&state->user_session_key,
&state->lm_session_key);
if (!NT_STATUS_IS_OK(nt_status)) {
+ DEBUG(5,("%s: Checking NTLMSSP password for %s\\%s failed: %s\n",
+ __location__,
+ ntlmssp_state->domain, ntlmssp_state->user,
+ nt_errstr(nt_status)));
TALLOC_FREE(state);
return nt_status;
}
nt_status = auth_context->check_ntlm_password(auth_context,
mapped_user_info, &server_info);
+ if (!NT_STATUS_IS_OK(nt_status)) {
+ DEBUG(5,("Checking NTLMSSP password for %s\\%s failed: %s\n",
+ user_info->client.domain_name,
+ user_info->client.account_name,
+ nt_errstr(nt_status)));
+ }
+
username_was_mapped = mapped_user_info->was_mapped;
free_user_info(&mapped_user_info);
user_session_key, lm_session_key);
}
talloc_free(user_info);
+
+ if (!NT_STATUS_IS_OK(nt_status)) {
+ DEBUG(5,("%s: Checking NTLMSSP password for %s\\%s failed: %s\n",
+ __location__,
+ user_info->client.domain_name,
+ user_info->client.account_name,
+ nt_errstr(nt_status)));
+ }
+
NT_STATUS_NOT_OK_RETURN(nt_status);
talloc_steal(mem_ctx, user_session_key->data);
talloc_tos(),
&session_info);
if (!NT_STATUS_IS_OK(status)) {
+ DEBUG(1,("Failed to generate session_info "
+ "(user and group token) for session setup: %s\n",
+ nt_errstr(status)));
/* Kill the intermediate vuid */
data_blob_free(&out_blob);
invalidate_vuid(sconn, vuid);