summaryrefslogtreecommitdiffstats
path: root/source/smbd/auth_smbpasswd.c
diff options
context:
space:
mode:
authorAndrew Tridgell <tridge@samba.org>2001-08-27 19:46:22 +0000
committerAndrew Tridgell <tridge@samba.org>2001-08-27 19:46:22 +0000
commit1d36250e338ae0ff9fbbf86019809205dd97d05e (patch)
treee9698f0341f3d5189f45dfd8773b38e57b4da599 /source/smbd/auth_smbpasswd.c
parent8021669b167053b5500f035c9c50d1327d73c232 (diff)
downloadsamba-1d36250e338ae0ff9fbbf86019809205dd97d05e.tar.gz
samba-1d36250e338ae0ff9fbbf86019809205dd97d05e.tar.xz
samba-1d36250e338ae0ff9fbbf86019809205dd97d05e.zip
converted another bunch of stuff to NTSTATUS
Diffstat (limited to 'source/smbd/auth_smbpasswd.c')
-rw-r--r--source/smbd/auth_smbpasswd.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/source/smbd/auth_smbpasswd.c b/source/smbd/auth_smbpasswd.c
index 1a5d02e4a44..54847581679 100644
--- a/source/smbd/auth_smbpasswd.c
+++ b/source/smbd/auth_smbpasswd.c
@@ -127,7 +127,7 @@ uint32 smb_password_ok(SAM_ACCOUNT *sampass, const auth_usersupplied_info *user_
if (lp_null_passwords())
{
DEBUG(3,("Account for user '%s' has no password and null passwords are allowed.\n", user_info->smb_username.str));
- return(NT_STATUS_NOPROBLEMO);
+ return(NT_STATUS_OK);
}
else
{
@@ -156,7 +156,7 @@ uint32 smb_password_ok(SAM_ACCOUNT *sampass, const auth_usersupplied_info *user_
user_info->requested_domain.str,
(char *)server_info->session_key))
{
- return NT_STATUS_NOPROBLEMO;
+ return NT_STATUS_OK;
}
DEBUG(4,("smb_password_ok: NTLMv2 password check failed\n"));
@@ -169,7 +169,7 @@ uint32 smb_password_ok(SAM_ACCOUNT *sampass, const auth_usersupplied_info *user_
nt_pw, user_info->chal,
server_info->session_key)) {
DEBUG(4,("smb_password_ok: NT MD4 password check succeeded\n"));
- return NT_STATUS_NOPROBLEMO;
+ return NT_STATUS_OK;
} else {
DEBUG(4,("smb_password_ok: NT MD4 password check failed\n"));
return NT_STATUS_WRONG_PASSWORD;
@@ -185,7 +185,7 @@ uint32 smb_password_ok(SAM_ACCOUNT *sampass, const auth_usersupplied_info *user_
lm_pw, user_info->chal,
server_info->session_key)) {
DEBUG(4,("smb_password_ok: LM password check succeeded\n"));
- return NT_STATUS_NOPROBLEMO;
+ return NT_STATUS_OK;
} else {
DEBUG(4,("smb_password_ok: LM password check failed\n"));
return NT_STATUS_WRONG_PASSWORD;