Make sure the user's manager secret exists, even if it is blank.
(closes issue #11749) Reported by: srt git-svn-id: http://svn.digium.com/svn/asterisk/trunk@98830 f38db490-d61c-443f-a65b-d21fe96a405b
This commit is contained in:
parent
2cdb1993af
commit
b562c95259
|
@ -997,7 +997,7 @@ static int authenticate(struct mansession *s, const struct message *m)
|
||||||
ast_log(LOG_NOTICE, "%s failed to pass IP ACL as '%s'\n", ast_inet_ntoa(s->sin.sin_addr), username);
|
ast_log(LOG_NOTICE, "%s failed to pass IP ACL as '%s'\n", ast_inet_ntoa(s->sin.sin_addr), username);
|
||||||
} else if (!strcasecmp(astman_get_header(m, "AuthType"), "MD5")) {
|
} else if (!strcasecmp(astman_get_header(m, "AuthType"), "MD5")) {
|
||||||
const char *key = astman_get_header(m, "Key");
|
const char *key = astman_get_header(m, "Key");
|
||||||
if (!ast_strlen_zero(key) && !ast_strlen_zero(s->challenge)) {
|
if (!ast_strlen_zero(key) && !ast_strlen_zero(s->challenge) && user->secret) {
|
||||||
int x;
|
int x;
|
||||||
int len = 0;
|
int len = 0;
|
||||||
char md5key[256] = "";
|
char md5key[256] = "";
|
||||||
|
|
Reference in New Issue