summaryrefslogtreecommitdiff
path: root/source4/libcli/auth
diff options
context:
space:
mode:
authorAndrew Bartlett <abartlet@samba.org>2004-06-05 04:32:50 +0000
committerGerald (Jerry) Carter <jerry@samba.org>2007-10-10 12:56:30 -0500
commitc455b0a935dec8c9644634c496f2b95d7678df05 (patch)
treed3bfab9a28a71e4ca7c455ba4ff3635242dcd89f /source4/libcli/auth
parent35af8953507c9e6d5310ee07cbe63a735954ffb6 (diff)
downloadsamba-c455b0a935dec8c9644634c496f2b95d7678df05.tar.gz
samba-c455b0a935dec8c9644634c496f2b95d7678df05.tar.bz2
samba-c455b0a935dec8c9644634c496f2b95d7678df05.zip
r1028: More consistancy fixes, which should also fix the build.
Andrew Bartlett (This used to be commit 0d2ae66d3a82134d86084f63c05214e03dfcb48b)
Diffstat (limited to 'source4/libcli/auth')
-rw-r--r--source4/libcli/auth/ntlm_check.c20
1 files changed, 10 insertions, 10 deletions
diff --git a/source4/libcli/auth/ntlm_check.c b/source4/libcli/auth/ntlm_check.c
index d12a271420..eab150ad4d 100644
--- a/source4/libcli/auth/ntlm_check.c
+++ b/source4/libcli/auth/ntlm_check.c
@@ -169,8 +169,8 @@ NTSTATUS ntlm_password_check(TALLOC_CTX *mem_ctx,
const DATA_BLOB *challenge,
const DATA_BLOB *lm_response,
const DATA_BLOB *nt_response,
- const DATA_BLOB *lm_interactive_pwd,
- const DATA_BLOB *nt_interactive_pwd,
+ const DATA_BLOB *lm_interactive_password,
+ const DATA_BLOB *nt_interactive_password,
const char *username,
const char *client_username,
const char *client_domain,
@@ -184,14 +184,14 @@ NTSTATUS ntlm_password_check(TALLOC_CTX *mem_ctx,
username));
}
- if (nt_interactive_pwd && nt_interactive_pwd->length && nt_pw) {
- if (nt_interactive_pwd->length != 16) {
- DEBUG(3,("ntlm_password_check: Interactive logon: Invalid NT password length (%d) supplied for user %s\n", (int)nt_interactive_pwd->length,
+ if (nt_interactive_password && nt_interactive_password->length && nt_pw) {
+ if (nt_interactive_password->length != 16) {
+ DEBUG(3,("ntlm_password_check: Interactive logon: Invalid NT password length (%d) supplied for user %s\n", (int)nt_interactive_password->length,
username));
return NT_STATUS_WRONG_PASSWORD;
}
- if (memcmp(nt_interactive_pwd->data, nt_pw, 16) == 0) {
+ if (memcmp(nt_interactive_password->data, nt_pw, 16) == 0) {
if (user_sess_key) {
*user_sess_key = data_blob(NULL, 16);
SMBsesskeygen_ntv1(nt_pw, user_sess_key->data);
@@ -203,9 +203,9 @@ NTSTATUS ntlm_password_check(TALLOC_CTX *mem_ctx,
return NT_STATUS_WRONG_PASSWORD;
}
- } else if (lm_interactive_pwd && lm_interactive_pwd->length && lm_pw) {
- if (lm_interactive_pwd->length != 16) {
- DEBUG(3,("ntlm_password_check: Interactive logon: Invalid LANMAN password length (%d) supplied for user %s\n", (int)lm_interactive_pwd->length,
+ } else if (lm_interactive_password && lm_interactive_password->length && lm_pw) {
+ if (lm_interactive_password->length != 16) {
+ DEBUG(3,("ntlm_password_check: Interactive logon: Invalid LANMAN password length (%d) supplied for user %s\n", (int)lm_interactive_password->length,
username));
return NT_STATUS_WRONG_PASSWORD;
}
@@ -216,7 +216,7 @@ NTSTATUS ntlm_password_check(TALLOC_CTX *mem_ctx,
return NT_STATUS_WRONG_PASSWORD;
}
- if (memcmp(lm_interactive_pwd->data, lm_pw, 16) == 0) {
+ if (memcmp(lm_interactive_password->data, lm_pw, 16) == 0) {
return NT_STATUS_OK;
} else {
DEBUG(3,("ntlm_password_check: Interactive logon: LANMAN password check failed for user %s\n",