Fixed NLA for Negotiate and NTLM authentication (regression due to the recent addition of kerberos support)

This commit is contained in:
cedrozor 2017-11-21 16:36:47 +01:00
parent 785c42f463
commit 49f4b2a42e

View File

@ -1026,8 +1026,8 @@ SECURITY_STATUS nla_encrypt_public_key_echo(rdpNla* nla)
Buffers[0].pvBuffer = nla->pubKeyAuth.pvBuffer;
CopyMemory(Buffers[0].pvBuffer, nla->PublicKey.pvBuffer, Buffers[0].cbBuffer);
}
else if ((strcmp(nla->packageName, NEGO_SSP_NAME) != 0) ||
(strcmp(nla->packageName, NTLM_SSP_NAME) != 0))
else if ((strcmp(nla->packageName, NEGO_SSP_NAME) == 0) ||
(strcmp(nla->packageName, NTLM_SSP_NAME) == 0))
{
Buffers[0].BufferType = SECBUFFER_TOKEN; /* Signature */
Buffers[0].cbBuffer = nla->ContextSizes.cbSecurityTrailer;