summaryrefslogtreecommitdiffstats
path: root/source/python/py_winbind.c
diff options
context:
space:
mode:
authorTim Potter <tpot@samba.org>2002-11-22 06:51:14 +0000
committerTim Potter <tpot@samba.org>2002-11-22 06:51:14 +0000
commit6f1d48555f53ea3b32a7b8a6cf0fc2e148c311b7 (patch)
tree8bc7e30d866549d32143b4ea49d3e50baaff08f2 /source/python/py_winbind.c
parent9e871cc256a70bc64e59630bd31c890cc231368e (diff)
downloadsamba-6f1d48555f53ea3b32a7b8a6cf0fc2e148c311b7.tar.gz
samba-6f1d48555f53ea3b32a7b8a6cf0fc2e148c311b7.tar.xz
samba-6f1d48555f53ea3b32a7b8a6cf0fc2e148c311b7.zip
Added some extra code to test absence/presence of LM and NT passwords.
Diffstat (limited to 'source/python/py_winbind.c')
-rw-r--r--source/python/py_winbind.c25
1 files changed, 17 insertions, 8 deletions
diff --git a/source/python/py_winbind.c b/source/python/py_winbind.c
index ef6bc062334..783ac544390 100644
--- a/source/python/py_winbind.c
+++ b/source/python/py_winbind.c
@@ -412,13 +412,18 @@ static PyObject *py_auth_plaintext(PyObject *self, PyObject *args)
/* Challenge/response authentication */
-static PyObject *py_auth_crap(PyObject *self, PyObject *args)
+static PyObject *py_auth_crap(PyObject *self, PyObject *args, PyObject *kw)
{
+ static char *kwlist[] =
+ {"username", "password", "use_lm_hash", "use_nt_hash", NULL };
struct winbindd_request request;
struct winbindd_response response;
char *username, *password;
+ int use_lm_hash = 1, use_nt_hash = 1;
- if (!PyArg_ParseTuple(args, "ss", &username, &password))
+ if (!PyArg_ParseTupleAndKeywords(
+ args, kw, "ss|ii", kwlist, &username, &password,
+ &use_lm_hash, &use_nt_hash))
return NULL;
ZERO_STRUCT(request);
@@ -428,13 +433,17 @@ static PyObject *py_auth_crap(PyObject *self, PyObject *args)
generate_random_buffer(request.data.auth_crap.chal, 8, False);
- SMBencrypt((uchar *)password, request.data.auth_crap.chal,
- (uchar *)request.data.auth_crap.lm_resp);
- SMBNTencrypt((uchar *)password, request.data.auth_crap.chal,
- (uchar *)request.data.auth_crap.nt_resp);
+ if (use_lm_hash) {
+ SMBencrypt((uchar *)password, request.data.auth_crap.chal,
+ (uchar *)request.data.auth_crap.lm_resp);
+ request.data.auth_crap.lm_resp_len = 24;
+ }
- request.data.auth_crap.lm_resp_len = 24;
- request.data.auth_crap.nt_resp_len = 24;
+ if (use_nt_hash) {
+ SMBNTencrypt((uchar *)password, request.data.auth_crap.chal,
+ (uchar *)request.data.auth_crap.nt_resp);
+ request.data.auth_crap.nt_resp_len = 24;
+ }
if (winbindd_request(WINBINDD_PAM_AUTH_CRAP, &request, &response)
!= NSS_STATUS_SUCCESS) {