svn commit: samba r7594 - in branches/SAMBA_4_0/source/ldap_server: .

tridge at samba.org tridge at samba.org
Wed Jun 15 00:30:04 GMT 2005


Author: tridge
Date: 2005-06-15 00:30:03 +0000 (Wed, 15 Jun 2005)
New Revision: 7594

WebSVN: http://websvn.samba.org/cgi-bin/viewcvs.cgi?view=rev&root=samba&rev=7594

Log:
abartlet is right that this hack is not actually necessary, it just
prevents a bogus:
  GSS Update failed: Miscellaneous failure (see text): ASN.1 identifier doesn't match expected value
error on every ldap connection. I'll remove it and let the error remain until Andrew
works out a better fix.

Modified:
   branches/SAMBA_4_0/source/ldap_server/ldap_bind.c


Changeset:
Modified: branches/SAMBA_4_0/source/ldap_server/ldap_bind.c
===================================================================
--- branches/SAMBA_4_0/source/ldap_server/ldap_bind.c	2005-06-15 00:27:51 UTC (rev 7593)
+++ branches/SAMBA_4_0/source/ldap_server/ldap_bind.c	2005-06-15 00:30:03 UTC (rev 7594)
@@ -74,12 +74,8 @@
 		gensec_want_feature(call->conn->gensec, GENSEC_FEATURE_SIGN);
 		gensec_want_feature(call->conn->gensec, GENSEC_FEATURE_SEAL);
 		
-		if (req->creds.SASL.secblob.length >= 7 &&
-		    strncmp(req->creds.SASL.secblob.data, "NTLMSSP", 7) == 0) {
-			status = gensec_start_mech_by_sasl_name(call->conn->gensec, "NTLM");
-		} else {
-			status = gensec_start_mech_by_sasl_name(call->conn->gensec, req->creds.SASL.mechanism);
-		}
+
+		status = gensec_start_mech_by_sasl_name(call->conn->gensec, req->creds.SASL.mechanism);
 		if (!NT_STATUS_IS_OK(status)) {
 			DEBUG(1, ("Failed to start GENSEC SASL[%s] server code: %s\n", 
 				req->creds.SASL.mechanism, nt_errstr(status)));



More information about the samba-cvs mailing list