From 308b222ffd4705d8f4ff53fbb76fc7c1db29bd27 Mon Sep 17 00:00:00 2001 From: Tim Potter Date: Tue, 5 Mar 2002 00:53:46 +0000 Subject: Spelling fixes. (This used to be commit a7fa0733badad66ae610eac5e01569cf264976f3) --- source3/include/ntdomain.h | 2 +- source3/rpc_server/srv_netlog_nt.c | 6 +++--- 2 files changed, 4 insertions(+), 4 deletions(-) (limited to 'source3') diff --git a/source3/include/ntdomain.h b/source3/include/ntdomain.h index 779c2deedd..57eb4f4331 100644 --- a/source3/include/ntdomain.h +++ b/source3/include/ntdomain.h @@ -159,7 +159,7 @@ struct dcinfo fstring remote_machine; /* Machine name we've authenticated. */ - BOOL challange_sent; + BOOL challenge_sent; BOOL got_session_key; BOOL authenticated; diff --git a/source3/rpc_server/srv_netlog_nt.c b/source3/rpc_server/srv_netlog_nt.c index 72b8569b43..92ebfd97c5 100644 --- a/source3/rpc_server/srv_netlog_nt.c +++ b/source3/rpc_server/srv_netlog_nt.c @@ -242,7 +242,7 @@ NTSTATUS _net_req_chal(pipes_struct *p, NET_Q_REQ_CHAL *q_u, NET_R_REQ_CHAL *r_u memset((char *)p->dc.sess_key, '\0', sizeof(p->dc.sess_key)); - p->dc.challange_sent = True; + p->dc.challenge_sent = True; /* set up the LSA REQUEST CHALLENGE response */ init_net_r_req_chal(r_u, &p->dc.srv_chal, status); @@ -274,7 +274,7 @@ NTSTATUS _net_auth(pipes_struct *p, NET_Q_AUTH *q_u, NET_R_AUTH *r_u) rpcstr_pull(mach_acct, q_u->clnt_id.uni_acct_name.buffer,sizeof(fstring),q_u->clnt_id.uni_acct_name.uni_str_len*2,0); - if (p->dc.challange_sent && get_md4pw((char *)p->dc.md4pw, mach_acct)) { + if (p->dc.challenge_sent && get_md4pw((char *)p->dc.md4pw, mach_acct)) { /* from client / server challenges and md4 password, generate sess key */ cred_session_key(&p->dc.clnt_chal, &p->dc.srv_chal, @@ -336,7 +336,7 @@ NTSTATUS _net_auth_2(pipes_struct *p, NET_Q_AUTH_2 *q_u, NET_R_AUTH_2 *r_u) rpcstr_pull(mach_acct, q_u->clnt_id.uni_acct_name.buffer,sizeof(fstring),q_u->clnt_id.uni_acct_name.uni_str_len*2,0); - if (p->dc.challange_sent && get_md4pw((char *)p->dc.md4pw, mach_acct)) { + if (p->dc.challenge_sent && get_md4pw((char *)p->dc.md4pw, mach_acct)) { /* from client / server challenges and md4 password, generate sess key */ cred_session_key(&p->dc.clnt_chal, &p->dc.srv_chal, -- cgit