r14450: Fix more get_md4pw() breakage caused by missing "breaks"
authorGerald Carter <jerry@samba.org>
Wed, 15 Mar 2006 15:38:15 +0000 (15:38 +0000)
committerGerald (Jerry) Carter <jerry@samba.org>
Wed, 10 Oct 2007 16:15:30 +0000 (11:15 -0500)
in the switch statement which matched the schannel type
against the account type.
(This used to be commit 57c705ea63381ed9ab09145b4f57a736931fa6ca)

source3/rpc_server/srv_netlog_nt.c

index cafef5ab7fdaddf3a0f24f9eae29c722ec666ec5..1a7ab4ef5336a92d6f81c34baf6e3d28fafa16e1 100644 (file)
@@ -268,6 +268,7 @@ static NTSTATUS get_md4pw(char *md4pw, char *mach_acct, uint16 sec_chan_type)
                                TALLOC_FREE(sampass);
                                return NT_STATUS_NO_TRUST_SAM_ACCOUNT;
                        }
+                       break;
                case SEC_CHAN_WKSTA:
                        if (!(acct_ctrl & ACB_WSTRUST)) {
                                DEBUG(0,("get_md4pw: Workstation %s: WORKSTATION secure channel requested "
@@ -275,6 +276,7 @@ static NTSTATUS get_md4pw(char *md4pw, char *mach_acct, uint16 sec_chan_type)
                                TALLOC_FREE(sampass);
                                return NT_STATUS_NO_TRUST_SAM_ACCOUNT;
                        }
+                       break;
                case SEC_CHAN_DOMAIN:
                        if (!(acct_ctrl & ACB_DOMTRUST)) {
                                DEBUG(0,("get_md4pw: Workstation %s: DOMAIN secure channel requested "
@@ -282,6 +284,7 @@ static NTSTATUS get_md4pw(char *md4pw, char *mach_acct, uint16 sec_chan_type)
                                TALLOC_FREE(sampass);
                                return NT_STATUS_NO_TRUST_SAM_ACCOUNT;
                        }
+                       break;
                default:
                        break;
        }