diff options
author | Luke Leighton <lkcl@samba.org> | 2000-03-18 09:34:43 +0000 |
---|---|---|
committer | Luke Leighton <lkcl@samba.org> | 2000-03-18 09:34:43 +0000 |
commit | 6037650ef5af9304b3826e003b909c558af824ae (patch) | |
tree | f8d38a77dbbd0a79c63adba4953f09b8bcdeb30f | |
parent | a4016edc7faee5a0c789b7440dda64e6aa91732c (diff) | |
download | samba-6037650ef5af9304b3826e003b909c558af824ae.tar.gz samba-6037650ef5af9304b3826e003b909c558af824ae.tar.xz samba-6037650ef5af9304b3826e003b909c558af824ae.zip |
need to return access denied on credential failure.
-rw-r--r-- | source/netlogond/srv_netlogon_nt.c | 22 |
1 files changed, 11 insertions, 11 deletions
diff --git a/source/netlogond/srv_netlogon_nt.c b/source/netlogond/srv_netlogon_nt.c index 35dbcbae85f..110b4ed03b9 100644 --- a/source/netlogond/srv_netlogon_nt.c +++ b/source/netlogond/srv_netlogon_nt.c @@ -432,7 +432,7 @@ uint32 _net_req_chal(const UNISTR2 * uni_logon_server, if (!cred_store(remote_pid, global_sam_name, trust_name, &dc)) { - return NT_STATUS_INVALID_HANDLE; + return NT_STATUS_ACCESS_DENIED; } return NT_STATUS_NOPROBLEMO; @@ -595,7 +595,7 @@ uint32 _net_auth(const DOM_LOG_INFO * clnt_id, if (!cred_get(remote_pid, global_sam_name, trust_name, &dc)) { - return NT_STATUS_INVALID_HANDLE; + return NT_STATUS_ACCESS_DENIED; } /* check that the client credentials are valid */ @@ -617,7 +617,7 @@ uint32 _net_auth(const DOM_LOG_INFO * clnt_id, if (!cred_store(remote_pid, global_sam_name, trust_name, &dc)) { - return NT_STATUS_INVALID_HANDLE; + return NT_STATUS_ACCESS_DENIED; } return NT_STATUS_NOPROBLEMO; @@ -645,7 +645,7 @@ uint32 _net_auth_2(const DOM_LOG_INFO * clnt_id, if (!cred_get(remote_pid, global_sam_name, trust_name, &dc)) { - return NT_STATUS_INVALID_HANDLE; + return NT_STATUS_ACCESS_DENIED; } /* check that the client credentials are valid */ @@ -667,7 +667,7 @@ uint32 _net_auth_2(const DOM_LOG_INFO * clnt_id, if (!cred_store(remote_pid, global_sam_name, trust_name, &dc)) { - return NT_STATUS_INVALID_HANDLE; + return NT_STATUS_ACCESS_DENIED; } /* mask out unsupported bits */ @@ -720,7 +720,7 @@ uint32 _net_srv_pwset(const DOM_CLNT_INFO * clnt_id, if (!cred_get(remote_pid, global_sam_name, trust_name, &dc)) { - return NT_STATUS_INVALID_HANDLE; + return NT_STATUS_ACCESS_DENIED; } /* checks and updates credentials. creates reply credentials */ @@ -781,7 +781,7 @@ uint32 _net_srv_pwset(const DOM_CLNT_INFO * clnt_id, if (!cred_store(remote_pid, global_sam_name, trust_name, &dc)) { - return NT_STATUS_INVALID_HANDLE; + return NT_STATUS_ACCESS_DENIED; } return NT_STATUS_NOPROBLEMO; @@ -840,7 +840,7 @@ uint32 _net_sam_logon(const DOM_SAM_INFO * sam_id, if (!cred_get(remote_pid, global_sam_name, trust_name, &dc)) { - return NT_STATUS_INVALID_HANDLE; + return NT_STATUS_ACCESS_DENIED; } /* checks and updates credentials. creates reply credentials */ @@ -1099,7 +1099,7 @@ usr_sess_key, lm_pw8); if (!cred_store(remote_pid, global_sam_name, trust_name, &dc)) { - return NT_STATUS_INVALID_HANDLE; + return NT_STATUS_ACCESS_DENIED; } return NT_STATUS_NOPROBLEMO; @@ -1121,7 +1121,7 @@ uint32 _net_sam_logoff(const DOM_SAM_INFO * sam_id, if (!cred_get(remote_pid, global_sam_name, trust_name, &dc)) { - return NT_STATUS_INVALID_HANDLE; + return NT_STATUS_ACCESS_DENIED; } /* checks and updates credentials. creates reply credentials */ @@ -1135,7 +1135,7 @@ uint32 _net_sam_logoff(const DOM_SAM_INFO * sam_id, if (!cred_store(remote_pid, global_sam_name, trust_name, &dc)) { - return NT_STATUS_INVALID_HANDLE; + return NT_STATUS_ACCESS_DENIED; } return NT_STATUS_NOPROBLEMO; |