summaryrefslogtreecommitdiffstats
path: root/source/libsmb
diff options
context:
space:
mode:
authorVolker Lendecke <vlendec@samba.org>2006-10-02 12:54:49 +0000
committerGerald (Jerry) Carter <jerry@samba.org>2007-10-10 12:15:05 -0500
commitaf85d8ec02b36b765ceadf0a342c7eda2410034b (patch)
tree505b95c5d3702a6feb043a035ad165fe658e2a45 /source/libsmb
parente8dd73f79656d9ef6faf9fceb84dc8702ac8e10a (diff)
downloadsamba-af85d8ec02b36b765ceadf0a342c7eda2410034b.tar.gz
samba-af85d8ec02b36b765ceadf0a342c7eda2410034b.tar.xz
samba-af85d8ec02b36b765ceadf0a342c7eda2410034b.zip
r19041: Make us connect to Vista RC1. Apparently metze had done the same patch some
weeks ago. We have some work before us, when in AD mode Vista sends "not_defined_in_RFC4178@please_ignore" as the principal..... Volker
Diffstat (limited to 'source/libsmb')
-rw-r--r--source/libsmb/cliconnect.c15
-rw-r--r--source/libsmb/clispnego.c17
2 files changed, 24 insertions, 8 deletions
diff --git a/source/libsmb/cliconnect.c b/source/libsmb/cliconnect.c
index 6e6f7a5ebe9..983d9012f04 100644
--- a/source/libsmb/cliconnect.c
+++ b/source/libsmb/cliconnect.c
@@ -762,7 +762,20 @@ ADS_STATUS cli_session_setup_spnego(struct cli_state *cli, const char *user,
#endif
free(OIDs[i]);
}
- DEBUG(3,("got principal=%s\n", principal));
+
+ DEBUG(3,("got principal=%s\n", principal ? principal : "<null>"));
+
+ if (got_kerberos_mechanism && (principal == NULL)) {
+ /*
+ * It is WRONG to depend on the principal sent in the negprot
+ * reply, but right now we do it. So for safety (don't
+ * segfault later) disable Kerberos when no principal was
+ * sent. -- VL
+ */
+ DEBUG(1, ("Kerberos mech was offered, but no principal was sent\n"));
+ DEBUGADD(1, ("Disabling Kerberos\n"));
+ cli->use_kerberos = False;
+ }
fstrcpy(cli->user_name, user);
diff --git a/source/libsmb/clispnego.c b/source/libsmb/clispnego.c
index fedf7e5c6eb..a01c009b6e3 100644
--- a/source/libsmb/clispnego.c
+++ b/source/libsmb/clispnego.c
@@ -149,13 +149,16 @@ BOOL spnego_parse_negTokenInit(DATA_BLOB blob,
asn1_end_tag(&data);
asn1_end_tag(&data);
- asn1_start_tag(&data, ASN1_CONTEXT(3));
- asn1_start_tag(&data, ASN1_SEQUENCE(0));
- asn1_start_tag(&data, ASN1_CONTEXT(0));
- asn1_read_GeneralString(&data,principal);
- asn1_end_tag(&data);
- asn1_end_tag(&data);
- asn1_end_tag(&data);
+ *principal = NULL;
+ if (asn1_tag_remaining(&data) > 0) {
+ asn1_start_tag(&data, ASN1_CONTEXT(3));
+ asn1_start_tag(&data, ASN1_SEQUENCE(0));
+ asn1_start_tag(&data, ASN1_CONTEXT(0));
+ asn1_read_GeneralString(&data,principal);
+ asn1_end_tag(&data);
+ asn1_end_tag(&data);
+ asn1_end_tag(&data);
+ }
asn1_end_tag(&data);
asn1_end_tag(&data);