summaryrefslogtreecommitdiff
path: root/source3/auth
diff options
context:
space:
mode:
authorAndrew Bartlett <abartlet@samba.org>2001-09-14 10:38:40 +0000
committerAndrew Bartlett <abartlet@samba.org>2001-09-14 10:38:40 +0000
commitb7a0c132894e15712a55aaa92175df73fb8814a9 (patch)
tree9728e2cd5be7a04208978be4ccdc455f6c875009 /source3/auth
parentcbd99a13c510bd1cdfdd448ab1f1e94686180f50 (diff)
downloadsamba-b7a0c132894e15712a55aaa92175df73fb8814a9.tar.gz
samba-b7a0c132894e15712a55aaa92175df73fb8814a9.tar.bz2
samba-b7a0c132894e15712a55aaa92175df73fb8814a9.zip
Now that we always get back an NTSTATUS code actually pass it on to the
auth subsytem. Also kill off the (unneeded) wrapper fuction. Andrew Bartlett (This used to be commit 96f06b490ac5e9fd86debccf8d41675fa41f7726)
Diffstat (limited to 'source3/auth')
-rw-r--r--source3/auth/auth_server.c20
-rw-r--r--source3/auth/auth_util.c2
2 files changed, 5 insertions, 17 deletions
diff --git a/source3/auth/auth_server.c b/source3/auth/auth_server.c
index b279152f74..7ed4cf60ad 100644
--- a/source3/auth/auth_server.c
+++ b/source3/auth/auth_server.c
@@ -110,10 +110,11 @@ struct cli_state *server_cryptkey(void)
/****************************************************************************
- Validate a password with the password server.
+ Check for a valid username and password in security=server mode.
+ - Validate a password with the password server.
****************************************************************************/
-static NTSTATUS server_validate(const auth_usersupplied_info *user_info, auth_serversupplied_info *server_info)
+NTSTATUS check_server_security(const auth_usersupplied_info *user_info, auth_serversupplied_info *server_info)
{
struct cli_state *cli;
static unsigned char badpass[24];
@@ -212,7 +213,7 @@ use this machine as the password server.\n"));
user_info->domain.str)) {
DEBUG(1,("password server %s rejected the password\n", cli->desthost));
/* Make this cli_nt_error() when the conversion is in */
- nt_status = NT_STATUS_LOGON_FAILURE;
+ nt_status = cli_nt_error(cli);
} else {
nt_status = NT_STATUS_OK;
}
@@ -228,17 +229,4 @@ use this machine as the password server.\n"));
return(nt_status);
}
-/****************************************************************************
- Check for a valid username and password in security=server mode.
-****************************************************************************/
-
-NTSTATUS check_server_security(const auth_usersupplied_info *user_info, auth_serversupplied_info *server_info)
-{
-
- if(lp_security() != SEC_SERVER)
- return NT_STATUS_LOGON_FAILURE;
-
- return server_validate(user_info, server_info);
-}
-
diff --git a/source3/auth/auth_util.c b/source3/auth/auth_util.c
index 28f58eb8ae..1967c32b9a 100644
--- a/source3/auth/auth_util.c
+++ b/source3/auth/auth_util.c
@@ -98,7 +98,7 @@ static int smb_delete_user(char *unix_user)
}
/****************************************************************************
- Add and Delete UNIX users on demand, based on NT_STATUS codes.
+ Add and Delete UNIX users on demand, based on NTSTATUS codes.
****************************************************************************/
void smb_user_control(char *unix_user, NTSTATUS nt_status)