summaryrefslogtreecommitdiff
path: root/source3/smbd
diff options
context:
space:
mode:
authorStefan Metzmacher <metze@samba.org>2010-03-18 15:36:19 +0100
committerStefan Metzmacher <metze@samba.org>2010-03-22 17:15:12 +0100
commitb2c107ffbcd067ccc42f81a2d0969f7f88b63ae7 (patch)
tree3da028016101177e4d9403686fcfe8dc77e2eac3 /source3/smbd
parent1e7086e5ce0924687d657de583adb63a9f0c1bfb (diff)
downloadsamba-b2c107ffbcd067ccc42f81a2d0969f7f88b63ae7.tar.gz
samba-b2c107ffbcd067ccc42f81a2d0969f7f88b63ae7.tar.bz2
samba-b2c107ffbcd067ccc42f81a2d0969f7f88b63ae7.zip
s3:smbd: pass down trusted_channel via receive_smb_talloc()
metze
Diffstat (limited to 'source3/smbd')
-rw-r--r--source3/smbd/process.c8
1 files changed, 5 insertions, 3 deletions
diff --git a/source3/smbd/process.c b/source3/smbd/process.c
index e1e4e77634..376db2340b 100644
--- a/source3/smbd/process.c
+++ b/source3/smbd/process.c
@@ -349,7 +349,8 @@ static NTSTATUS receive_smb_talloc(TALLOC_CTX *mem_ctx, int fd,
char **buffer, unsigned int timeout,
size_t *p_unread, bool *p_encrypted,
size_t *p_len,
- uint32_t *seqnum)
+ uint32_t *seqnum,
+ bool trusted_channel)
{
size_t len = 0;
NTSTATUS status;
@@ -374,7 +375,7 @@ static NTSTATUS receive_smb_talloc(TALLOC_CTX *mem_ctx, int fd,
}
/* Check the incoming SMB signature. */
- if (!srv_check_sign_mac(smbd_server_conn, *buffer, seqnum, false)) {
+ if (!srv_check_sign_mac(smbd_server_conn, *buffer, seqnum, trusted_channel)) {
DEBUG(0, ("receive_smb: SMB Signature verification failed on "
"incoming packet!\n"));
return NT_STATUS_INVALID_NETWORK_RESPONSE;
@@ -2138,7 +2139,8 @@ static void smbd_server_connection_read_handler(struct smbd_server_connection *c
0, /* timeout */
&unread_bytes,
&encrypted,
- &inbuf_len, &seqnum);
+ &inbuf_len, &seqnum,
+ false /* trusted channel */);
ok = smbd_unlock_socket(conn);
if (!ok) {
exit_server_cleanly("failed to unlock");