diff options
author | Simo Sorce <idra@samba.org> | 2010-07-30 13:12:35 -0400 |
---|---|---|
committer | Simo Sorce <idra@samba.org> | 2010-07-30 14:55:28 -0400 |
commit | 4c64e4d4af3403559b370381d7f14a83a39adfa7 (patch) | |
tree | 4a4cd97dd4250297f219fd5b041c062ddf20f355 /source3/librpc | |
parent | 3469fbc5e4098e798a03d14fece24fde2b60d9b9 (diff) | |
download | samba-4c64e4d4af3403559b370381d7f14a83a39adfa7.tar.gz samba-4c64e4d4af3403559b370381d7f14a83a39adfa7.tar.bz2 samba-4c64e4d4af3403559b370381d7f14a83a39adfa7.zip |
s3-dceprc: Improve dcerpc_guess_sizes() interface
Make it possible to pass in the NDR padding size so that theoretically
client and server code can decide to use a different alignment.
Pass in the header length as a parameter so that this function can be used for
different type of packets.
Make sure padding size will not make the fragment exceed the maximum length.
Calculate padding taking in account the header length.
Diffstat (limited to 'source3/librpc')
-rw-r--r-- | source3/librpc/rpc/dcerpc.h | 3 | ||||
-rw-r--r-- | source3/librpc/rpc/dcerpc_helpers.c | 43 |
2 files changed, 27 insertions, 19 deletions
diff --git a/source3/librpc/rpc/dcerpc.h b/source3/librpc/rpc/dcerpc.h index fd80dbeb04..f07403ae44 100644 --- a/source3/librpc/rpc/dcerpc.h +++ b/source3/librpc/rpc/dcerpc.h @@ -140,7 +140,8 @@ NTSTATUS dcerpc_pull_dcerpc_auth(TALLOC_CTX *mem_ctx, struct dcerpc_auth *r, bool bigendian); NTSTATUS dcerpc_guess_sizes(struct pipe_auth_data *auth, - size_t data_left, size_t max_xmit_frag, + size_t header_len, size_t data_left, + size_t max_xmit_frag, size_t pad_alignment, size_t *data_to_send, size_t *frag_len, size_t *auth_len, size_t *pad_len); NTSTATUS dcerpc_add_auth_footer(struct pipe_auth_data *auth, diff --git a/source3/librpc/rpc/dcerpc_helpers.c b/source3/librpc/rpc/dcerpc_helpers.c index e089e9cbf0..84f7ce4c82 100644 --- a/source3/librpc/rpc/dcerpc_helpers.c +++ b/source3/librpc/rpc/dcerpc_helpers.c @@ -246,20 +246,23 @@ NTSTATUS dcerpc_pull_dcerpc_auth(TALLOC_CTX *mem_ctx, * auth token and pad lengths. * * @param auth The pipe_auth_data structure for this pipe. +* @param header_len The length of the packet header * @param data_left The data left in the send buffer -* @param data_to_send The max data we will send in the pdu -* @param frag_len The total length of the fragment -* @param auth_len The length of the auth trailer -* @param pad_len The padding to be applied +* @param max_xmit_frag The max fragment size. +* @param pad_alignment The NDR padding size. +* @param data_to_send [out] The max data we will send in the pdu +* @param frag_len [out] The total length of the fragment +* @param auth_len [out] The length of the auth trailer +* @param pad_len [out] The padding to be applied * * @return A NT Error status code. */ NTSTATUS dcerpc_guess_sizes(struct pipe_auth_data *auth, - size_t data_left, size_t max_xmit_frag, + size_t header_len, size_t data_left, + size_t max_xmit_frag, size_t pad_alignment, size_t *data_to_send, size_t *frag_len, size_t *auth_len, size_t *pad_len) { - size_t data_space; size_t max_len; size_t mod_len; struct gse_context *gse_ctx; @@ -273,11 +276,11 @@ NTSTATUS dcerpc_guess_sizes(struct pipe_auth_data *auth, case DCERPC_AUTH_LEVEL_NONE: case DCERPC_AUTH_LEVEL_CONNECT: case DCERPC_AUTH_LEVEL_PACKET: - data_space = max_xmit_frag - DCERPC_REQUEST_LENGTH; - *data_to_send = MIN(data_space, data_left); + max_len = max_xmit_frag - header_len; + *data_to_send = MIN(max_len, data_left); *pad_len = 0; *auth_len = 0; - *frag_len = DCERPC_REQUEST_LENGTH + *data_to_send; + *frag_len = header_len + *data_to_send; return NT_STATUS_OK; case DCERPC_AUTH_LEVEL_PRIVACY: @@ -294,9 +297,7 @@ NTSTATUS dcerpc_guess_sizes(struct pipe_auth_data *auth, /* Sign/seal case, calculate auth and pad lengths */ - max_len = max_xmit_frag - - DCERPC_REQUEST_LENGTH - - DCERPC_AUTH_TRAILER_LENGTH; + max_len = max_xmit_frag - header_len - DCERPC_AUTH_TRAILER_LENGTH; /* Treat the same for all authenticated rpc requests. */ switch (auth->auth_type) { @@ -349,17 +350,23 @@ NTSTATUS dcerpc_guess_sizes(struct pipe_auth_data *auth, return NT_STATUS_INVALID_PARAMETER; } - data_space = max_len - *auth_len; + max_len -= *auth_len; - *data_to_send = MIN(data_space, data_left); - mod_len = *data_to_send % CLIENT_NDR_PADDING_SIZE; + *data_to_send = MIN(max_len, data_left); + + mod_len = (header_len + *data_to_send) % pad_alignment; if (mod_len) { - *pad_len = CLIENT_NDR_PADDING_SIZE - mod_len; + *pad_len = pad_alignment - mod_len; } else { *pad_len = 0; } - *frag_len = DCERPC_REQUEST_LENGTH + *data_to_send + *pad_len - + DCERPC_AUTH_TRAILER_LENGTH + *auth_len; + + if (*data_to_send + *pad_len > max_len) { + *data_to_send -= pad_alignment; + } + + *frag_len = header_len + *data_to_send + *pad_len + + DCERPC_AUTH_TRAILER_LENGTH + *auth_len; return NT_STATUS_OK; } |