summaryrefslogtreecommitdiff
path: root/source3/auth/auth.c
diff options
context:
space:
mode:
authorAndrew Tridgell <tridge@samba.org>2001-08-27 17:52:23 +0000
committerAndrew Tridgell <tridge@samba.org>2001-08-27 17:52:23 +0000
commitee5f7237decfe446f4fdb08422beb2e6cb43af7f (patch)
tree80b217a2938d7e0d46a5d20517c9adb0807ecd1a /source3/auth/auth.c
parente8e98c9ea0690e3acf1126b50882e59e1056c7b3 (diff)
downloadsamba-ee5f7237decfe446f4fdb08422beb2e6cb43af7f.tar.gz
samba-ee5f7237decfe446f4fdb08422beb2e6cb43af7f.tar.bz2
samba-ee5f7237decfe446f4fdb08422beb2e6cb43af7f.zip
started converting NTSTATUS to be a structure on systems with gcc in order to make it type incompatible with BOOL so we catch errors sooner. This has already found a number of bugs
(This used to be commit 1b778bc7d22efff3f90dc450eb12baa1241cf68f)
Diffstat (limited to 'source3/auth/auth.c')
-rw-r--r--source3/auth/auth.c17
1 files changed, 9 insertions, 8 deletions
diff --git a/source3/auth/auth.c b/source3/auth/auth.c
index 8ea867fe8c..ec493b7c06 100644
--- a/source3/auth/auth.c
+++ b/source3/auth/auth.c
@@ -56,10 +56,11 @@ static BOOL check_domain_match(char *user, char *domain)
as it makes the calls itself when needed.
****************************************************************************/
-uint32 check_password(const auth_usersupplied_info *user_info, auth_serversupplied_info *server_info)
+NTSTATUS check_password(const auth_usersupplied_info *user_info,
+ auth_serversupplied_info *server_info)
{
- uint32 nt_status = NT_STATUS_LOGON_FAILURE;
+ NTSTATUS nt_status = NT_STATUS_LOGON_FAILURE;
BOOL done_pam = False;
DEBUG(3, ("check_password: Checking password for user %s with the new password interface\n", user_info->smb_username.str));
@@ -120,9 +121,9 @@ SMB hash
return True if the password is correct, False otherwise
****************************************************************************/
-uint32 pass_check_smb_with_chal(char *user, char *domain, uchar chal[8],
- uchar *lm_pwd, int lm_pwd_len,
- uchar *nt_pwd, int nt_pwd_len)
+NTSTATUS pass_check_smb_with_chal(char *user, char *domain, uchar chal[8],
+ uchar *lm_pwd, int lm_pwd_len,
+ uchar *nt_pwd, int nt_pwd_len)
{
auth_usersupplied_info user_info;
@@ -196,9 +197,9 @@ uint32 pass_check_smb_with_chal(char *user, char *domain, uchar chal[8],
return check_password(&user_info, &server_info);
}
-uint32 pass_check_smb(char *user, char *domain,
- uchar *lm_pwd, int lm_pwd_len,
- uchar *nt_pwd, int nt_pwd_len)
+NTSTATUS pass_check_smb(char *user, char *domain,
+ uchar *lm_pwd, int lm_pwd_len,
+ uchar *nt_pwd, int nt_pwd_len)
{
uchar chal[8];