From 178f6a64b26d828db6b516392d7072e9c29f6233 Mon Sep 17 00:00:00 2001 From: Tim Potter Date: Mon, 26 Nov 2001 04:05:28 +0000 Subject: challange -> challenge (This used to be commit d6318add27f6bca5be00cbedf2226b642341297a) --- source3/smbd/negprot.c | 6 +++--- source3/smbd/process.c | 8 ++++---- source3/smbd/sesssetup.c | 4 ++-- 3 files changed, 9 insertions(+), 9 deletions(-) (limited to 'source3/smbd') diff --git a/source3/smbd/negprot.c b/source3/smbd/negprot.c index a2666ae24e..9cbe0fdb0a 100644 --- a/source3/smbd/negprot.c +++ b/source3/smbd/negprot.c @@ -83,7 +83,7 @@ static int reply_lanman1(char *inbuf, char *outbuf) if (!make_auth_info_subsystem(&negprot_global_auth_info)) { smb_panic("cannot make_negprot_global_auth_info!\n"); } - cryptkey = auth_get_challange(negprot_global_auth_info); + cryptkey = auth_get_challenge(negprot_global_auth_info); memcpy(smb_buf(outbuf), cryptkey.data, 8); data_blob_free(&cryptkey); } @@ -129,7 +129,7 @@ static int reply_lanman2(char *inbuf, char *outbuf) if (!make_auth_info_subsystem(&negprot_global_auth_info)) { smb_panic("cannot make_negprot_global_auth_info!\n"); } - cryptkey = auth_get_challange(negprot_global_auth_info); + cryptkey = auth_get_challenge(negprot_global_auth_info); memcpy(smb_buf(outbuf), cryptkey.data, 8); data_blob_free(&cryptkey); } @@ -265,7 +265,7 @@ static int reply_nt1(char *inbuf, char *outbuf) if (!make_auth_info_subsystem(&negprot_global_auth_info)) { smb_panic("cannot make_negprot_global_auth_info!\n"); } - cryptkey = auth_get_challange(negprot_global_auth_info); + cryptkey = auth_get_challenge(negprot_global_auth_info); memcpy(p, cryptkey.data, 8); data_blob_free(&cryptkey); } diff --git a/source3/smbd/process.c b/source3/smbd/process.c index d9322ae26c..d4881b0ba5 100644 --- a/source3/smbd/process.c +++ b/source3/smbd/process.c @@ -1122,10 +1122,10 @@ static BOOL timeout_processing(int deadtime, int *select_timeout, time_t *last_t This is attached to the auth_info created in the negprot */ if (negprot_global_auth_info - && negprot_global_auth_info->challange_set_method - && negprot_global_auth_info->challange_set_method->send_keepalive) { - negprot_global_auth_info->challange_set_method->send_keepalive - (&negprot_global_auth_info->challange_set_method->private_data); + && negprot_global_auth_info->challenge_set_method + && negprot_global_auth_info->challenge_set_method->send_keepalive) { + negprot_global_auth_info->challenge_set_method->send_keepalive + (&negprot_global_auth_info->challenge_set_method->private_data); } last_keepalive_sent_time = t; diff --git a/source3/smbd/sesssetup.c b/source3/smbd/sesssetup.c index 854513bb47..1b6776ed70 100644 --- a/source3/smbd/sesssetup.c +++ b/source3/smbd/sesssetup.c @@ -235,7 +235,7 @@ static int reply_spnego_negotiate(connection_struct *conn, return ERROR_NT(NT_STATUS_NO_MEMORY); } - cryptkey = auth_get_challange(ntlmssp_auth_info); + cryptkey = auth_get_challenge(ntlmssp_auth_info); /* Give them the challenge. For now, ignore neg_flags and just return the flags we want. Obviously this is not correct */ @@ -649,7 +649,7 @@ int reply_sesssetup_and_X(connection_struct *conn, char *inbuf,char *outbuf, return ERROR_NT(NT_STATUS_NO_MEMORY); } - chal = auth_get_challange(plaintext_auth_info); + chal = auth_get_challenge(plaintext_auth_info); if (!make_user_info_for_reply(&user_info, user, domain, chal.data, -- cgit