aboutsummaryrefslogtreecommitdiffstats
path: root/epan/dissectors/packet-ntlmssp.c
diff options
context:
space:
mode:
Diffstat (limited to 'epan/dissectors/packet-ntlmssp.c')
-rw-r--r--epan/dissectors/packet-ntlmssp.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/epan/dissectors/packet-ntlmssp.c b/epan/dissectors/packet-ntlmssp.c
index 83221c50ec..4c029bf5dd 100644
--- a/epan/dissectors/packet-ntlmssp.c
+++ b/epan/dissectors/packet-ntlmssp.c
@@ -546,7 +546,7 @@ create_ntlmssp_v2_key(const char *nt_password _U_, const guint8 *serverchallenge
guint32 nb_pass = 0;
gboolean found = FALSE;
- /* We are going to try password encrypted in keytab as well, it's an idean of Stefan Metzmacher <metze@samba.org>
+ /* We are going to try password encrypted in keytab as well, it's an idea of Stefan Metzmacher <metze@samba.org>
* The idea is to be able to test all the key of domain in once and to be able to decode the NTLM dialogs */
memset(sessionkey, 0, NTLMSSP_KEY_LEN);
@@ -566,7 +566,7 @@ create_ntlmssp_v2_key(const char *nt_password _U_, const guint8 *serverchallenge
}
}
else {
- /* Unable to calculate the session not enought space in buffer, note this is unlikely to happen but ......*/
+ /* Unable to calculate the session not enough space in buffer, note this is unlikely to happen but ......*/
return;
}
domain_len = strlen(ntlmssph->domain_name);
@@ -574,7 +574,7 @@ create_ntlmssp_v2_key(const char *nt_password _U_, const guint8 *serverchallenge
str_to_unicode(ntlmssph->domain_name, domain_name_unicode);
}
else {
- /* Unable to calculate the session not enought space in buffer, note this is unlikely to happen but ......*/
+ /* Unable to calculate the session not enough space in buffer, note this is unlikely to happen but ......*/
return;
}
while (i < nb_pass) {