diff options
-rw-r--r-- | source3/include/rpc_dce.h | 2 | ||||
-rw-r--r-- | source3/rpc_client/cli_pipe.c | 2 |
2 files changed, 2 insertions, 2 deletions
diff --git a/source3/include/rpc_dce.h b/source3/include/rpc_dce.h index 3dfbc1672e..cd65ac8656 100644 --- a/source3/include/rpc_dce.h +++ b/source3/include/rpc_dce.h @@ -92,7 +92,7 @@ enum schannel_direction { }; /* Maximum size of the signing data in a fragment. */ -#define RPC_MAX_SIGN_SIZE 0x20 /* 32 */ +#define RPC_MAX_SIGN_SIZE 0x38 /* 56 */ /* Maximum PDU fragment size. */ /* #define MAX_PDU_FRAG_LEN 0x1630 this is what wnt sets */ diff --git a/source3/rpc_client/cli_pipe.c b/source3/rpc_client/cli_pipe.c index 0f64719018..5af2c95811 100644 --- a/source3/rpc_client/cli_pipe.c +++ b/source3/rpc_client/cli_pipe.c @@ -681,7 +681,7 @@ static NTSTATUS cli_pipe_verify_schannel(struct rpc_pipe_client *cli, RPC_HDR *p return NT_STATUS_OK; } - if (auth_len != RPC_AUTH_SCHANNEL_SIGN_OR_SEAL_CHK_LEN) { + if (auth_len < RPC_AUTH_SCHANNEL_SIGN_OR_SEAL_CHK_LEN) { DEBUG(0,("cli_pipe_verify_schannel: auth_len %u.\n", (unsigned int)auth_len )); return NT_STATUS_INVALID_PARAMETER; } |