Changeset 312 for branches/samba-3.0/source/rpc_server
- Timestamp:
- Aug 5, 2009, 6:34:45 PM (16 years ago)
- Location:
- branches/samba-3.0/source/rpc_server
- Files:
-
- 2 edited
Legend:
- Unmodified
- Added
- Removed
-
branches/samba-3.0/source/rpc_server/srv_netlog_nt.c
r134 r312 432 432 DOM_CHAL srv_chal_out; 433 433 434 /* According to Microsoft (see bugid #6099) 435 * Windows 7 looks at the negotiate_flags 436 * returned in this structure *even if the 437 * call fails with access denied ! So in order 438 * to allow Win7 to connect to a Samba NT style 439 * PDC we set the flags before we know if it's 440 * an error or not. 441 */ 442 443 srv_flgs.neg_flags = 0x000001ff; 444 445 if (lp_server_schannel() != False) { 446 srv_flgs.neg_flags |= NETLOGON_NEG_SCHANNEL; 447 } 448 449 /* set up the initial LSA AUTH 2 response */ 450 ZERO_STRUCT(srv_chal_out); 451 init_net_r_auth_2(r_u, &srv_chal_out, &srv_flgs, NT_STATUS_OK); 452 434 453 rpcstr_pull(mach_acct, q_u->clnt_id.uni_acct_name.buffer,sizeof(fstring), 435 454 q_u->clnt_id.uni_acct_name.uni_str_len*2,0); … … 480 499 } 481 500 482 srv_flgs.neg_flags = 0x000001ff; 483 484 if (lp_server_schannel() != False) { 485 srv_flgs.neg_flags |= NETLOGON_NEG_SCHANNEL; 486 } 487 488 /* set up the LSA AUTH 2 response */ 501 /* set up the real LSA AUTH 2 response */ 489 502 init_net_r_auth_2(r_u, &srv_chal_out, &srv_flgs, NT_STATUS_OK); 490 503 -
branches/samba-3.0/source/rpc_server/srv_pipe.c
r1 r312 2063 2063 auth_len = p->hdr.auth_len; 2064 2064 2065 if (auth_len != RPC_AUTH_SCHANNEL_SIGN_OR_SEAL_CHK_LEN) { 2065 if (auth_len < RPC_AUTH_SCHANNEL_SIGN_OR_SEAL_CHK_LEN || 2066 auth_len > RPC_HEADER_LEN + 2067 RPC_HDR_REQ_LEN + 2068 RPC_HDR_AUTH_LEN + 2069 auth_len) { 2066 2070 DEBUG(0,("Incorrect auth_len %u.\n", (unsigned int)auth_len )); 2067 2071 return False;
Note:
See TracChangeset
for help on using the changeset viewer.