From 654273856863d861c8be7b46c39e68a81ea3807a Mon Sep 17 00:00:00 2001 From: Jeremy Allison Date: Sat, 1 Jun 2002 00:10:08 +0000 Subject: More cleanup work preparing for SMB signing. Jeremy. (This used to be commit 3c05f7c06fc8c45307ea75128b160a5945fc5197) --- source3/auth/auth_server.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) (limited to 'source3/auth') diff --git a/source3/auth/auth_server.c b/source3/auth/auth_server.c index b31bf7d996..0e650aa6e3 100644 --- a/source3/auth/auth_server.c +++ b/source3/auth/auth_server.c @@ -91,7 +91,7 @@ static struct cli_state *server_cryptkey(TALLOC_CTX *mem_ctx) } if (cli->protocol < PROTOCOL_LANMAN2 || - !(cli->sec_mode & 1)) { + !(cli->sec_mode & NEGOTIATE_SECURITY_USER_LEVEL)) { DEBUG(1,("%s isn't in user level security mode\n",desthost)); cli_shutdown(cli); return NULL; @@ -145,7 +145,7 @@ static DATA_BLOB auth_get_challenge_server(const struct auth_context *auth_conte if (cli) { DEBUG(3,("using password server validation\n")); - if ((cli->sec_mode & 2) == 0) { + if ((cli->sec_mode & NEGOTIATE_SECURITY_CHALLENGE_RESPONSE) == 0) { /* We can't work with unencrypted password servers unless 'encrypt passwords = no' */ DEBUG(5,("make_auth_info_server: Server is unencrypted, no challenge available..\n")); @@ -216,7 +216,7 @@ static NTSTATUS check_smbserver_security(const struct auth_context *auth_context return NT_STATUS_LOGON_FAILURE; } - if ((cli->sec_mode & 2) == 0) { + if ((cli->sec_mode & NEGOTIATE_SECURITY_CHALLENGE_RESPONSE) == 0) { if (user_info->encrypted) { DEBUG(1,("password server %s is plaintext, but we are encrypted. This just can't work :-(\n", cli->desthost)); return NT_STATUS_LOGON_FAILURE; -- cgit