summaryrefslogtreecommitdiff
path: root/source3/smbd
diff options
context:
space:
mode:
authorLuke Leighton <lkcl@samba.org>1999-07-16 22:23:45 +0000
committerLuke Leighton <lkcl@samba.org>1999-07-16 22:23:45 +0000
commit33ed8059a2bbf8e8a43aee9ca9d6da736e84d686 (patch)
tree75fa84c058095ca3f33dda845da35d78c821fe65 /source3/smbd
parent65930413f4b0350dece7615136c3e2b83edeaf1a (diff)
downloadsamba-33ed8059a2bbf8e8a43aee9ca9d6da736e84d686.tar.gz
samba-33ed8059a2bbf8e8a43aee9ca9d6da736e84d686.tar.bz2
samba-33ed8059a2bbf8e8a43aee9ca9d6da736e84d686.zip
NTLMv2 check being actioned when NT password response was only 24 chars.
added check to ensure response is more than 24 chars before bothering to do an NTLMv2 check. (This used to be commit 7a58895ff26fcad09ee45de99086739bf5761fd9)
Diffstat (limited to 'source3/smbd')
-rw-r--r--source3/smbd/password.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/source3/smbd/password.c b/source3/smbd/password.c
index 022d432787..6ec290ca25 100644
--- a/source3/smbd/password.c
+++ b/source3/smbd/password.c
@@ -402,7 +402,7 @@ BOOL smb_password_ok(struct smb_passwd *smb_pass, uchar chal[8],
/* We have the NT MD4 hash challenge available - see if we can
use it (ie. does it exist in the smbpasswd file).
*/
- if (lp_server_ntlmv2())
+ if (lp_server_ntlmv2() != False && nt_pwd_len > 24)
{
DEBUG(4,("smb_password_ok: Check NTLMv2 password\n"));
if (smb_pwd_check_ntlmv2(nt_pass, nt_pwd_len,