diff options
author | Luke Leighton <lkcl@samba.org> | 2000-01-03 00:41:53 +0000 |
---|---|---|
committer | Luke Leighton <lkcl@samba.org> | 2000-01-03 00:41:53 +0000 |
commit | 174299b8dd3072ee0b90ebb9a7fa92efcad69bb2 (patch) | |
tree | c18476c094cf054c97c363880827abc6b29e23ba /source/rpc_parse/parse_creds.c | |
parent | 9ef8fddaa6080e4942bc2268b89e61c3fb1ccd3d (diff) | |
download | samba-174299b8dd3072ee0b90ebb9a7fa92efcad69bb2.tar.gz samba-174299b8dd3072ee0b90ebb9a7fa92efcad69bb2.tar.xz samba-174299b8dd3072ee0b90ebb9a7fa92efcad69bb2.zip |
removed dependency of smbd on the smb password database api.
the _only_ function smbd calls is pass_check(), and for some
_weird_ reason, that is in the passdb/ directory.
nasty debugging of an rpcclient incident. the "usr_creds"
need to be told what they are dealing with (ptr_ntc = 1, for
NT creds to be used). i forgot. wasted an hour.
Diffstat (limited to 'source/rpc_parse/parse_creds.c')
-rw-r--r-- | source/rpc_parse/parse_creds.c | 7 |
1 files changed, 5 insertions, 2 deletions
diff --git a/source/rpc_parse/parse_creds.c b/source/rpc_parse/parse_creds.c index d9811d95ad6..399a3162e03 100644 --- a/source/rpc_parse/parse_creds.c +++ b/source/rpc_parse/parse_creds.c @@ -420,6 +420,7 @@ void copy_nt_creds(struct ntuser_creds *to, { if (from == NULL) { + DEBUG(10,("copy_nt_creds: null creds\n")); to->domain[0] = 0; to->user_name[0] = 0; pwd_set_nullpwd(&to->pwd); @@ -431,6 +432,8 @@ void copy_nt_creds(struct ntuser_creds *to, safe_strcpy(to->user_name, from->user_name, sizeof(from->user_name)-1); memcpy(&to->pwd, &from->pwd, sizeof(from->pwd)); to->ntlmssp_flags = from->ntlmssp_flags; + DEBUG(10,("copy_nt_creds: user %s domain %s nopw %s\n", + to->user_name, to->domain, BOOLSTR(pwd_is_nullpwd(&to->pwd)))); }; void copy_user_creds(struct user_creds *to, @@ -462,11 +465,11 @@ void copy_user_creds(struct user_creds *to, { copy_unix_creds(&to->uxc, &from->uxc); } - if (to->ptr_ntc != 0) + if (to->ptr_nts != 0) { copy_nt_sec_creds(&to->nts, &from->nts); } - if (to->ptr_uxc != 0) + if (to->ptr_uxs != 0) { copy_unix_sec_creds(&to->uxs, &from->uxs); } |