s3:libsmb: unused ntlmssp.c Everything uses the top level ntlmssp code via gensec now. Signed-off-by: Stefan Metzmacher <metze@samba.org> Reviewed-by: Günther Deschner <gd@samba.org> Reviewed-by: Andrew Bartlett <abartlet@samba.org>
s3: lib: ntlmssp: If NTLMSSP_NEGOTIATE_TARGET_INFO isn't set, cope with servers that don't send the 2 unused fields. Packet traces showing such servers are found in the bug this fixes: https://bugzilla.samba.org/show_bug.cgi?id=10016 Signed-off-by: Jeremy Allison <jra@samba.org> Reviewed-by: Michael Adam <obnox@samba.org> Autobuild-User(master): Michael Adam <obnox@samba.org> Autobuild-Date(master): Thu Mar 19 12:05:56 CET 2015 on sn-devel-104
s3-libsmb: Duplicate the memory before we free it. BUG: https://bugzilla.samba.org/show_bug.cgi?id=10279 Signed-off-by: Andreas Schneider <asn@samba.org> Reviewed-by: Guenther Deschner <gd@samba.org> Autobuild-User(master): Andreas Schneider <asn@cryptomilk.org> Autobuild-Date(master): Tue Dec 2 21:46:53 CET 2014 on sn-devel-104
s3-libsmb: Set the netbios_name in use_ccache case too. If we do not set the netbios_name we are not able to connect to a Windows DC. BUG: https://bugzilla.samba.org/show_bug.cgi?id=10279 Signed-off-by: Andreas Schneider <asn@samba.org> Reviewed-by: Guenther Deschner <gd@samba.org>
build: Build with system md5.h on OpenIndiana This changes (again...) our system md5 detection to cope with how OpenIndiana does md5. I'm becoming increasingly convinced this isn't worth our while (we should have just done samba_md5...), but for now this change seems to work on FreeBSD, OpenIndiana and Linux with libbsd. This needs us to rename struct MD5Context -> MD5_CTX, but we provide a config.h define to rename the type bad if MD5_CTX does not exist (it does however exist in the md5.h from libbsd). Andrew Bartlett Signed-off-by: Andrew Bartlett <abartlet@samba.org> Reviewed-by: Jeremy Allison <jra@samba.org> Autobuild-User(master): Jeremy Allison <jra@samba.org> Autobuild-Date(master): Wed Jun 19 21:32:36 CEST 2013 on sn-devel-104
source3/libsmb/ntlmssp.c: Fix typo. Signed-off-by: Karolin Seeger <kseeger@samba.org> Reviewed-by: Jeremy Allison <jra@samba.org>
S3: Add ntlmssp_set_password_hash Signed-off-by: Stefan Metzmacher <metze@samba.org>
libsmb: Actually use an introduced variable Autobuild-User: Volker Lendecke <vl@samba.org> Autobuild-Date: Wed Apr 18 13:39:53 CEST 2012 on sn-devel-104
s3:libsmb/ntlmssp: improve anonymous logins smbtorture3 (and maybe others) use fstrings for 'user' and 'password', so we need to check for empty strings. metze
s3:libsmb/ntlmssp: add ntlmssp_is_anonymous() metze
s3:libsmb/ntlmssp: remove some indentation in ntlmssp_set_password() metze
Revert "s3:libsmb/ntlmssp: an empty string should mean no password" This reverts commit 92483eee254ef6844fe88abe1e64f67033a1ea2d.
s3:libsmb/ntlmssp: an empty string should mean no password metze
s3-libsmb: Remove unused ntlmssp_server_start()
auth: Move the rest of the source4 gensec_ntlmssp code to the top level The ntlmssp_server code will be in common shortly, and aside from a symbol name or two, moving the client code causes no harm and makes less mess. We will also get the client code in common very soon. Andrew Bartlett Signed-off-by: Stefan Metzmacher <metze@samba.org>
s3-ntlmssp Remove unused ntlmssp_set_hashes() and do not set an invalid LM hash When E_deshash() returns false, it indicates that the password is either > 14 chars in length, or could not be represented as an LM hash value for some other reason. In this case, we should not regard the LM hash being missing as an error or a no-password situation. Andrew Bartlett Signed-off-by: Stefan Metzmacher <metze@samba.org> Autobuild-User: Stefan Metzmacher <metze@samba.org> Autobuild-Date: Fri Jan 6 14:59:13 CET 2012 on sn-devel-104
ntlmssp: merge initial packet implementations Signed-off-by: Stefan Metzmacher <metze@samba.org>
ntlmssp: Move ntlmssp code to auth/ntlmssp This brings in the code from both libcli/auth and source4/auth/ntlmssp. Andrew Bartlett Signed-off-by: Stefan Metzmacher <metze@samba.org>
s3-ntlmssp Remove calls to auth_ntlmssp_and_flags from the server This is changed so that the callers ask for the additional flags that they need, starting with no additional flags. This helps to create a proper abstraction layer in ntlmssp_wrap/auth_ntlmssp. Andrew Bartlett Signed-off-by: Andrew Tridgell <tridge@samba.org>
s3-ntlmssp NTLMSSP sealing implies signing, so set both flags Signed-off-by: Andrew Tridgell <tridge@samba.org>