r3104: My Win2k3 server, with current updates, still sends the LM key for level 6.
authorAndrew Bartlett <abartlet@samba.org>
Thu, 21 Oct 2004 01:55:46 +0000 (01:55 +0000)
committerGerald (Jerry) Carter <jerry@samba.org>
Wed, 10 Oct 2007 18:02:21 +0000 (13:02 -0500)
I'm not quite sure what's going on here, but adjust expected values
till I can find out how to reproduce this the other way...

Andrew Bartlett
(This used to be commit 3f0f6b38f2401e3654f73f46a22d5c10fbacaeca)

source4/torture/rpc/netlogon.c

index b0509659e72b1caa1962d72cab724c0ea9ca748a..881d413b5c025cb35b998e32c163cf6a14280f1c 100644 (file)
@@ -442,7 +442,7 @@ static BOOL test_lm_ntlm_broken(struct samlogon_state *samlogon_state, enum ntlm
        ZERO_STRUCT(user_session_key);
 
        lm_good = SMBencrypt(samlogon_state->password, samlogon_state->chall.data, lm_response.data);
-       if (samlogon_state->r.in.logon_level == 6 || !lm_good) {
+       if (!lm_good) {
                ZERO_STRUCT(lm_hash);
        } else {
                E_deshash(samlogon_state->password, lm_hash);