From 3e152fcd5b49f727062ed054401e294b6d5d8cb8 Mon Sep 17 00:00:00 2001 From: Andrew Bartlett Date: Fri, 18 Jun 2004 11:59:52 +0000 Subject: r1187: * Remove testing hack (actually check signatures on NTLM2). * Remove unreached counter increment * Print the correct NTLMSSP key. (This used to be commit b96700695479c19c7b2c190616420762409fdf0d) --- source4/libcli/auth/ntlmssp_sign.c | 7 ++----- 1 file changed, 2 insertions(+), 5 deletions(-) (limited to 'source4/libcli/auth') diff --git a/source4/libcli/auth/ntlmssp_sign.c b/source4/libcli/auth/ntlmssp_sign.c index dacfdb194f..d680da9495 100644 --- a/source4/libcli/auth/ntlmssp_sign.c +++ b/source4/libcli/auth/ntlmssp_sign.c @@ -233,7 +233,7 @@ NTSTATUS ntlmssp_check_packet(struct ntlmssp_state *ntlmssp_state, dump_data(5, sig->data, sig->length); DEBUG(0, ("NTLMSSP NTLM2 packet check failed due to invalid signature!\n")); - return NT_STATUS_OK; + return NT_STATUS_ACCESS_DENIED; } } else { if (local_sig.length != sig->length || @@ -346,9 +346,6 @@ NTSTATUS ntlmssp_unseal_packet(struct ntlmssp_state *ntlmssp_state, dump_data_pw("ntlmssp clear data\n", data, length); return ntlmssp_check_packet(ntlmssp_state, sig_mem_ctx, data, length, sig); - - /* increment counter on recv */ - ntlmssp_state->ntlmssp_seq_num++; } /** @@ -439,7 +436,7 @@ NTSTATUS ntlmssp_sign_init(struct ntlmssp_state *ntlmssp_state) calc_ntlmv2_key(ntlmssp_state->recv_seal_key, weak_session_key, recv_seal_const); dump_data_pw("NTLMSSP recv seal key:\n", - ntlmssp_state->recv_sign_key, + ntlmssp_state->recv_seal_key, sizeof(ntlmssp_state->recv_seal_key)); calc_hash(ntlmssp_state->recv_seal_hash, ntlmssp_state->recv_seal_key, -- cgit