Changeset 596 for trunk/server/source3/auth
- Timestamp:
- Jul 2, 2011, 3:35:33 PM (14 years ago)
- Location:
- trunk/server/source3/auth
- Files:
-
- 4 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/server/source3/auth/auth_domain.c
r414 r596 311 311 user_info->wksta_name, /* workstation name */ 312 312 chal, /* 8 byte challenge. */ 313 3, /* validation level */ 313 314 user_info->lm_resp, /* lanman 24 byte response */ 314 315 user_info->nt_resp, /* nt 24 byte response */ -
trunk/server/source3/auth/auth_netlogond.c
r414 r596 86 86 user_info->wksta_name, /* workstation name */ 87 87 (uchar *)auth_context->challenge.data, /* 8 byte challenge. */ 88 3, /* validation level */ 88 89 user_info->lm_resp, /* lanman 24 byte response */ 89 90 user_info->nt_resp, /* nt 24 byte response */ -
trunk/server/source3/auth/auth_ntlmssp.c
r414 r596 127 127 auth_ntlmssp_state->server_info->nss_token |= username_was_mapped; 128 128 129 nt_status = create_local_token(auth_ntlmssp_state->server_info); 130 131 if (!NT_STATUS_IS_OK(nt_status)) { 132 DEBUG(10, ("create_local_token failed: %s\n", 133 nt_errstr(nt_status))); 134 return nt_status; 129 if (auth_ntlmssp_state->server_info->ptok == NULL) { 130 nt_status = create_local_token(auth_ntlmssp_state->server_info); 131 if (!NT_STATUS_IS_OK(nt_status)) { 132 DEBUG(10, ("create_local_token failed: %s\n", 133 nt_errstr(nt_status))); 134 return nt_status; 135 } 135 136 } 136 137 -
trunk/server/source3/auth/auth_util.c
r480 r596 576 576 } 577 577 578 if ( !(pwd = getpwnam_alloc(result, username)) ) {578 if ( !(pwd = Get_Pwnam_alloc(result, username)) ) { 579 579 DEBUG(1, ("User %s in passdb, but getpwnam() fails!\n", 580 580 pdb_get_username(sampass))); … … 904 904 * username and will return the unix_pw info for a guest 905 905 * user. Use it if it's there, else lookup the *uid details 906 * using getpwnam_alloc(). See bug #6291 for details. JRA.906 * using Get_Pwnam_alloc(). See bug #6291 for details. JRA. 907 907 */ 908 908 909 909 /* We must always assign the *uid. */ 910 910 if (sam_acct->unix_pw == NULL) { 911 struct passwd *pwd = getpwnam_alloc(sam_acct, *found_username );911 struct passwd *pwd = Get_Pwnam_alloc(sam_acct, *found_username ); 912 912 if (!pwd) { 913 DEBUG(10, (" getpwnam_alloc failed for %s\n",913 DEBUG(10, ("Get_Pwnam_alloc failed for %s\n", 914 914 *found_username)); 915 915 result = NT_STATUS_NO_SUCH_USER; … … 1327 1327 NTSTATUS status; 1328 1328 1329 pwd = getpwnam_alloc(talloc_tos(), username);1329 pwd = Get_Pwnam_alloc(talloc_tos(), username); 1330 1330 if (pwd == NULL) { 1331 1331 return NT_STATUS_NO_SUCH_USER; … … 2024 2024 if (!pdb_set_pass_last_set_time( 2025 2025 sam_account, 2026 nt_time_to_unix(info->pass_last_set_time),2026 info->pass_last_set_time, 2027 2027 PDB_CHANGED)) { 2028 2028 TALLOC_FREE(result); … … 2032 2032 if (!pdb_set_pass_can_change_time( 2033 2033 sam_account, 2034 nt_time_to_unix(info->pass_can_change_time),2034 info->pass_can_change_time, 2035 2035 PDB_CHANGED)) { 2036 2036 TALLOC_FREE(result); … … 2040 2040 if (!pdb_set_pass_must_change_time( 2041 2041 sam_account, 2042 nt_time_to_unix(info->pass_must_change_time),2042 info->pass_must_change_time, 2043 2043 PDB_CHANGED)) { 2044 2044 TALLOC_FREE(result);
Note:
See TracChangeset
for help on using the changeset viewer.