diff options
author | Luke Leighton <lkcl@samba.org> | 2000-04-09 06:50:03 +0000 |
---|---|---|
committer | Luke Leighton <lkcl@samba.org> | 2000-04-09 06:50:03 +0000 |
commit | 38f4a23eee4af49d119591435d5915010b92b52e (patch) | |
tree | 94a052d2b33ec4e499be811947d705b6ab5ea18a | |
parent | 7224aa35fb61ed968907a12ed98e9d94a77eb5ce (diff) | |
download | samba-38f4a23eee4af49d119591435d5915010b92b52e.tar.gz samba-38f4a23eee4af49d119591435d5915010b92b52e.tar.xz samba-38f4a23eee4af49d119591435d5915010b92b52e.zip |
it's a little unclear where the line is between netlogond processing
incoming samlogon requests and passing requests on up (using client-side
code). added some debug messages in that say BEGIN here and END here.
by the way, i really, really hope i don't get this wrong, it's going to
cause absolute chaos if netlogond ends up calling itself.
-rw-r--r-- | source/netlogond/srv_netlogon_nt.c | 16 |
1 files changed, 11 insertions, 5 deletions
diff --git a/source/netlogond/srv_netlogon_nt.c b/source/netlogond/srv_netlogon_nt.c index 3c050b23d1c..2cef530523a 100644 --- a/source/netlogond/srv_netlogon_nt.c +++ b/source/netlogond/srv_netlogon_nt.c @@ -240,10 +240,15 @@ static uint32 remote_interactive(const NET_ID_INFO_1 * id1, unistr2_to_ascii(user, uni_samusr, sizeof(user) - 1); unistr2_to_ascii(domain, uni_samnam, sizeof(domain) - 1); - DEBUG(5, ("remote_interactive: user:%s domain:%s\n", user, domain)); + DEBUG(5, ("BEGIN remote_interactive: %s\\%s\n", domain, user)); + + status = check_domain_security(user, domain, + NULL, lm_pwd, 16, + nt_pwd, 16, usr); + + DEBUG(5, ("END remote_interactive: %x\n", status)); status = check_domain_security(user, domain, - NULL, lm_pwd, 16, nt_pwd, 16, usr); if (status != 0x0) { return status; @@ -374,9 +379,7 @@ static uint32 remote_network(const NET_ID_INFO_2 * id2, unistr2_to_ascii(user, uni_samusr, sizeof(user) - 1); unistr2_to_ascii(domain, uni_samnam, sizeof(domain) - 1); - DEBUG(5, - ("remote_network: lm_len:%d nt_len:%d user:%s domain:%s\n", - lm_pw_len, nt_pw_len, user, domain)); + DEBUG(5, ("BEGIN remote_network: %s\\%s\n", domain, user)); status = check_domain_security(user, domain, id2->lm_chal, @@ -384,6 +387,9 @@ static uint32 remote_network(const NET_ID_INFO_2 * id2, buffer, lm_pw_len, (const uchar *)id2->nt_chal_resp. buffer, nt_pw_len, usr); + + DEBUG(5, ("END remote_network: %x\n", status)); + if (status != 0x0) { return status; |