summaryrefslogtreecommitdiff
path: root/source4/smb_server/smb/signing.c
diff options
context:
space:
mode:
authorStefan Metzmacher <metze@samba.org>2008-09-23 02:30:15 +0200
committerStefan Metzmacher <metze@samba.org>2008-09-23 11:30:04 +0200
commit171349bc21cc727685abb5ed836d62f4ae80b496 (patch)
tree7b45f49f18eb3e13167176862a97c551fa39731a /source4/smb_server/smb/signing.c
parentc01426ce731e2cf0b04ee3a0376e613f4970fb30 (diff)
downloadsamba-171349bc21cc727685abb5ed836d62f4ae80b496.tar.gz
samba-171349bc21cc727685abb5ed836d62f4ae80b496.tar.bz2
samba-171349bc21cc727685abb5ed836d62f4ae80b496.zip
s4:smb_server: remove the bogus smbsrv_signing_restart()
Real signing always starts with seqnumber 2, and once signing is on the session key never change anymore for the complete smb connection. metze
Diffstat (limited to 'source4/smb_server/smb/signing.c')
-rw-r--r--source4/smb_server/smb/signing.c24
1 files changed, 0 insertions, 24 deletions
diff --git a/source4/smb_server/smb/signing.c b/source4/smb_server/smb/signing.c
index 21dc99b165..0b5cf56fdb 100644
--- a/source4/smb_server/smb/signing.c
+++ b/source4/smb_server/smb/signing.c
@@ -75,30 +75,6 @@ bool smbsrv_setup_signing(struct smbsrv_connection *smb_conn,
&smb_conn->signing, session_key, response);
}
-void smbsrv_signing_restart(struct smbsrv_connection *smb_conn,
- DATA_BLOB *session_key,
- DATA_BLOB *response,
- bool authenticated_session)
-{
- if (!smb_conn->signing.seen_valid) {
- DEBUG(5, ("Client did not send a valid signature on "
- "SPNEGO session setup - ignored, expect good next time\n"));
- /* force things back on (most clients do not sign this packet)... */
- smbsrv_setup_signing(smb_conn, session_key, response);
- smb_conn->signing.next_seq_num = 2;
-
- /* If mandetory_signing is set, and this was an authenticated logon, then force on */
- if (smb_conn->signing.mandatory_signing && authenticated_session) {
- DEBUG(5, ("Configured for mandatory signing, 'good packet seen' forced on\n"));
- /* if this is mandatory, then
- * pretend we have seen a
- * valid packet, so we don't
- * turn it off */
- smb_conn->signing.seen_valid = true;
- }
- }
-}
-
bool smbsrv_init_signing(struct smbsrv_connection *smb_conn)
{
smb_conn->signing.mac_key = data_blob(NULL, 0);