summaryrefslogtreecommitdiff
path: root/source3/smbd/reply.c
diff options
context:
space:
mode:
authorStefan Metzmacher <metze@samba.org>2012-05-03 15:52:41 +0200
committerStefan Metzmacher <metze@samba.org>2012-05-23 12:47:37 +0200
commit37866df4ee51e2bf62d26be9d87a22d94106a95a (patch)
tree22b84f5f4d14e733f099fdd8ea84ac38b4aa146a /source3/smbd/reply.c
parent42b2026a83983ad17bfd1651f2256b38e9fe8dad (diff)
downloadsamba-37866df4ee51e2bf62d26be9d87a22d94106a95a.tar.gz
samba-37866df4ee51e2bf62d26be9d87a22d94106a95a.tar.bz2
samba-37866df4ee51e2bf62d26be9d87a22d94106a95a.zip
s3:smbd: use reply_force_doserror(req, ERRSRV, ERRbaduid) on SMBulogoff
We don't support security = share anymore, so we should always have a valid session. Found by the raw.context test. metze Autobuild-User: Stefan Metzmacher <metze@samba.org> Autobuild-Date: Wed May 23 12:47:37 CEST 2012 on sn-devel-104
Diffstat (limited to 'source3/smbd/reply.c')
-rw-r--r--source3/smbd/reply.c5
1 files changed, 5 insertions, 0 deletions
diff --git a/source3/smbd/reply.c b/source3/smbd/reply.c
index b93052ade2..d01ff905a3 100644
--- a/source3/smbd/reply.c
+++ b/source3/smbd/reply.c
@@ -2085,6 +2085,11 @@ void reply_ulogoffX(struct smb_request *req)
if(vuser == NULL) {
DEBUG(3,("ulogoff, vuser id %d does not map to user.\n",
req->vuid));
+
+ req->vuid = UID_FIELD_INVALID;
+ reply_force_doserror(req, ERRSRV, ERRbaduid);
+ END_PROFILE(SMBulogoffX);
+ return;
}
/* in user level security we are supposed to close any files