diff options
author | Andrew Bartlett <abartlet@samba.org> | 2003-07-17 01:34:05 +0000 |
---|---|---|
committer | Andrew Bartlett <abartlet@samba.org> | 2003-07-17 01:34:05 +0000 |
commit | 4c53bb6b90fec8e03c812a70a84889fcdf3b1081 (patch) | |
tree | 73ac96cdcbce6cc1e888a2ab826c4b6b9c4cccbf | |
parent | 583fc850781148b15f8fe20d9567ca840fb722d2 (diff) | |
download | samba-4c53bb6b90fec8e03c812a70a84889fcdf3b1081.tar.gz samba-4c53bb6b90fec8e03c812a70a84889fcdf3b1081.tar.bz2 samba-4c53bb6b90fec8e03c812a70a84889fcdf3b1081.zip |
In the presense of RPC fragments, schannel is not strictly request/reply,
so the shared sequence number will not be strictly odd/even.
Andrew Bartlett
(This used to be commit 77c3e69aef545d3f9b7cec9efdc366cbeb0c745e)
-rw-r--r-- | source3/rpc_client/cli_pipe.c | 5 | ||||
-rw-r--r-- | source3/rpc_server/srv_pipe.c | 5 |
2 files changed, 0 insertions, 10 deletions
diff --git a/source3/rpc_client/cli_pipe.c b/source3/rpc_client/cli_pipe.c index d6307ddb46..01b4c83235 100644 --- a/source3/rpc_client/cli_pipe.c +++ b/source3/rpc_client/cli_pipe.c @@ -1021,11 +1021,6 @@ BOOL rpc_api_pipe_req(struct cli_state *cli, uint8 op_num, static const uchar netsec_sig[8] = NETSEC_SIGNATURE; static const uchar nullbytes[8] = { 0,0,0,0,0,0,0,0 }; size_t parse_offset_marker; - if ((cli->auth_info.seq_num & 1) != 0) { - DEBUG(0,("SCHANNEL ERROR: seq_num must be even in client (seq_num=%d)\n", - cli->auth_info.seq_num)); - } - DEBUG(10,("SCHANNEL seq_num=%d\n", cli->auth_info.seq_num)); init_rpc_auth_netsec_chk(&verf, netsec_sig, nullbytes, diff --git a/source3/rpc_server/srv_pipe.c b/source3/rpc_server/srv_pipe.c index 9a63ebc7a3..acc62880d0 100644 --- a/source3/rpc_server/srv_pipe.c +++ b/source3/rpc_server/srv_pipe.c @@ -277,11 +277,6 @@ BOOL create_next_pdu(pipes_struct *p) prs_init(&rverf, 0, p->mem_ctx, MARSHALL); prs_init(&rauth, 0, p->mem_ctx, MARSHALL); - if ((p->netsec_auth.seq_num & 1) == 0) { - DEBUG(0,("SCHANNEL ERROR: seq_num must be odd in server! (seq_num=%d)\n", - p->netsec_auth.seq_num)); - } - init_rpc_auth_netsec_chk(&verf, netsec_sig, nullbytes, nullbytes, nullbytes); netsec_encode(&p->netsec_auth, |