struct cli_state cli;
uint32 smb_uid_low;
BOOL connected_ok = False;
- uint32 nt_status;
+ uint32 status;
/*
* Check that the requested domain is not our own machine name.
ZERO_STRUCT(info3);
- if (!cli_nt_login_network(&cli, user_info, smb_uid_low, &ctr, &info3)) {
- nt_status = cli_nt_error(&cli);
- DEBUG(0,("domain_client_validate: unable to validate password for user %s in domain \
-%s to Domain controller %s. Error was %s.\n", user_info->smb_username.str, user_info->domain.str, remote_machine, cli_errstr(&cli)));
+ if ((status = cli_nt_login_network(&cli, user_info, smb_uid_low,
+ &ctr, &info3))
+ != NT_STATUS_NOPROBLEMO) {
+ DEBUG(0,("domain_client_validate: unable to validate password "
+ "for user %s in domain %s to Domain controller %s. "
+ "Error was %s.\n", user_info->smb_username.str,
+ user_info->domain.str, remote_machine,
+ get_nt_error_msg(status)));
} else {
- nt_status = NT_STATUS_NOPROBLEMO;
+ status = NT_STATUS_NOPROBLEMO;
}
/*
* send here. JRA.
*/
- if (nt_status == NT_STATUS_NOPROBLMO) {
+ if (status == NT_STATUS_NOPROBLMO) {
if(cli_nt_logoff(&cli, &ctr) == False) {
DEBUG(0,("domain_client_validate: unable to log off user %s in domain \
%s to Domain controller %s. Error was %s.\n", user, domain, remote_machine, cli_errstr(&cli)));
- nt_status = NT_STATUS_LOGON_FAILURE;
+ status = NT_STATUS_LOGON_FAILURE;
}
}
#endif /* 0 */
cli_nt_session_close(&cli);
cli_ulogoff(&cli);
cli_shutdown(&cli);
- return nt_status;
+ return status;
}
enum winbindd_result winbindd_pam_auth(struct winbindd_cli_state *state)
{
- BOOL result;
+ uint32 result;
fstring name_domain, name_user;
int passlen;
unsigned char trust_passwd[16];
for each authentication performed. This can theoretically
be optimised to use an already open IPC$ connection. */
- result = (domain_client_validate(&user_info, &server_info,
- server_state.controller, trust_passwd,
- last_change_time) == NT_STATUS_NOPROBLEMO);
+ result = domain_client_validate(&user_info, &server_info,
+ server_state.controller, trust_passwd,
+ last_change_time);
- return result ? WINBINDD_OK : WINBINDD_ERROR;
+ return (result == NT_STATUS_NOPROBLEMO) ? WINBINDD_OK : WINBINDD_ERROR;
}
/* Challenge Response Authentication Protocol */
enum winbindd_result winbindd_pam_auth_crap(struct winbindd_cli_state *state)
{
- BOOL result;
+ uint32 result;
fstring name_domain, name_user;
unsigned char trust_passwd[16];
time_t last_change_time;
for each authentication performed. This can theoretically
be optimised to use an already open IPC$ connection. */
- result = (domain_client_validate(&user_info, &server_info,
- server_state.controller, trust_passwd,
- last_change_time) == NT_STATUS_NOPROBLEMO);
+ result = domain_client_validate(&user_info, &server_info,
+ server_state.controller, trust_passwd,
+ last_change_time);
- return result ? WINBINDD_OK : WINBINDD_ERROR;
+ return (result == NT_STATUS_NOPROBLEMO) ? WINBINDD_OK : WINBINDD_ERROR;
}
/* Change a user password */