From 33ed8059a2bbf8e8a43aee9ca9d6da736e84d686 Mon Sep 17 00:00:00 2001 From: Luke Leighton Date: Fri, 16 Jul 1999 22:23:45 +0000 Subject: NTLMv2 check being actioned when NT password response was only 24 chars. added check to ensure response is more than 24 chars before bothering to do an NTLMv2 check. (This used to be commit 7a58895ff26fcad09ee45de99086739bf5761fd9) --- source3/smbd/password.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'source3/smbd') diff --git a/source3/smbd/password.c b/source3/smbd/password.c index 022d432787..6ec290ca25 100644 --- a/source3/smbd/password.c +++ b/source3/smbd/password.c @@ -402,7 +402,7 @@ BOOL smb_password_ok(struct smb_passwd *smb_pass, uchar chal[8], /* We have the NT MD4 hash challenge available - see if we can use it (ie. does it exist in the smbpasswd file). */ - if (lp_server_ntlmv2()) + if (lp_server_ntlmv2() != False && nt_pwd_len > 24) { DEBUG(4,("smb_password_ok: Check NTLMv2 password\n")); if (smb_pwd_check_ntlmv2(nt_pass, nt_pwd_len, -- cgit