summaryrefslogtreecommitdiff
path: root/source3/smbd/sesssetup.c
diff options
context:
space:
mode:
authorAndrew Bartlett <abartlet@samba.org>2002-01-11 05:29:09 +0000
committerAndrew Bartlett <abartlet@samba.org>2002-01-11 05:29:09 +0000
commit5047a66d39fdd56a5895037de8c519a828a03b19 (patch)
tree5e60c94008f3d1254447aad9e97fbef30906e49b /source3/smbd/sesssetup.c
parent348f1784289ac1e15cc8cd6e543734f414b88f66 (diff)
downloadsamba-5047a66d39fdd56a5895037de8c519a828a03b19.tar.gz
samba-5047a66d39fdd56a5895037de8c519a828a03b19.tar.bz2
samba-5047a66d39fdd56a5895037de8c519a828a03b19.zip
Back out the crazy notion that the NTLMSSP flags actually mean anything...
Replace this with some flags that *we* define. We can do a mapping later if we actually get some more reliable info about what passwords are actually valid. Andrew Bartlett (This used to be commit 7f7a42c3e4d5798ac87ea16a42e4976c3778a76b)
Diffstat (limited to 'source3/smbd/sesssetup.c')
-rw-r--r--source3/smbd/sesssetup.c13
1 files changed, 12 insertions, 1 deletions
diff --git a/source3/smbd/sesssetup.c b/source3/smbd/sesssetup.c
index f809f9ca0c..519817432d 100644
--- a/source3/smbd/sesssetup.c
+++ b/source3/smbd/sesssetup.c
@@ -346,6 +346,7 @@ static int reply_spnego_auth(connection_struct *conn, char *inbuf, char *outbuf,
NTSTATUS nt_status;
int sess_vuid;
BOOL as_guest;
+ uint32 auth_flags = AUTH_FLAG_NONE;
auth_usersupplied_info *user_info = NULL;
auth_serversupplied_info *server_info = NULL;
@@ -382,12 +383,22 @@ static int reply_spnego_auth(connection_struct *conn, char *inbuf, char *outbuf,
file_save("lmhash1.dat", lmhash.data, lmhash.length);
#endif
+ if (lmhash.length) {
+ auth_flags |= AUTH_FLAG_LM_RESP;
+ }
+
+ if (nthash.length == 24) {
+ auth_flags |= AUTH_FLAG_NTLM_RESP;
+ } else if (nthash.length > 24) {
+ auth_flags |= AUTH_FLAG_NTLMv2_RESP;
+ }
+
if (!make_user_info_map(&user_info,
user, workgroup,
machine,
lmhash, nthash,
plaintext_password,
- neg_flags, True)) {
+ auth_flags, True)) {
return ERROR_NT(NT_STATUS_NO_MEMORY);
}