diff options
author | Luke Leighton <lkcl@samba.org> | 1999-11-04 21:41:36 +0000 |
---|---|---|
committer | Luke Leighton <lkcl@samba.org> | 1999-11-04 21:41:36 +0000 |
commit | fe8383382d5b8221093a5340705c4e5b3731a249 (patch) | |
tree | 90a273d77990efc6ff60503fe1756e9397de3d6d /source3/libsmb | |
parent | cae821d45926157a250e9fa047e0c8aa8c0c2c54 (diff) | |
download | samba-fe8383382d5b8221093a5340705c4e5b3731a249.tar.gz samba-fe8383382d5b8221093a5340705c4e5b3731a249.tar.bz2 samba-fe8383382d5b8221093a5340705c4e5b3731a249.zip |
samuserset <username> -p password. YESSSSS :)
you have to use "ntlmv1" at the moment (i.e set client ntlmv2 = no).
(This used to be commit f52504c553becc64b89d546a57b1bd9cf1bc5b5c)
Diffstat (limited to 'source3/libsmb')
-rw-r--r-- | source3/libsmb/smbencrypt.c | 11 |
1 files changed, 11 insertions, 0 deletions
diff --git a/source3/libsmb/smbencrypt.c b/source3/libsmb/smbencrypt.c index b25e27550c..46e979fd18 100644 --- a/source3/libsmb/smbencrypt.c +++ b/source3/libsmb/smbencrypt.c @@ -442,6 +442,11 @@ BOOL decode_pw_buffer(const char buffer[516], char *new_passwd, */ uint32 new_pw_len = IVAL(buffer, 512); + +#ifdef DEBUG_PASSWORD + dump_data(100, buffer, 516); +#endif + if (new_pw_len < 0 || new_pw_len > new_passwd_size - 1) { DEBUG(0,("check_oem_password: incorrect password length (%d).\n", new_pw_len)); @@ -472,6 +477,8 @@ BOOL decode_pw_buffer(const char buffer[516], char *new_passwd, BOOL encode_pw_buffer(char buffer[516], const char *new_pass, int new_pw_len, BOOL nt_pass_set) { + generate_random_buffer(buffer, 516, True); + if (nt_pass_set) { /* @@ -493,5 +500,9 @@ BOOL encode_pw_buffer(char buffer[516], const char *new_pass, SIVAL(buffer, 512, new_pw_len); +#ifdef DEBUG_PASSWORD + dump_data(100, buffer, 516); +#endif + return True; } |