svn commit: samba r21395 - in
branches/SAMBA_4_0/source/dsdb/samdb/ldb_modules: .
metze at samba.org
metze at samba.org
Fri Feb 16 17:36:58 GMT 2007
Author: metze
Date: 2007-02-16 17:36:58 +0000 (Fri, 16 Feb 2007)
New Revision: 21395
WebSVN: http://websvn.samba.org/cgi-bin/viewcvs.cgi?view=rev&root=samba&rev=21395
Log:
fix comments
metze
Modified:
branches/SAMBA_4_0/source/dsdb/samdb/ldb_modules/password_hash.c
Changeset:
Modified: branches/SAMBA_4_0/source/dsdb/samdb/ldb_modules/password_hash.c
===================================================================
--- branches/SAMBA_4_0/source/dsdb/samdb/ldb_modules/password_hash.c 2007-02-16 17:25:54 UTC (rev 21394)
+++ branches/SAMBA_4_0/source/dsdb/samdb/ldb_modules/password_hash.c 2007-02-16 17:36:58 UTC (rev 21395)
@@ -56,7 +56,7 @@
* Once this is done (which could update anything at all), we
* calculate the password hashes.
*
- * This function must not only update the ntPwdHash, lmPwdHash and
+ * This function must not only update the unicodePwd, dBCSPwd and
* krb5Key fields, it must also atomicly increment the
* msDS-KeyVersionNumber. We should be in a transaction, so all this
* should be quite safe...
@@ -625,11 +625,11 @@
}
if (ntAttr && (ntAttr->num_values > 1)) {
- ldb_set_errstring(module->ldb, "mupltiple values for lmPwdHash not allowed!\n");
+ ldb_set_errstring(module->ldb, "mupltiple values for unicodePwd not allowed!\n");
return LDB_ERR_CONSTRAINT_VIOLATION;
}
if (lmAttr && (lmAttr->num_values > 1)) {
- ldb_set_errstring(module->ldb, "mupltiple values for lmPwdHash not allowed!\n");
+ ldb_set_errstring(module->ldb, "mupltiple values for dBCSPwd not allowed!\n");
return LDB_ERR_CONSTRAINT_VIOLATION;
}
@@ -639,11 +639,11 @@
}
if (ntAttr && (ntAttr->num_values == 0)) {
- ldb_set_errstring(module->ldb, "lmPwdHash must have a value!\n");
+ ldb_set_errstring(module->ldb, "unicodePwd must have a value!\n");
return LDB_ERR_CONSTRAINT_VIOLATION;
}
if (lmAttr && (lmAttr->num_values == 0)) {
- ldb_set_errstring(module->ldb, "lmPwdHash must have a value!\n");
+ ldb_set_errstring(module->ldb, "dBCSPwd must have a value!\n");
return LDB_ERR_CONSTRAINT_VIOLATION;
}
@@ -733,7 +733,7 @@
}
}
- /* add also krb5 keys based on NT the hash (we might have ntPwdHash, but not the cleartext */
+ /* add also krb5 keys based on NT the hash (we might have unicodePwd, but not the cleartext */
ret = add_krb5_keys_from_NThash(ac->module, msg, smb_krb5_context);
if (ret != LDB_SUCCESS) {
return ret;
@@ -809,7 +809,7 @@
return LDB_ERR_CONSTRAINT_VIOLATION;
}
- /* If no part of this touches the sambaPassword OR ntPwdHash and/or lmPwdHash, then we don't
+ /* If no part of this touches the sambaPassword OR unicodePwd and/or dBCSPwd, then we don't
* need to make any changes. For password changes/set there should
* be a 'delete' or a 'modify' on this attribute. */
/* If the only operation is the deletion of the passwords then go on */
More information about the samba-cvs
mailing list