spelling
This commit is contained in:
@@ -273,7 +273,7 @@ client_mschapv2(const void *server_nonce, size_t snoncelen,
|
|||||||
const char *password)
|
const char *password)
|
||||||
{
|
{
|
||||||
EVP_MD_CTX *hctx, *ctx;
|
EVP_MD_CTX *hctx, *ctx;
|
||||||
unsigned char md[SHA_DIGEST_LENGTH], challange[SHA_DIGEST_LENGTH];
|
unsigned char md[SHA_DIGEST_LENGTH], challenge[SHA_DIGEST_LENGTH];
|
||||||
unsigned char hmd[MD4_DIGEST_LENGTH];
|
unsigned char hmd[MD4_DIGEST_LENGTH];
|
||||||
struct ntlm_buf answer;
|
struct ntlm_buf answer;
|
||||||
int i, len, ret;
|
int i, len, ret;
|
||||||
@@ -325,11 +325,11 @@ client_mschapv2(const void *server_nonce, size_t snoncelen,
|
|||||||
EVP_DigestUpdate(ctx, client_nonce, cnoncelen);
|
EVP_DigestUpdate(ctx, client_nonce, cnoncelen);
|
||||||
EVP_DigestUpdate(ctx, server_nonce, snoncelen);
|
EVP_DigestUpdate(ctx, server_nonce, snoncelen);
|
||||||
EVP_DigestUpdate(ctx, username, strlen(username));
|
EVP_DigestUpdate(ctx, username, strlen(username));
|
||||||
EVP_DigestFinal_ex(ctx, challange, NULL);
|
EVP_DigestFinal_ex(ctx, challenge, NULL);
|
||||||
|
|
||||||
EVP_DigestInit_ex(ctx, EVP_sha1(), NULL);
|
EVP_DigestInit_ex(ctx, EVP_sha1(), NULL);
|
||||||
EVP_DigestUpdate(ctx, md, sizeof(md));
|
EVP_DigestUpdate(ctx, md, sizeof(md));
|
||||||
EVP_DigestUpdate(ctx, challange, 8);
|
EVP_DigestUpdate(ctx, challenge, 8);
|
||||||
EVP_DigestUpdate(ctx, ms_chap_v2_magic2, sizeof(ms_chap_v2_magic2));
|
EVP_DigestUpdate(ctx, ms_chap_v2_magic2, sizeof(ms_chap_v2_magic2));
|
||||||
EVP_DigestFinal_ex(ctx, md, NULL);
|
EVP_DigestFinal_ex(ctx, md, NULL);
|
||||||
|
|
||||||
@@ -433,7 +433,7 @@ ntlm_server_init(struct ntlm_server_init_options *opt,
|
|||||||
krb5_error_code ret;
|
krb5_error_code ret;
|
||||||
krb5_ntlm ntlm;
|
krb5_ntlm ntlm;
|
||||||
struct ntlm_type2 type2;
|
struct ntlm_type2 type2;
|
||||||
krb5_data challange, opaque;
|
krb5_data challenge, opaque;
|
||||||
struct ntlm_buf data;
|
struct ntlm_buf data;
|
||||||
char *s;
|
char *s;
|
||||||
|
|
||||||
@@ -457,14 +457,14 @@ ntlm_server_init(struct ntlm_server_init_options *opt,
|
|||||||
*
|
*
|
||||||
*/
|
*/
|
||||||
|
|
||||||
ret = krb5_ntlm_init_get_challange(context, ntlm, &challange);
|
ret = krb5_ntlm_init_get_challange(context, ntlm, &challenge);
|
||||||
if (ret)
|
if (ret)
|
||||||
krb5_err(context, 1, ret, "krb5_ntlm_init_get_challange");
|
krb5_err(context, 1, ret, "krb5_ntlm_init_get_challange");
|
||||||
|
|
||||||
if (challange.length != sizeof(type2.challange))
|
if (challenge.length != sizeof(type2.challenge))
|
||||||
krb5_errx(context, 1, "ntlm challange have wrong length");
|
krb5_errx(context, 1, "ntlm challenge have wrong length");
|
||||||
memcpy(type2.challange, challange.data, sizeof(type2.challange));
|
memcpy(type2.challenge, challenge.data, sizeof(type2.challenge));
|
||||||
krb5_data_free(&challange);
|
krb5_data_free(&challenge);
|
||||||
|
|
||||||
ret = krb5_ntlm_init_get_flags(context, ntlm, &type2.flags);
|
ret = krb5_ntlm_init_get_flags(context, ntlm, &type2.flags);
|
||||||
if (ret)
|
if (ret)
|
||||||
|
Reference in New Issue
Block a user