diff options
author | Bill Meier <wmeier@newsguy.com> | 2013-02-26 04:42:26 +0000 |
---|---|---|
committer | Bill Meier <wmeier@newsguy.com> | 2013-02-26 04:42:26 +0000 |
commit | 96a24cc79f7a32851cc2005603e32633389043a3 (patch) | |
tree | 62c91332176b091409c8f06937bbce734155981e /epan/dissectors/packet-ntlmssp.c | |
parent | a6e56df8b683bb696655c331f64f22abc8f36af4 (diff) | |
download | wireshark-96a24cc79f7a32851cc2005603e32633389043a3.tar.gz |
Fix spelling/typos found using a list of commonly misspelled words.
The misspellings were mostly in comments but some were
in text strings visible to the user.
svn path=/trunk/; revision=47899
Diffstat (limited to 'epan/dissectors/packet-ntlmssp.c')
-rw-r--r-- | epan/dissectors/packet-ntlmssp.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/epan/dissectors/packet-ntlmssp.c b/epan/dissectors/packet-ntlmssp.c index ec781a39ae..7bd85d6bb3 100644 --- a/epan/dissectors/packet-ntlmssp.c +++ b/epan/dissectors/packet-ntlmssp.c @@ -2091,7 +2091,7 @@ decrypt_data_payload(tvbuff_t *tvb, int offset, guint32 encrypted_block_length, /* We setup a temporary buffer so we can re-encrypt the payload after decryption. This is to update the opposite peer's RC4 state it's useful when we have only one key for both conversation - in case of KEY_EXCH we have independant key so this is not needed*/ + in case of KEY_EXCH we have independent key so this is not needed*/ if (!(NTLMSSP_NEGOTIATE_KEY_EXCH & conv_ntlmssp_info->flags)) { guint8 *peer_block; peer_block = ep_memdup(packet_ntlmssp_info->decrypted_payload, encrypted_block_length); @@ -2330,7 +2330,7 @@ decrypt_verifier(tvbuff_t *tvb, int offset, guint32 encrypted_block_length, /* We setup a temporary buffer so we can re-encrypt the payload after decryption. This is to update the opposite peer's RC4 state This is not needed when we just have EXTENDED SECURITY because the signature is not crypted - and it's also not needed when we have key exchange because server and client have independant keys */ + and it's also not needed when we have key exchange because server and client have independent keys */ if (!(NTLMSSP_NEGOTIATE_KEY_EXCH & conv_ntlmssp_info->flags) && !(NTLMSSP_NEGOTIATE_EXTENDED_SECURITY & conv_ntlmssp_info->flags)) { peer_block = ep_memdup(packet_ntlmssp_info->verifier, encrypted_block_length); crypt_rc4(rc4_state_peer, peer_block, encrypted_block_length); |