r8799: disabling schannel on samr and lsa until I figure out
authorGerald Carter <jerry@samba.org>
Wed, 27 Jul 2005 17:30:23 +0000 (17:30 +0000)
committerGerald (Jerry) Carter <jerry@samba.org>
Wed, 10 Oct 2007 16:00:17 +0000 (11:00 -0500)
the latest MS changes in 2003 sp1 and 2004 sp4 sr1
(This used to be commit 7588c32baa50994bdc6e351d79da3edff1fdc876)

source3/nsswitch/winbindd_cm.c

index d4022a8455539dde987aabaea386247c4d9a6e2b..e6eeba63d584347e38d233309317fcff5f11d335 100644 (file)
 #undef DBGC_CLASS
 #define DBGC_CLASS DBGC_WINBIND
 
-/* Global list of connections. Initially a DLIST but can become a hash
-   table or whatever later. */
+
+/****************************************************************** 
+   Disabling schannl on the LSA pipe for now since 
+   both Win2K-SP4 SR1 & Win2K3-SP1 fail the open_policy() 
+   call (return codes 0xc0020042 and 0xc0020041 respectively).
+   We really need to fix this soon.  Had to disable on the 
+   SAMR pipe as well for now.   --jerry
+******************************************************************/
+
+#define DISABLE_SCHANNEL_WIN2K3_SP1    1
+
 
 /* Choose between anonymous or authenticated connections.  We need to use
    an authenticated connection if DCs have the RestrictAnonymous registry
@@ -984,6 +993,7 @@ NTSTATUS cm_connect_sam(struct winbindd_domain *domain, TALLOC_CTX *mem_ctx,
        conn = &domain->conn;
 
        if (conn->samr_pipe == NULL) {
+#ifdef DISABLE_SCHANNEL_WIN2K3_SP1
                unsigned char *session_key;
 
                if (cm_get_schannel_key(domain, mem_ctx, &session_key))
@@ -992,6 +1002,7 @@ NTSTATUS cm_connect_sam(struct winbindd_domain *domain, TALLOC_CTX *mem_ctx,
                                                                session_key,
                                                                domain->name);
                else
+#endif /* DISABLE_SCHANNEL_WIN2K3_SP1 */
                        conn->samr_pipe = cli_rpc_open_noauth(conn->cli,
                                                              PI_SAMR);
 
@@ -1038,12 +1049,7 @@ NTSTATUS cm_connect_lsa(struct winbindd_domain *domain, TALLOC_CTX *mem_ctx,
        conn = &domain->conn;
 
        if (conn->lsa_pipe == NULL) {
-#if 0
-               /* disabling schannl on the LSA pipe for now since 
-                  both Win2K-SP4 SR1 & Win2K3-SP1 fail the open_policy() 
-                  call (return codes 0xc0020042 and 0xc0020041 respectively).
-                  We really need to fix this soon.  --jerry  */
-
+#ifdef DISABLE_SCHANNEL_WIN2K3_SP1
                unsigned char *session_key;
 
                if (cm_get_schannel_key(domain, mem_ctx, &session_key))
@@ -1052,7 +1058,7 @@ NTSTATUS cm_connect_lsa(struct winbindd_domain *domain, TALLOC_CTX *mem_ctx,
                                                               session_key,
                                                               domain->name);
                else
-#endif
+#endif /* DISABLE_SCHANNEL_WIN2K3_SP1 */
                        conn->lsa_pipe = cli_rpc_open_noauth(conn->cli,
                                                             PI_LSARPC);