summaryrefslogtreecommitdiffstats
path: root/source/auth
diff options
context:
space:
mode:
authorVolker Lendecke <vlendec@samba.org>2003-05-11 13:20:27 +0000
committerVolker Lendecke <vlendec@samba.org>2003-05-11 13:20:27 +0000
commite4e44cf3b18231ec5d7326fb42edec741caa147b (patch)
tree050b3da08fe49cd435d837502381bedf1957e726 /source/auth
parent8de04fcf680a9bc5054965577eb500e0541ffe66 (diff)
downloadsamba-e4e44cf3b18231ec5d7326fb42edec741caa147b.tar.gz
samba-e4e44cf3b18231ec5d7326fb42edec741caa147b.tar.xz
samba-e4e44cf3b18231ec5d7326fb42edec741caa147b.zip
When we have a NT4SP0 PDC trust us, we first have to check the
password. On NT4, NT_STATUS_NOLOGON_INTERDOMAIN_TRUST_ACCOUNT means the password was correct. So the PDC believed that he had his trust account correctly added. Later the auth2 naturally failed. BTW, setting up an interdom trust account is not what I would call well documented and easy to handle... Working on that now :-) Volker
Diffstat (limited to 'source/auth')
-rw-r--r--source/auth/auth_sam.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/source/auth/auth_sam.c b/source/auth/auth_sam.c
index 0c2ffaae885..634afc633db 100644
--- a/source/auth/auth_sam.c
+++ b/source/auth/auth_sam.c
@@ -439,14 +439,14 @@ static NTSTATUS check_sam_security(const struct auth_context *auth_context,
return NT_STATUS_NO_SUCH_USER;
}
- nt_status = sam_account_ok(mem_ctx, sampass, user_info);
+ nt_status = sam_password_ok(auth_context, mem_ctx, sampass, user_info, user_sess_key);
if (!NT_STATUS_IS_OK(nt_status)) {
pdb_free_sam(&sampass);
return nt_status;
}
- nt_status = sam_password_ok(auth_context, mem_ctx, sampass, user_info, user_sess_key);
+ nt_status = sam_account_ok(mem_ctx, sampass, user_info);
if (!NT_STATUS_IS_OK(nt_status)) {
pdb_free_sam(&sampass);