diff options
author | Luke Leighton <lkcl@samba.org> | 1999-07-16 22:23:45 +0000 |
---|---|---|
committer | Luke Leighton <lkcl@samba.org> | 1999-07-16 22:23:45 +0000 |
commit | 33ed8059a2bbf8e8a43aee9ca9d6da736e84d686 (patch) | |
tree | 75fa84c058095ca3f33dda845da35d78c821fe65 | |
parent | 65930413f4b0350dece7615136c3e2b83edeaf1a (diff) | |
download | samba-33ed8059a2bbf8e8a43aee9ca9d6da736e84d686.tar.gz samba-33ed8059a2bbf8e8a43aee9ca9d6da736e84d686.tar.bz2 samba-33ed8059a2bbf8e8a43aee9ca9d6da736e84d686.zip |
NTLMv2 check being actioned when NT password response was only 24 chars.
added check to ensure response is more than 24 chars before bothering
to do an NTLMv2 check.
(This used to be commit 7a58895ff26fcad09ee45de99086739bf5761fd9)
-rw-r--r-- | source3/smbd/password.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/source3/smbd/password.c b/source3/smbd/password.c index 022d432787..6ec290ca25 100644 --- a/source3/smbd/password.c +++ b/source3/smbd/password.c @@ -402,7 +402,7 @@ BOOL smb_password_ok(struct smb_passwd *smb_pass, uchar chal[8], /* We have the NT MD4 hash challenge available - see if we can use it (ie. does it exist in the smbpasswd file). */ - if (lp_server_ntlmv2()) + if (lp_server_ntlmv2() != False && nt_pwd_len > 24) { DEBUG(4,("smb_password_ok: Check NTLMv2 password\n")); if (smb_pwd_check_ntlmv2(nt_pass, nt_pwd_len, |