From c71fe8f2cd591b9f59e5a83248817fee04772c15 Mon Sep 17 00:00:00 2001 From: Love Hornquist Astrand Date: Wed, 27 Oct 2010 21:13:47 -0700 Subject: [PATCH] spelling --- kuser/kdigest.c | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/kuser/kdigest.c b/kuser/kdigest.c index e2639319c..968328b38 100644 --- a/kuser/kdigest.c +++ b/kuser/kdigest.c @@ -273,7 +273,7 @@ client_mschapv2(const void *server_nonce, size_t snoncelen, const char *password) { EVP_MD_CTX *hctx, *ctx; - unsigned char md[SHA_DIGEST_LENGTH], challange[SHA_DIGEST_LENGTH]; + unsigned char md[SHA_DIGEST_LENGTH], challenge[SHA_DIGEST_LENGTH]; unsigned char hmd[MD4_DIGEST_LENGTH]; struct ntlm_buf answer; int i, len, ret; @@ -325,11 +325,11 @@ client_mschapv2(const void *server_nonce, size_t snoncelen, EVP_DigestUpdate(ctx, client_nonce, cnoncelen); EVP_DigestUpdate(ctx, server_nonce, snoncelen); EVP_DigestUpdate(ctx, username, strlen(username)); - EVP_DigestFinal_ex(ctx, challange, NULL); + EVP_DigestFinal_ex(ctx, challenge, NULL); EVP_DigestInit_ex(ctx, EVP_sha1(), NULL); EVP_DigestUpdate(ctx, md, sizeof(md)); - EVP_DigestUpdate(ctx, challange, 8); + EVP_DigestUpdate(ctx, challenge, 8); EVP_DigestUpdate(ctx, ms_chap_v2_magic2, sizeof(ms_chap_v2_magic2)); EVP_DigestFinal_ex(ctx, md, NULL); @@ -433,7 +433,7 @@ ntlm_server_init(struct ntlm_server_init_options *opt, krb5_error_code ret; krb5_ntlm ntlm; struct ntlm_type2 type2; - krb5_data challange, opaque; + krb5_data challenge, opaque; struct ntlm_buf data; char *s; @@ -457,14 +457,14 @@ ntlm_server_init(struct ntlm_server_init_options *opt, * */ - ret = krb5_ntlm_init_get_challange(context, ntlm, &challange); + ret = krb5_ntlm_init_get_challange(context, ntlm, &challenge); if (ret) krb5_err(context, 1, ret, "krb5_ntlm_init_get_challange"); - if (challange.length != sizeof(type2.challange)) - krb5_errx(context, 1, "ntlm challange have wrong length"); - memcpy(type2.challange, challange.data, sizeof(type2.challange)); - krb5_data_free(&challange); + if (challenge.length != sizeof(type2.challenge)) + krb5_errx(context, 1, "ntlm challenge have wrong length"); + memcpy(type2.challenge, challenge.data, sizeof(type2.challenge)); + krb5_data_free(&challenge); ret = krb5_ntlm_init_get_flags(context, ntlm, &type2.flags); if (ret)