summaryrefslogtreecommitdiffstats
path: root/source/rpc_parse/parse_creds.c
diff options
context:
space:
mode:
authorLuke Leighton <lkcl@samba.org>2000-01-03 00:41:53 +0000
committerLuke Leighton <lkcl@samba.org>2000-01-03 00:41:53 +0000
commit174299b8dd3072ee0b90ebb9a7fa92efcad69bb2 (patch)
treec18476c094cf054c97c363880827abc6b29e23ba /source/rpc_parse/parse_creds.c
parent9ef8fddaa6080e4942bc2268b89e61c3fb1ccd3d (diff)
downloadsamba-174299b8dd3072ee0b90ebb9a7fa92efcad69bb2.tar.gz
samba-174299b8dd3072ee0b90ebb9a7fa92efcad69bb2.tar.xz
samba-174299b8dd3072ee0b90ebb9a7fa92efcad69bb2.zip
removed dependency of smbd on the smb password database api.
the _only_ function smbd calls is pass_check(), and for some _weird_ reason, that is in the passdb/ directory. nasty debugging of an rpcclient incident. the "usr_creds" need to be told what they are dealing with (ptr_ntc = 1, for NT creds to be used). i forgot. wasted an hour.
Diffstat (limited to 'source/rpc_parse/parse_creds.c')
-rw-r--r--source/rpc_parse/parse_creds.c7
1 files changed, 5 insertions, 2 deletions
diff --git a/source/rpc_parse/parse_creds.c b/source/rpc_parse/parse_creds.c
index d9811d95ad6..399a3162e03 100644
--- a/source/rpc_parse/parse_creds.c
+++ b/source/rpc_parse/parse_creds.c
@@ -420,6 +420,7 @@ void copy_nt_creds(struct ntuser_creds *to,
{
if (from == NULL)
{
+ DEBUG(10,("copy_nt_creds: null creds\n"));
to->domain[0] = 0;
to->user_name[0] = 0;
pwd_set_nullpwd(&to->pwd);
@@ -431,6 +432,8 @@ void copy_nt_creds(struct ntuser_creds *to,
safe_strcpy(to->user_name, from->user_name, sizeof(from->user_name)-1);
memcpy(&to->pwd, &from->pwd, sizeof(from->pwd));
to->ntlmssp_flags = from->ntlmssp_flags;
+ DEBUG(10,("copy_nt_creds: user %s domain %s nopw %s\n",
+ to->user_name, to->domain, BOOLSTR(pwd_is_nullpwd(&to->pwd))));
};
void copy_user_creds(struct user_creds *to,
@@ -462,11 +465,11 @@ void copy_user_creds(struct user_creds *to,
{
copy_unix_creds(&to->uxc, &from->uxc);
}
- if (to->ptr_ntc != 0)
+ if (to->ptr_nts != 0)
{
copy_nt_sec_creds(&to->nts, &from->nts);
}
- if (to->ptr_uxc != 0)
+ if (to->ptr_uxs != 0)
{
copy_unix_sec_creds(&to->uxs, &from->uxs);
}