summaryrefslogtreecommitdiff
path: root/source3/libsmb/clientgen.c
diff options
context:
space:
mode:
authorAndrew Tridgell <tridge@samba.org>2001-10-12 04:49:42 +0000
committerAndrew Tridgell <tridge@samba.org>2001-10-12 04:49:42 +0000
commit9f7cb41f11c0d2fc09104f6998f75c59bc363b26 (patch)
treeef023f03e5ea53a178c2d874a682f607e13f6397 /source3/libsmb/clientgen.c
parent8632b44f6ba2a1b8698c62778dc6547bed4bae92 (diff)
downloadsamba-9f7cb41f11c0d2fc09104f6998f75c59bc363b26.tar.gz
samba-9f7cb41f11c0d2fc09104f6998f75c59bc363b26.tar.bz2
samba-9f7cb41f11c0d2fc09104f6998f75c59bc363b26.zip
added NTLMSSP authentication to libsmb. It seems to work well so I have enabled it by default if the server supports it. Let me know if this breaks anything. Choose kerberos with the -k flag to smbclient, otherwise it will use SPNEGO/NTLMSSP/NTLM
(This used to be commit 076aa97bee54d182288d9e93ae160ae22a5f7757)
Diffstat (limited to 'source3/libsmb/clientgen.c')
-rw-r--r--source3/libsmb/clientgen.c5
1 files changed, 1 insertions, 4 deletions
diff --git a/source3/libsmb/clientgen.c b/source3/libsmb/clientgen.c
index b5eddd5644..25dc070024 100644
--- a/source3/libsmb/clientgen.c
+++ b/source3/libsmb/clientgen.c
@@ -112,10 +112,7 @@ void cli_setup_packet(struct cli_state *cli)
if (cli->capabilities & CAP_STATUS32) {
flags2 |= FLAGS2_32_BIT_ERROR_CODES;
}
- if (cli->use_spnego) {
- /* once we have NTLMSSP we can enable this unconditionally */
- flags2 |= FLAGS2_EXTENDED_SECURITY;
- }
+ flags2 |= FLAGS2_EXTENDED_SECURITY;
SSVAL(cli->outbuf,smb_flg2, flags2);
}
}