 +286,7 @@ static int reply_nt1(char *inbuf, char *outbuf)
if (!negotiate_spnego) {
/* Create a token value and add it to the outgoing packet. */
if (global_encrypted_passwords_negotiated) {
- get_challange(p);
+ get_challenge(p);
}
SSVALS(outbuf,smb_vwv16+1,8);
p += 8;