diff options
author | Andrew Bartlett <abartlet@samba.org> | 2003-11-23 00:22:17 +0000 |
---|---|---|
committer | Andrew Bartlett <abartlet@samba.org> | 2003-11-23 00:22:17 +0000 |
commit | 13a6b9833e7fdd5e4624ccf844e0f9932d9597c1 (patch) | |
tree | eb0a49f275dd09d09c13d6f08e2aa12517f71ce2 /source3/rpc_parse | |
parent | 354c0fbc91c49f71c4760f88c0fb9e7fba11413c (diff) | |
download | samba-13a6b9833e7fdd5e4624ccf844e0f9932d9597c1.tar.gz samba-13a6b9833e7fdd5e4624ccf844e0f9932d9597c1.tar.bz2 samba-13a6b9833e7fdd5e4624ccf844e0f9932d9597c1.zip |
Merge from 3.0:
Add support for variable-length session keys in our client code.
This means that we now support 'net rpc join' with KRB5 (des based)
logins. Now, you need to hack 'net' to do that, but the principal is
important...
When we add kerberos to 'net rpc', it should be possible to still do
user management and the like over RPC.
-
Add server-side support for variable-length session keys (as used by
DES based krb5 logins).
Andrew Bartlett
(This used to be commit 1287cf5f921327c9ea758de46220c4e2dedc485c)
Diffstat (limited to 'source3/rpc_parse')
-rw-r--r-- | source3/rpc_parse/parse_samr.c | 22 |
1 files changed, 11 insertions, 11 deletions
diff --git a/source3/rpc_parse/parse_samr.c b/source3/rpc_parse/parse_samr.c index 1966538362..5e3502b242 100644 --- a/source3/rpc_parse/parse_samr.c +++ b/source3/rpc_parse/parse_samr.c @@ -6302,8 +6302,8 @@ NTSTATUS make_samr_userinfo_ctr_usr21(TALLOC_CTX *ctx, SAM_USERINFO_CTR * ctr, inits a SAM_USERINFO_CTR structure. ********************************************************************/ -void init_samr_userinfo_ctr(SAM_USERINFO_CTR * ctr, DATA_BLOB sess_key, - uint16 switch_value, void *info) +static void init_samr_userinfo_ctr(SAM_USERINFO_CTR * ctr, DATA_BLOB *sess_key, + uint16 switch_value, void *info) { DEBUG(5, ("init_samr_userinfo_ctr\n")); @@ -6312,13 +6312,13 @@ void init_samr_userinfo_ctr(SAM_USERINFO_CTR * ctr, DATA_BLOB sess_key, switch (switch_value) { case 0x18: - SamOEMhash(ctr->info.id24->pass, sess_key.data, 516); - dump_data(100, (char *)sess_key.data, 16); + SamOEMhashBlob(ctr->info.id24->pass, 516, sess_key); + dump_data(100, (char *)sess_key->data, sess_key->length); dump_data(100, (char *)ctr->info.id24->pass, 516); break; case 0x17: - SamOEMhash(ctr->info.id23->pass, sess_key.data, 516); - dump_data(100, (char *)sess_key.data, 16); + SamOEMhashBlob(ctr->info.id23->pass, 516, sess_key); + dump_data(100, (char *)sess_key->data, sess_key->length); dump_data(100, (char *)ctr->info.id23->pass, 516); break; default: @@ -6503,7 +6503,7 @@ inits a SAMR_Q_SET_USERINFO structure. ********************************************************************/ void init_samr_q_set_userinfo(SAMR_Q_SET_USERINFO * q_u, - POLICY_HND *hnd, DATA_BLOB sess_key, + POLICY_HND *hnd, DATA_BLOB *sess_key, uint16 switch_value, void *info) { DEBUG(5, ("init_samr_q_set_userinfo\n")); @@ -6577,7 +6577,7 @@ inits a SAMR_Q_SET_USERINFO2 structure. ********************************************************************/ void init_samr_q_set_userinfo2(SAMR_Q_SET_USERINFO2 * q_u, - POLICY_HND *hnd, DATA_BLOB sess_key, + POLICY_HND *hnd, DATA_BLOB *sess_key, uint16 switch_value, SAM_USERINFO_CTR * ctr) { DEBUG(5, ("init_samr_q_set_userinfo2\n")); @@ -6591,9 +6591,9 @@ void init_samr_q_set_userinfo2(SAMR_Q_SET_USERINFO2 * q_u, switch (switch_value) { case 0x12: - SamOEMhash(ctr->info.id12->lm_pwd, sess_key.data, 16); - SamOEMhash(ctr->info.id12->nt_pwd, sess_key.data, 16); - dump_data(100, (char *)sess_key.data, 16); + SamOEMhashBlob(ctr->info.id12->lm_pwd, 16, sess_key); + SamOEMhashBlob(ctr->info.id12->nt_pwd, 16, sess_key); + dump_data(100, (char *)sess_key->data, sess_key->length); dump_data(100, (char *)ctr->info.id12->lm_pwd, 16); dump_data(100, (char *)ctr->info.id12->nt_pwd, 16); break; |