diff options
author | Günther Deschner <gd@samba.org> | 2009-08-25 18:59:39 +0200 |
---|---|---|
committer | Günther Deschner <gd@samba.org> | 2009-08-27 15:55:18 +0200 |
commit | a18d6839aceb7db05f46d87281ad41f30edb515f (patch) | |
tree | 1530ab30165de38a97580887d6f5dff4fe5e82d9 | |
parent | 598127259894353ffe23316b50408924983a5e82 (diff) | |
download | samba-a18d6839aceb7db05f46d87281ad41f30edb515f.tar.gz samba-a18d6839aceb7db05f46d87281ad41f30edb515f.tar.bz2 samba-a18d6839aceb7db05f46d87281ad41f30edb515f.zip |
libcli/auth: rename schannel_state.c to schannel_state_ldb.c.
Guenther
-rw-r--r-- | libcli/auth/config.mk | 2 | ||||
-rw-r--r-- | libcli/auth/schannel_state_ldb.c (renamed from libcli/auth/schannel_state.c) | 26 |
2 files changed, 14 insertions, 14 deletions
diff --git a/libcli/auth/config.mk b/libcli/auth/config.mk index 11fdeedaea..bda9850db4 100644 --- a/libcli/auth/config.mk +++ b/libcli/auth/config.mk @@ -23,4 +23,4 @@ PUBLIC_HEADERS += ../libcli/auth/credentials.h [SUBSYSTEM::COMMON_SCHANNELDB] PRIVATE_DEPENDENCIES = LDB_WRAP -COMMON_SCHANNELDB_OBJ_FILES = $(addprefix $(libclicommonsrcdir)/auth/, schannel_state.o) +COMMON_SCHANNELDB_OBJ_FILES = $(addprefix $(libclicommonsrcdir)/auth/, schannel_state_ldb.o) diff --git a/libcli/auth/schannel_state.c b/libcli/auth/schannel_state_ldb.c index e01330010b..047d80ac11 100644 --- a/libcli/auth/schannel_state.c +++ b/libcli/auth/schannel_state_ldb.c @@ -1,4 +1,4 @@ -/* +/* Unix SMB/CIFS implementation. module to store/fetch session keys for the schannel server @@ -10,12 +10,12 @@ it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 3 of the License, or (at your option) any later version. - + This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. - + You should have received a copy of the GNU General Public License along with this program. If not, see <http://www.gnu.org/licenses/>. */ @@ -143,12 +143,12 @@ NTSTATUS schannel_store_session_key(struct ldb_context *ldb, ret = ldb_modify(ldb, msg); } - + /* We don't need a transaction here, as we either add or * modify records, never delete them, so it must exist */ if (ret != LDB_SUCCESS) { - DEBUG(0,("Unable to add %s to session key db - %s\n", + DEBUG(0,("Unable to add %s to session key db - %s\n", ldb_dn_get_linearized(msg->dn), ldb_errstring(ldb))); return NT_STATUS_INTERNAL_DB_CORRUPTION; } @@ -161,7 +161,7 @@ NTSTATUS schannel_store_session_key(struct ldb_context *ldb, */ NTSTATUS schannel_fetch_session_key(struct ldb_context *ldb, TALLOC_CTX *mem_ctx, - const char *computer_name, + const char *computer_name, struct netlogon_creds_CredentialState **creds) { struct ldb_result *res; @@ -262,13 +262,13 @@ NTSTATUS schannel_fetch_session_key(struct ldb_context *ldb, */ NTSTATUS schannel_creds_server_step_check(struct ldb_context *ldb, - TALLOC_CTX *mem_ctx, + TALLOC_CTX *mem_ctx, const char *computer_name, bool schannel_required_for_call, bool schannel_in_use, struct netr_Authenticator *received_authenticator, struct netr_Authenticator *return_authenticator, - struct netlogon_creds_CredentialState **creds_out) + struct netlogon_creds_CredentialState **creds_out) { struct netlogon_creds_CredentialState *creds; NTSTATUS nt_status; @@ -281,9 +281,9 @@ NTSTATUS schannel_creds_server_step_check(struct ldb_context *ldb, /* Because this is a shared structure (even across * disconnects) we must update the database every time we - * update the structure */ - - nt_status = schannel_fetch_session_key(ldb, ldb, computer_name, + * update the structure */ + + nt_status = schannel_fetch_session_key(ldb, ldb, computer_name, &creds); /* If we are flaged that schannel is required for a call, and @@ -299,8 +299,8 @@ NTSTATUS schannel_creds_server_step_check(struct ldb_context *ldb, } if (NT_STATUS_IS_OK(nt_status)) { - nt_status = netlogon_creds_server_step_check(creds, - received_authenticator, + nt_status = netlogon_creds_server_step_check(creds, + received_authenticator, return_authenticator); } |