diff options
author | Luke Leighton <lkcl@samba.org> | 1999-11-19 01:37:16 +0000 |
---|---|---|
committer | Luke Leighton <lkcl@samba.org> | 1999-11-19 01:37:16 +0000 |
commit | 3365a2fd234966ecfcd06d2295cbd085c7bbd8c6 (patch) | |
tree | f0236f9679e08f10b7c545e58c082b5ba4f5b6e2 /source3/include | |
parent | eb8c70cb66e8bec5726e099ca1e5f997d3e4637e (diff) | |
download | samba-3365a2fd234966ecfcd06d2295cbd085c7bbd8c6.tar.gz samba-3365a2fd234966ecfcd06d2295cbd085c7bbd8c6.tar.bz2 samba-3365a2fd234966ecfcd06d2295cbd085c7bbd8c6.zip |
The First Necessary UNICODE String Support.
the random workstation trust account password is TOTAL garbage. i mean,
complete garbage. it's nowhere CLOSE to being a UNICODE string. therefore
we can't just take every second character.
created nt_owf_genW() which creates NT#(password) instead of NT#(Unicode(pw)).
followed through to the password setting in srv_samr.c
(This used to be commit 172601b84ae94044b27ded917d4e0e21e47a5a66)
Diffstat (limited to 'source3/include')
-rw-r--r-- | source3/include/proto.h | 5 |
1 files changed, 4 insertions, 1 deletions
diff --git a/source3/include/proto.h b/source3/include/proto.h index 35ac728921..2b2a85ed4e 100644 --- a/source3/include/proto.h +++ b/source3/include/proto.h @@ -838,8 +838,11 @@ void sam_pwd_hash(uint32 rid, const uchar *in, uchar *out, int forw); void SMBencrypt(uchar *passwd, uchar *c8, uchar *p24); void SMBNTencrypt(uchar *passwd, uchar *c8, uchar *p24); void E_md4hash(uchar *passwd, uchar *p16); +void lm_owf_genW(const UNISTR2 *pwd, uchar p16[16]); void lm_owf_gen(const char *pwd, uchar p16[16]); +void nt_owf_genW(const UNISTR2 *pwd, uchar nt_p16[16]); void nt_owf_gen(const char *pwd, uchar nt_p16[16]); +void nt_lm_owf_genW(const UNISTR2 *pwd, uchar nt_p16[16], uchar lm_p16[16]); void nt_lm_owf_gen(const char *pwd, uchar nt_p16[16], uchar lm_p16[16]); void SMBOWFencrypt(uchar passwd[16], uchar *c8, uchar p24[24]); void SMBOWFencrypt_ntv2(const uchar kr[16], @@ -861,7 +864,7 @@ void create_ntlmssp_resp(struct pwd_info *pwd, uint32 ntlmssp_cli_flgs, prs_struct *auth_resp); BOOL decode_pw_buffer(const char buffer[516], char *new_passwd, - int new_passwd_size, BOOL nt_pass_set); + int new_passwd_size, uint32 *new_pw_len); BOOL encode_pw_buffer(char buffer[516], const char *new_pass, int new_pw_len, BOOL nt_pass_set); |