summaryrefslogtreecommitdiffstats
path: root/source/libsmb/passchange.c
diff options
context:
space:
mode:
authorAndrew Bartlett <abartlet@samba.org>2004-07-24 23:57:07 +0000
committerAndrew Bartlett <abartlet@samba.org>2004-07-24 23:57:07 +0000
commitce8f6dd63a4c00330f0ece37e5bd7cfbc81efdc1 (patch)
treea0ff6b1c9b1bf98de86f6304926eaa69eb288153 /source/libsmb/passchange.c
parent6d73951e4e8ccc5ee2ce4c54482b7a4dffd77d2e (diff)
downloadsamba-ce8f6dd63a4c00330f0ece37e5bd7cfbc81efdc1.tar.gz
samba-ce8f6dd63a4c00330f0ece37e5bd7cfbc81efdc1.tar.xz
samba-ce8f6dd63a4c00330f0ece37e5bd7cfbc81efdc1.zip
r1581: 'NULL' NTLMSSP is both a pain to get right, and compleatly and utterly
pointless. With a well-known session key, we may as well put the password change directly on the wire, with it's own 'crypted with old password' as the protection. This should fix some 'long password change' issues, against Samba in particular. Andrew Bartlett
Diffstat (limited to 'source/libsmb/passchange.c')
-rw-r--r--source/libsmb/passchange.c2
1 files changed, 2 insertions, 0 deletions
diff --git a/source/libsmb/passchange.c b/source/libsmb/passchange.c
index 9f46c131fee..8bce9c86a1e 100644
--- a/source/libsmb/passchange.c
+++ b/source/libsmb/passchange.c
@@ -144,6 +144,8 @@ BOOL remote_password_change(const char *remote_machine, const char *user_name,
init_creds(&creds, "", "", NULL);
cli_init_creds(&cli, &creds);
+ cli.pipe_auth_flags = 0;
+
result = NT_STATUS_UNSUCCESSFUL;
/* OK, this is ugly, but... */