summaryrefslogtreecommitdiff
path: root/source4/auth/auth_compat.c
diff options
context:
space:
mode:
Diffstat (limited to 'source4/auth/auth_compat.c')
-rw-r--r--source4/auth/auth_compat.c17
1 files changed, 8 insertions, 9 deletions
diff --git a/source4/auth/auth_compat.c b/source4/auth/auth_compat.c
index 49cd2e8468..d8c1ad78f0 100644
--- a/source4/auth/auth_compat.c
+++ b/source4/auth/auth_compat.c
@@ -95,7 +95,6 @@ BOOL password_ok(struct server_context *smb, const char *smb_name, DATA_BLOB pas
DATA_BLOB null_password = data_blob(NULL, 0);
BOOL encrypted = (smb->negotiate.encrypted_passwords && password_blob.length == 24);
- NTSTATUS status;
if (encrypted) {
/*
@@ -103,20 +102,20 @@ BOOL password_ok(struct server_context *smb, const char *smb_name, DATA_BLOB pas
* but fall-through as required.
* NTLMv2 makes no sense here.
*/
- status = pass_check_smb(smb, smb_name, lp_workgroup(), null_password,
- password_blob, null_password, encrypted);
- if (NT_STATUS_IS_OK(status)) {
+ if (NT_STATUS_IS_OK(pass_check_smb(smb, smb_name, lp_workgroup(), null_password, password_blob, null_password, encrypted))) {
return True;
}
- status = pass_check_smb(smb, smb_name, lp_workgroup(), password_blob,
- null_password, null_password, encrypted);
+ if (NT_STATUS_IS_OK(pass_check_smb(smb, smb_name, lp_workgroup(), password_blob, null_password, null_password, encrypted))) {
+ return True;
+ }
} else {
- status = pass_check_smb(smb, smb_name, lp_workgroup(), null_password,
- null_password, password_blob, encrypted);
+ if (NT_STATUS_IS_OK(pass_check_smb(smb, smb_name, lp_workgroup(), null_password, null_password, password_blob, encrypted))) {
+ return True;
+ }
}
- return NT_STATUS_IS_OK(status);
+ return False;
}