return NT_STATUS_LOGON_FAILURE;
DEBUG(3, ("check_ntlm_password: Checking password for unmapped user [%s]\\[%s]@[%s] with the new password interface\n",
- user_info->client_domain, user_info->client.account_name, user_info->workstation_name));
+ user_info->client.domain_name, user_info->client.account_name, user_info->workstation_name));
DEBUG(3, ("check_ntlm_password: mapped user is: [%s]\\[%s]@[%s]\n",
user_info->domain, user_info->mapped.account_name, user_info->workstation_name));
user_info->logon_parameters,/* flags such as 'allow workstation logon' */
dc_name, /* server name */
user_info->client.account_name, /* user name logging on. */
- user_info->client_domain, /* domain name */
+ user_info->client.domain_name, /* domain name */
user_info->workstation_name,/* workstation name */
chal, /* 8 byte challenge. */
user_info->lm_resp, /* lanman 24 byte response */
DEBUG(0,("domain_client_validate: unable to validate password "
"for user %s in domain %s to Domain controller %s. "
"Error was %s.\n", user_info->client.account_name,
- user_info->client_domain, dc_name,
+ user_info->client.domain_name, dc_name,
nt_errstr(nt_status)));
/* map to something more useful */
* workstation logon' */
global_myname(), /* server name */
user_info->client.account_name, /* user name logging on. */
- user_info->client_domain, /* domain name */
+ user_info->client.domain_name, /* domain name */
user_info->workstation_name, /* workstation name */
(uchar *)auth_context->challenge.data, /* 8 byte challenge. */
user_info->lm_resp, /* lanman 24 byte response */
&user_info->lm_resp, &user_info->nt_resp,
username,
user_info->client.account_name,
- user_info->client_domain,
+ user_info->client.domain_name,
lm_hash,
nt_hash,
user_sess_key, lm_sess_key);
return NT_STATUS_NO_MEMORY;
}
- (*user_info)->client_domain = SMB_STRDUP(client_domain);
- if ((*user_info)->client_domain == NULL) {
+ (*user_info)->client.domain_name = SMB_STRDUP(client_domain);
+ if ((*user_info)->client.domain_name == NULL) {
free_user_info(user_info);
return NT_STATUS_NO_MEMORY;
}
}
SAFE_FREE((*user_info)->client.account_name);
SAFE_FREE((*user_info)->mapped.account_name);
- SAFE_FREE((*user_info)->client_domain);
SAFE_FREE((*user_info)->domain);
+ SAFE_FREE((*user_info)->client.domain_name);
SAFE_FREE((*user_info)->workstation_name);
data_blob_free(&(*user_info)->lm_resp);
data_blob_free(&(*user_info)->nt_resp);
bool encrypted;
struct {
char *account_name; /* username before/after mapping */
+ char *domain_name; /* username before/after mapping */
} client, mapped;
bool was_mapped; /* Did the username map actually match? */
- char *client_domain; /* domain name string */
char *domain; /* domain name after mapping */
char *internal_username; /* username after mapping */
const char *workstation_name; /* workstation name (netbios calling