summaryrefslogtreecommitdiff
path: root/source3/libsmb/smbencrypt.c
diff options
context:
space:
mode:
authorLuke Leighton <lkcl@samba.org>1999-11-04 21:41:36 +0000
committerLuke Leighton <lkcl@samba.org>1999-11-04 21:41:36 +0000
commitfe8383382d5b8221093a5340705c4e5b3731a249 (patch)
tree90a273d77990efc6ff60503fe1756e9397de3d6d /source3/libsmb/smbencrypt.c
parentcae821d45926157a250e9fa047e0c8aa8c0c2c54 (diff)
downloadsamba-fe8383382d5b8221093a5340705c4e5b3731a249.tar.gz
samba-fe8383382d5b8221093a5340705c4e5b3731a249.tar.bz2
samba-fe8383382d5b8221093a5340705c4e5b3731a249.zip
samuserset <username> -p password. YESSSSS :)
you have to use "ntlmv1" at the moment (i.e set client ntlmv2 = no). (This used to be commit f52504c553becc64b89d546a57b1bd9cf1bc5b5c)
Diffstat (limited to 'source3/libsmb/smbencrypt.c')
-rw-r--r--source3/libsmb/smbencrypt.c11
1 files changed, 11 insertions, 0 deletions
diff --git a/source3/libsmb/smbencrypt.c b/source3/libsmb/smbencrypt.c
index b25e27550c..46e979fd18 100644
--- a/source3/libsmb/smbencrypt.c
+++ b/source3/libsmb/smbencrypt.c
@@ -442,6 +442,11 @@ BOOL decode_pw_buffer(const char buffer[516], char *new_passwd,
*/
uint32 new_pw_len = IVAL(buffer, 512);
+
+#ifdef DEBUG_PASSWORD
+ dump_data(100, buffer, 516);
+#endif
+
if (new_pw_len < 0 || new_pw_len > new_passwd_size - 1)
{
DEBUG(0,("check_oem_password: incorrect password length (%d).\n", new_pw_len));
@@ -472,6 +477,8 @@ BOOL decode_pw_buffer(const char buffer[516], char *new_passwd,
BOOL encode_pw_buffer(char buffer[516], const char *new_pass,
int new_pw_len, BOOL nt_pass_set)
{
+ generate_random_buffer(buffer, 516, True);
+
if (nt_pass_set)
{
/*
@@ -493,5 +500,9 @@ BOOL encode_pw_buffer(char buffer[516], const char *new_pass,
SIVAL(buffer, 512, new_pw_len);
+#ifdef DEBUG_PASSWORD
+ dump_data(100, buffer, 516);
+#endif
+
return True;
}