diff options
author | Andrew Bartlett <abartlet@samba.org> | 2004-01-05 12:36:21 +0000 |
---|---|---|
committer | Andrew Bartlett <abartlet@samba.org> | 2004-01-05 12:36:21 +0000 |
commit | 39311495de3bd0a902f730967f30176db97be05a (patch) | |
tree | 95e9f412ffbfcd252cc2260680fc39b1c5189ca7 | |
parent | 7e5855dfd27ed9ec1fa924986f1ba02632a0d5a0 (diff) | |
download | samba-39311495de3bd0a902f730967f30176db97be05a.tar.gz samba-39311495de3bd0a902f730967f30176db97be05a.tar.xz samba-39311495de3bd0a902f730967f30176db97be05a.zip |
Don't free the encrypted_session_key early - that causes the subsequent
test for a valid length to fail...
This should fix 'security=server' and hosts-equiv failures picked up by
the build farm.
Andrew Bartlett
-rw-r--r-- | source/libsmb/ntlmssp.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/source/libsmb/ntlmssp.c b/source/libsmb/ntlmssp.c index 85ae279758f..0ab51dc960a 100644 --- a/source/libsmb/ntlmssp.c +++ b/source/libsmb/ntlmssp.c @@ -708,7 +708,6 @@ static NTSTATUS ntlmssp_server_auth(struct ntlmssp_state *ntlmssp_state, DEBUG(10,("ntlmssp_server_auth: Using unmodified lm session key.\n")); dump_data_pw("unmodified session key:\n", session_key.data, session_key.length); } else { - data_blob_free(&encrypted_session_key); DEBUG(10,("ntlmssp_server_auth: Failed to create unmodified session key.\n")); session_key = data_blob(NULL, 0); } @@ -724,6 +723,7 @@ static NTSTATUS ntlmssp_server_auth(struct ntlmssp_state *ntlmssp_state, } else if (!session_key.data || session_key.length != 16) { DEBUG(5, ("server session key is invalid (len == %u), cannot do KEY_EXCH!\n", session_key.length)); + ntlmssp_state->session_key = session_key; } else { dump_data_pw("KEY_EXCH session key (enc):\n", encrypted_session_key.data, encrypted_session_key.length); SamOEMhash(encrypted_session_key.data, |