summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorAndrew Bartlett <abartlet@samba.org>2004-01-05 12:36:21 +0000
committerAndrew Bartlett <abartlet@samba.org>2004-01-05 12:36:21 +0000
commit39311495de3bd0a902f730967f30176db97be05a (patch)
tree95e9f412ffbfcd252cc2260680fc39b1c5189ca7
parent7e5855dfd27ed9ec1fa924986f1ba02632a0d5a0 (diff)
downloadsamba-39311495de3bd0a902f730967f30176db97be05a.tar.gz
samba-39311495de3bd0a902f730967f30176db97be05a.tar.xz
samba-39311495de3bd0a902f730967f30176db97be05a.zip
Don't free the encrypted_session_key early - that causes the subsequent
test for a valid length to fail... This should fix 'security=server' and hosts-equiv failures picked up by the build farm. Andrew Bartlett
-rw-r--r--source/libsmb/ntlmssp.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/source/libsmb/ntlmssp.c b/source/libsmb/ntlmssp.c
index 85ae279758f..0ab51dc960a 100644
--- a/source/libsmb/ntlmssp.c
+++ b/source/libsmb/ntlmssp.c
@@ -708,7 +708,6 @@ static NTSTATUS ntlmssp_server_auth(struct ntlmssp_state *ntlmssp_state,
DEBUG(10,("ntlmssp_server_auth: Using unmodified lm session key.\n"));
dump_data_pw("unmodified session key:\n", session_key.data, session_key.length);
} else {
- data_blob_free(&encrypted_session_key);
DEBUG(10,("ntlmssp_server_auth: Failed to create unmodified session key.\n"));
session_key = data_blob(NULL, 0);
}
@@ -724,6 +723,7 @@ static NTSTATUS ntlmssp_server_auth(struct ntlmssp_state *ntlmssp_state,
} else if (!session_key.data || session_key.length != 16) {
DEBUG(5, ("server session key is invalid (len == %u), cannot do KEY_EXCH!\n",
session_key.length));
+ ntlmssp_state->session_key = session_key;
} else {
dump_data_pw("KEY_EXCH session key (enc):\n", encrypted_session_key.data, encrypted_session_key.length);
SamOEMhash(encrypted_session_key.data,