summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorLuke Leighton <lkcl@samba.org>2000-04-09 06:50:03 +0000
committerLuke Leighton <lkcl@samba.org>2000-04-09 06:50:03 +0000
commit38f4a23eee4af49d119591435d5915010b92b52e (patch)
tree94a052d2b33ec4e499be811947d705b6ab5ea18a
parent7224aa35fb61ed968907a12ed98e9d94a77eb5ce (diff)
downloadsamba-38f4a23eee4af49d119591435d5915010b92b52e.tar.gz
samba-38f4a23eee4af49d119591435d5915010b92b52e.tar.xz
samba-38f4a23eee4af49d119591435d5915010b92b52e.zip
it's a little unclear where the line is between netlogond processing
incoming samlogon requests and passing requests on up (using client-side code). added some debug messages in that say BEGIN here and END here. by the way, i really, really hope i don't get this wrong, it's going to cause absolute chaos if netlogond ends up calling itself.
-rw-r--r--source/netlogond/srv_netlogon_nt.c16
1 files changed, 11 insertions, 5 deletions
diff --git a/source/netlogond/srv_netlogon_nt.c b/source/netlogond/srv_netlogon_nt.c
index 3c050b23d1c..2cef530523a 100644
--- a/source/netlogond/srv_netlogon_nt.c
+++ b/source/netlogond/srv_netlogon_nt.c
@@ -240,10 +240,15 @@ static uint32 remote_interactive(const NET_ID_INFO_1 * id1,
unistr2_to_ascii(user, uni_samusr, sizeof(user) - 1);
unistr2_to_ascii(domain, uni_samnam, sizeof(domain) - 1);
- DEBUG(5, ("remote_interactive: user:%s domain:%s\n", user, domain));
+ DEBUG(5, ("BEGIN remote_interactive: %s\\%s\n", domain, user));
+
+ status = check_domain_security(user, domain,
+ NULL, lm_pwd, 16,
+ nt_pwd, 16, usr);
+
+ DEBUG(5, ("END remote_interactive: %x\n", status));
status = check_domain_security(user, domain,
- NULL, lm_pwd, 16, nt_pwd, 16, usr);
if (status != 0x0)
{
return status;
@@ -374,9 +379,7 @@ static uint32 remote_network(const NET_ID_INFO_2 * id2,
unistr2_to_ascii(user, uni_samusr, sizeof(user) - 1);
unistr2_to_ascii(domain, uni_samnam, sizeof(domain) - 1);
- DEBUG(5,
- ("remote_network: lm_len:%d nt_len:%d user:%s domain:%s\n",
- lm_pw_len, nt_pw_len, user, domain));
+ DEBUG(5, ("BEGIN remote_network: %s\\%s\n", domain, user));
status = check_domain_security(user, domain,
id2->lm_chal,
@@ -384,6 +387,9 @@ static uint32 remote_network(const NET_ID_INFO_2 * id2,
buffer, lm_pw_len,
(const uchar *)id2->nt_chal_resp.
buffer, nt_pw_len, usr);
+
+ DEBUG(5, ("END remote_network: %x\n", status));
+
if (status != 0x0)
{
return status;