s4-samr: fake up a samr_ValidatePassword response
authorAndrew Tridgell <tridge@samba.org>
Fri, 2 Oct 2009 06:02:42 +0000 (16:02 +1000)
committerAndrew Tridgell <tridge@samba.org>
Fri, 2 Oct 2009 06:02:42 +0000 (16:02 +1000)
mdw is working on the correct call to check the password strength

source4/rpc_server/samr/dcesrv_samr.c

index 6dda06a6b88fd8b0d1fc434b976fa69342d7e411..b8af5fdeb307f2195143508831a419e9671e5f05 100644 (file)
@@ -4342,7 +4342,11 @@ static NTSTATUS dcesrv_samr_SetDsrmPassword(struct dcesrv_call_state *dce_call,
 static NTSTATUS dcesrv_samr_ValidatePassword(struct dcesrv_call_state *dce_call, TALLOC_CTX *mem_ctx,
                                      struct samr_ValidatePassword *r)
 {
-       DCESRV_FAULT(DCERPC_FAULT_OP_RNG_ERROR);
+       /* just say it's OK for now - we need to hook this into our
+          password strength code later */
+       DEBUG(0,(__location__ ": Faking samr_ValidatePassword reply\n"));
+       (*r->out.rep) = talloc_zero(mem_ctx, union samr_ValidatePasswordRep);
+       return NT_STATUS_OK;
 }