The Samba-Bugzilla – Attachment 3592 Details for
Bug 5713
Windows 2000 (Admin Pack) MMC consoles don't work anymore
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
[patch]
New version of the previous patch
ldapNTLMSSP.patch (text/plain), 2.82 KB, created by
Matthias Dieter Wallnöfer
on 2008-09-17 09:43:25 UTC
(
hide
)
Description:
New version of the previous patch
Filename:
MIME Type:
Creator:
Matthias Dieter Wallnöfer
Created:
2008-09-17 09:43:25 UTC
Size:
2.82 KB
patch
obsolete
>diff --git a/source4/auth/ntlmssp/ntlmssp_server.c b/source4/auth/ntlmssp/ntlmssp_server.c >index 838596e..d36aea8 100644 >--- a/source4/auth/ntlmssp/ntlmssp_server.c >+++ b/source4/auth/ntlmssp/ntlmssp_server.c >@@ -25,7 +25,6 @@ > #include "auth/ntlmssp/ntlmssp.h" > #include "auth/ntlmssp/msrpc_parse.h" > #include "lib/crypto/crypto.h" >-#include "system/filesys.h" > #include "libcli/auth/libcli_auth.h" > #include "auth/credentials/credentials.h" > #include "auth/gensec/gensec.h" >@@ -125,8 +124,6 @@ NTSTATUS ntlmssp_server_negotiate(struct gensec_security *gensec_security, > { > struct gensec_ntlmssp_state *gensec_ntlmssp_state = (struct gensec_ntlmssp_state *)gensec_security->private_data; > DATA_BLOB struct_blob; >- char dnsname[MAXHOSTNAMELEN], dnsdomname[MAXHOSTNAMELEN]; >- const char *p; > uint32_t neg_flags = 0; > uint32_t ntlmssp_command, chal_flags; > const uint8_t *cryptkey; >@@ -183,25 +180,21 @@ NTSTATUS ntlmssp_server_negotiate(struct gensec_security *gensec_security, > gensec_ntlmssp_state->chal = data_blob_talloc(gensec_ntlmssp_state, cryptkey, 8); > gensec_ntlmssp_state->internal_chal = data_blob_talloc(gensec_ntlmssp_state, cryptkey, 8); > >- dnsname[0] = '\0'; >- if (gethostname(dnsname, sizeof(dnsname)) == -1) { >- DEBUG(0,("gethostname failed\n")); >- return NT_STATUS_UNSUCCESSFUL; >- } >- >- /* This should be a 'netbios domain -> DNS domain' mapping */ >- p = strchr(dnsname, '.'); >- if (p != NULL) { >- safe_strcpy(dnsdomname, p+1, sizeof(dnsdomname)); >- strlower_m(dnsdomname); >- } else { >- dnsdomname[0] = '\0'; >- } >- > /* This creates the 'blob' of names that appears at the end of the packet */ >- if (chal_flags & NTLMSSP_CHAL_TARGET_INFO) >- { >+ if (chal_flags & NTLMSSP_CHAL_TARGET_INFO) { >+ char dnsname[MAXHOSTNAMELEN], dnsdomname[MAXHOSTNAMELEN]; > const char *target_name_dns = ""; >+ >+ /* Find out the DNS host name */ >+ safe_strcpy(dnsname, gensec_ntlmssp_state->server_name, sizeof(dnsname) - 1); >+ safe_strcat(dnsname, ".", sizeof(dnsname) - 1); >+ safe_strcat(dnsname, lp_realm(gensec_security->lp_ctx), sizeof(dnsname) - 1); >+ strlower_m(dnsname); >+ >+ /* Find out the DNS domain name */ >+ safe_strcpy(dnsdomname, lp_realm(gensec_security->lp_ctx), sizeof(dnsdomname) - 1); >+ strlower_m(dnsdomname); >+ > if (chal_flags |= NTLMSSP_TARGET_TYPE_DOMAIN) { > target_name_dns = dnsdomname; > } else if (chal_flags |= NTLMSSP_TARGET_TYPE_SERVER) { >diff --git a/source4/ldap_server/ldap_bind.c b/source4/ldap_server/ldap_bind.c >index f37ef31..8357251 100644 >--- a/source4/ldap_server/ldap_bind.c >+++ b/source4/ldap_server/ldap_bind.c >@@ -180,9 +180,6 @@ static NTSTATUS ldapsrv_BindSASL(struct ldapsrv_call *call) > input = *req->creds.SASL.secblob; > } > >- resp->SASL.secblob = talloc(reply, DATA_BLOB); >- NT_STATUS_HAVE_NO_MEMORY(resp->SASL.secblob); >- > status = gensec_update(conn->gensec, reply, > input, &output); >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 5713
:
3505
|
3532
|
3533
|
3590
|
3592
|
3593
|
3594
|
3602