mirror of
https://github.com/samba-team/samba.git
synced 2025-01-22 22:04:08 +03:00
Spelling fixes.
(This used to be commit e67c7c5852624bcdd5c565ea5f00b143aaf7fee4)
This commit is contained in:
parent
03a4ebbfac
commit
1f670cfb27
@ -52,7 +52,7 @@ static const uint8 *get_ntlm_challenge(struct auth_context *auth_context)
|
||||
TALLOC_CTX *mem_ctx;
|
||||
|
||||
if (auth_context->challenge.length) {
|
||||
DEBUG(5, ("get_ntlm_challange (auth subsystem): returning previous challenge (normal)\n"));
|
||||
DEBUG(5, ("get_ntlm_challenge (auth subsystem): returning previous challenge (normal)\n"));
|
||||
return auth_context->challenge.data;
|
||||
}
|
||||
|
||||
@ -70,7 +70,7 @@ static const uint8 *get_ntlm_challenge(struct auth_context *auth_context)
|
||||
continue;
|
||||
}
|
||||
|
||||
mem_ctx = talloc_init_named("auth_get_challange for module %s", auth_method->name);
|
||||
mem_ctx = talloc_init_named("auth_get_challenge for module %s", auth_method->name);
|
||||
if (!mem_ctx) {
|
||||
smb_panic("talloc_init_named() failed!");
|
||||
}
|
||||
@ -156,10 +156,10 @@ static BOOL check_domain_match(const char *user, const char *domain)
|
||||
* @param user_info Contains the user supplied components, including the passwords.
|
||||
* Must be created with make_user_info() or one of its wrappers.
|
||||
*
|
||||
* @param auth_info Supplies the challanges and some other data.
|
||||
* Must be created with make_auth_info(), and the challanges should be
|
||||
* filled in, either at creation or by calling the challange geneation
|
||||
* function auth_get_challange().
|
||||
* @param auth_info Supplies the challenges and some other data.
|
||||
* Must be created with make_auth_info(), and the challenges should be
|
||||
* filled in, either at creation or by calling the challenge geneation
|
||||
* function auth_get_challenge().
|
||||
*
|
||||
* @param server_info If successful, contains information about the authenticaion,
|
||||
* including a SAM_ACCOUNT struct describing the user.
|
||||
|
@ -64,6 +64,8 @@ static struct node_status *parse_node_status(char *p, int *num_names)
|
||||
ret[i].type = CVAL(p,15);
|
||||
ret[i].flags = p[16];
|
||||
p += 18;
|
||||
DEBUG(10, ("%s#%02x: flags = 0x%02x\n", ret[i].name,
|
||||
ret[i].type, ret[i].flags));
|
||||
}
|
||||
return ret;
|
||||
}
|
||||
|
@ -29,23 +29,23 @@ BOOL global_encrypted_passwords_negotiated = False;
|
||||
BOOL global_spnego_negotiated = False;
|
||||
struct auth_context *negprot_global_auth_context = NULL;
|
||||
|
||||
static void get_challange(char buff[8])
|
||||
static void get_challenge(char buff[8])
|
||||
{
|
||||
NTSTATUS nt_status;
|
||||
const uint8 *cryptkey;
|
||||
|
||||
/* We might be called more than once, muliple negprots are premitted */
|
||||
if (negprot_global_auth_context) {
|
||||
DEBUG(3, ("get challange: is this a secondary negprot? negprot_global_auth_context is non-NULL!\n"));
|
||||
DEBUG(3, ("get challenge: is this a secondary negprot? negprot_global_auth_context is non-NULL!\n"));
|
||||
(negprot_global_auth_context->free)(&negprot_global_auth_context);
|
||||
}
|
||||
|
||||
DEBUG(10, ("get challange: creating negprot_global_auth_context\n"));
|
||||
DEBUG(10, ("get challenge: creating negprot_global_auth_context\n"));
|
||||
if (!NT_STATUS_IS_OK(nt_status = make_auth_context_subsystem(&negprot_global_auth_context))) {
|
||||
DEBUG(0, ("make_auth_context_subsystem returned %s", get_nt_error_msg(nt_status)));
|
||||
smb_panic("cannot make_negprot_global_auth_context!\n");
|
||||
}
|
||||
DEBUG(10, ("get challange: getting challange\n"));
|
||||
DEBUG(10, ("get challenge: getting challenge\n"));
|
||||
cryptkey = negprot_global_auth_context->get_ntlm_challenge(negprot_global_auth_context);
|
||||
memcpy(buff, cryptkey, 8);
|
||||
}
|
||||
@ -100,7 +100,7 @@ static int reply_lanman1(char *inbuf, char *outbuf)
|
||||
SSVAL(outbuf,smb_vwv1,secword);
|
||||
/* Create a token value and add it to the outgoing packet. */
|
||||
if (global_encrypted_passwords_negotiated) {
|
||||
get_challange(smb_buf(outbuf));
|
||||
get_challenge(smb_buf(outbuf));
|
||||
}
|
||||
|
||||
Protocol = PROTOCOL_LANMAN1;
|
||||
@ -141,7 +141,7 @@ static int reply_lanman2(char *inbuf, char *outbuf)
|
||||
|
||||
/* Create a token value and add it to the outgoing packet. */
|
||||
if (global_encrypted_passwords_negotiated) {
|
||||
get_challange(smb_buf(outbuf));
|
||||
get_challenge(smb_buf(outbuf));
|
||||
}
|
||||
|
||||
Protocol = PROTOCOL_LANMAN2;
|
||||
@ -286,7 +286,7 @@ static int reply_nt1(char *inbuf, char *outbuf)
|
||||
if (!negotiate_spnego) {
|
||||
/* Create a token value and add it to the outgoing packet. */
|
||||
if (global_encrypted_passwords_negotiated) {
|
||||
get_challange(p);
|
||||
get_challenge(p);
|
||||
}
|
||||
SSVALS(outbuf,smb_vwv16+1,8);
|
||||
p += 8;
|
||||
|
Loading…
x
Reference in New Issue
Block a user