summaryrefslogtreecommitdiff
path: root/source3/auth
diff options
context:
space:
mode:
authorStefan Metzmacher <metze@samba.org>2011-07-22 16:15:56 +0200
committerStefan Metzmacher <metze@samba.org>2011-07-22 17:06:09 +0200
commitab9d99cece8e450309f4d1c604ce99cfce062fc9 (patch)
tree4ef9b5a1cb8464cdf4854b5a72c086bc7a8c51d8 /source3/auth
parent823ce6f50f054aa2c9e769357fa30538e2cc9d0e (diff)
downloadsamba-ab9d99cece8e450309f4d1c604ce99cfce062fc9.tar.gz
samba-ab9d99cece8e450309f4d1c604ce99cfce062fc9.tar.bz2
samba-ab9d99cece8e450309f4d1c604ce99cfce062fc9.zip
s3:auth_server: make use of cli_state_remote_name()
metze
Diffstat (limited to 'source3/auth')
-rw-r--r--source3/auth/auth_server.c13
1 files changed, 7 insertions, 6 deletions
diff --git a/source3/auth/auth_server.c b/source3/auth/auth_server.c
index 1b7993bb9c..3d775c2fc9 100644
--- a/source3/auth/auth_server.c
+++ b/source3/auth/auth_server.c
@@ -297,12 +297,12 @@ static NTSTATUS check_smbserver_security(const struct auth_context *auth_context
if ((cli->sec_mode & NEGOTIATE_SECURITY_CHALLENGE_RESPONSE) == 0) {
if (user_info->password_state != AUTH_PASSWORD_PLAIN) {
- DEBUG(1,("password server %s is plaintext, but we are encrypted. This just can't work :-(\n", cli->desthost));
+ DEBUG(1,("password server %s is plaintext, but we are encrypted. This just can't work :-(\n", cli_state_remote_name(cli)));
return NT_STATUS_LOGON_FAILURE;
}
} else {
if (memcmp(cli->secblob.data, auth_context->challenge.data, 8) != 0) {
- DEBUG(1,("the challenge that the password server (%s) supplied us is not the one we gave our client. This just can't work :-(\n", cli->desthost));
+ DEBUG(1,("the challenge that the password server (%s) supplied us is not the one we gave our client. This just can't work :-(\n", cli_state_remote_name(cli)));
return NT_STATUS_LOGON_FAILURE;
}
}
@@ -357,7 +357,7 @@ static NTSTATUS check_smbserver_security(const struct auth_context *auth_context
if (!cli->is_guestlogin) {
DEBUG(0,("server_validate: password server %s allows users as non-guest \
-with a bad password.\n", cli->desthost));
+with a bad password.\n", cli_state_remote_name(cli)));
DEBUG(0,("server_validate: This is broken (and insecure) behaviour. Please do not \
use this machine as the password server.\n"));
cli_ulogoff(cli);
@@ -379,7 +379,7 @@ use this machine as the password server.\n"));
if(bad_password_server) {
DEBUG(0,("server_validate: [1] password server %s allows users as non-guest \
-with a bad password.\n", cli->desthost));
+with a bad password.\n", cli_state_remote_name(cli)));
DEBUG(0,("server_validate: [1] This is broken (and insecure) behaviour. Please do not \
use this machine as the password server.\n"));
return NT_STATUS_LOGON_FAILURE;
@@ -418,12 +418,13 @@ use this machine as the password server.\n"));
if (!NT_STATUS_IS_OK(nt_status)) {
DEBUG(1,("password server %s rejected the password: %s\n",
- cli->desthost, nt_errstr(nt_status)));
+ cli_state_remote_name(cli), nt_errstr(nt_status)));
}
/* if logged in as guest then reject */
if (cli->is_guestlogin) {
- DEBUG(1,("password server %s gave us guest only\n", cli->desthost));
+ DEBUG(1,("password server %s gave us guest only\n",
+ cli_state_remote_name(cli)));
nt_status = NT_STATUS_LOGON_FAILURE;
}