summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorVolker Lendecke <vl@samba.org>2008-02-12 23:16:37 +0100
committerVolker Lendecke <vl@samba.org>2008-02-28 13:12:34 +0100
commitb9f7dd2909487f8e306774ee0475f8b20331a866 (patch)
tree1edf4c275e56362c4c5f18855c5bb7d8051c7e61
parent4b5169f590425334d9ae3f2b7be2201e2e0b747e (diff)
downloadsamba-b9f7dd2909487f8e306774ee0475f8b20331a866.tar.gz
samba-b9f7dd2909487f8e306774ee0475f8b20331a866.tar.bz2
samba-b9f7dd2909487f8e306774ee0475f8b20331a866.zip
Add explicit buf arg to cli_check_sign_mac
(This used to be commit ffc1c8cc03e6bad40ed2be91392074b4f038a1bf)
-rw-r--r--source3/libsmb/cliconnect.c2
-rw-r--r--source3/libsmb/clientgen.c2
-rw-r--r--source3/libsmb/smb_signing.c4
3 files changed, 4 insertions, 4 deletions
diff --git a/source3/libsmb/cliconnect.c b/source3/libsmb/cliconnect.c
index 9c27d30166..912b841d5e 100644
--- a/source3/libsmb/cliconnect.c
+++ b/source3/libsmb/cliconnect.c
@@ -759,7 +759,7 @@ static NTSTATUS cli_session_setup_ntlmssp(struct cli_state *cli, const char *use
for checking the first reply from the server */
cli_calculate_sign_mac(cli, cli->outbuf);
- if (!cli_check_sign_mac(cli)) {
+ if (!cli_check_sign_mac(cli, cli->inbuf)) {
nt_status = NT_STATUS_ACCESS_DENIED;
}
}
diff --git a/source3/libsmb/clientgen.c b/source3/libsmb/clientgen.c
index 2fd304f135..ccd1cc67d5 100644
--- a/source3/libsmb/clientgen.c
+++ b/source3/libsmb/clientgen.c
@@ -164,7 +164,7 @@ bool cli_receive_smb(struct cli_state *cli)
return false;
}
- if (!cli_check_sign_mac(cli)) {
+ if (!cli_check_sign_mac(cli, cli->inbuf)) {
/*
* If we get a signature failure in sessionsetup, then
* the server sometimes just reflects the sent signature
diff --git a/source3/libsmb/smb_signing.c b/source3/libsmb/smb_signing.c
index eeaf28c3d1..bd6d97123d 100644
--- a/source3/libsmb/smb_signing.c
+++ b/source3/libsmb/smb_signing.c
@@ -584,9 +584,9 @@ void cli_calculate_sign_mac(struct cli_state *cli, char *buf)
* which had a bad checksum, True otherwise.
*/
-bool cli_check_sign_mac(struct cli_state *cli)
+bool cli_check_sign_mac(struct cli_state *cli, char *buf)
{
- if (!cli->sign_info.check_incoming_message(cli->inbuf, &cli->sign_info, True)) {
+ if (!cli->sign_info.check_incoming_message(buf, &cli->sign_info, True)) {
free_signing_context(&cli->sign_info);
return False;
}