summaryrefslogtreecommitdiff
path: root/source3/libsmb/pwd_cache.c
diff options
context:
space:
mode:
authorAndrew Bartlett <abartlet@samba.org>2001-12-04 05:03:03 +0000
committerAndrew Bartlett <abartlet@samba.org>2001-12-04 05:03:03 +0000
commit3bc87626ae7894269535333aadb45ec786f3908d (patch)
treef6e2866016b836e79bcee221f23e19ff3c374331 /source3/libsmb/pwd_cache.c
parent275a9f4ef74747970b0bd16b1cf1943812080343 (diff)
downloadsamba-3bc87626ae7894269535333aadb45ec786f3908d.tar.gz
samba-3bc87626ae7894269535333aadb45ec786f3908d.tar.bz2
samba-3bc87626ae7894269535333aadb45ec786f3908d.zip
Add 'net rpc join' to match the ADS equiv.
This kills off the offending code in smbpasswd -j -Uab%c In the process we have changed from unsing compelatly random passwords to random, 15 char ascii strings. While this does produce a decrese in entropy, it is still vastly greater than we need, considering the application. In the meantime this allows us to actually *type* the machine account password duruign debugging. This code also adds a 'check' step to the join, confirming that the stored password does indeed do somthing of value :-) Andrew Bartlett (This used to be commit c0b7ee6ee547dc7ff798eaf8cb63fbe344073029)
Diffstat (limited to 'source3/libsmb/pwd_cache.c')
-rw-r--r--source3/libsmb/pwd_cache.c2
1 files changed, 2 insertions, 0 deletions
diff --git a/source3/libsmb/pwd_cache.c b/source3/libsmb/pwd_cache.c
index 3c3d5cb741..9404588223 100644
--- a/source3/libsmb/pwd_cache.c
+++ b/source3/libsmb/pwd_cache.c
@@ -135,6 +135,7 @@ void pwd_set_cleartext(struct pwd_info *pwd, char *clr)
pwd->cleartext = True;
pwd->null_pwd = False;
pwd->crypted = False;
+ pwd_make_lm_nt_16(pwd, clr);
}
/****************************************************************************
@@ -147,6 +148,7 @@ void pwd_get_cleartext(struct pwd_info *pwd, char *clr)
fstrcpy(clr, pwd->password);
else
clr[0] = 0;
+
}
/****************************************************************************