diff options
author | Stefan Metzmacher <metze@samba.org> | 2010-03-18 15:36:19 +0100 |
---|---|---|
committer | Stefan Metzmacher <metze@samba.org> | 2010-03-22 17:15:12 +0100 |
commit | b2c107ffbcd067ccc42f81a2d0969f7f88b63ae7 (patch) | |
tree | 3da028016101177e4d9403686fcfe8dc77e2eac3 /source3 | |
parent | 1e7086e5ce0924687d657de583adb63a9f0c1bfb (diff) | |
download | samba-b2c107ffbcd067ccc42f81a2d0969f7f88b63ae7.tar.gz samba-b2c107ffbcd067ccc42f81a2d0969f7f88b63ae7.tar.bz2 samba-b2c107ffbcd067ccc42f81a2d0969f7f88b63ae7.zip |
s3:smbd: pass down trusted_channel via receive_smb_talloc()
metze
Diffstat (limited to 'source3')
-rw-r--r-- | source3/smbd/process.c | 8 |
1 files changed, 5 insertions, 3 deletions
diff --git a/source3/smbd/process.c b/source3/smbd/process.c index e1e4e77634..376db2340b 100644 --- a/source3/smbd/process.c +++ b/source3/smbd/process.c @@ -349,7 +349,8 @@ static NTSTATUS receive_smb_talloc(TALLOC_CTX *mem_ctx, int fd, char **buffer, unsigned int timeout, size_t *p_unread, bool *p_encrypted, size_t *p_len, - uint32_t *seqnum) + uint32_t *seqnum, + bool trusted_channel) { size_t len = 0; NTSTATUS status; @@ -374,7 +375,7 @@ static NTSTATUS receive_smb_talloc(TALLOC_CTX *mem_ctx, int fd, } /* Check the incoming SMB signature. */ - if (!srv_check_sign_mac(smbd_server_conn, *buffer, seqnum, false)) { + if (!srv_check_sign_mac(smbd_server_conn, *buffer, seqnum, trusted_channel)) { DEBUG(0, ("receive_smb: SMB Signature verification failed on " "incoming packet!\n")); return NT_STATUS_INVALID_NETWORK_RESPONSE; @@ -2138,7 +2139,8 @@ static void smbd_server_connection_read_handler(struct smbd_server_connection *c 0, /* timeout */ &unread_bytes, &encrypted, - &inbuf_len, &seqnum); + &inbuf_len, &seqnum, + false /* trusted channel */); ok = smbd_unlock_socket(conn); if (!ok) { exit_server_cleanly("failed to unlock"); |