Ignore:
Timestamp:
Aug 5, 2009, 6:34:45 PM (16 years ago)
Author:
Herwig Bauernfeind
Message:

Update 3.0 to final 3.0.36 (source)

Location:
branches/samba-3.0/source/rpc_server
Files:
2 edited

Legend:

Unmodified
Added
Removed
  • branches/samba-3.0/source/rpc_server/srv_netlog_nt.c

    r134 r312  
    432432        DOM_CHAL srv_chal_out;
    433433
     434        /* According to Microsoft (see bugid #6099)
     435         * Windows 7 looks at the negotiate_flags
     436         * returned in this structure *even if the
     437         * call fails with access denied ! So in order
     438         * to allow Win7 to connect to a Samba NT style
     439         * PDC we set the flags before we know if it's
     440         * an error or not.
     441         */
     442
     443        srv_flgs.neg_flags = 0x000001ff;
     444
     445        if (lp_server_schannel() != False) {
     446                srv_flgs.neg_flags |= NETLOGON_NEG_SCHANNEL;
     447        }
     448
     449        /* set up the initial LSA AUTH 2 response */
     450        ZERO_STRUCT(srv_chal_out);
     451        init_net_r_auth_2(r_u, &srv_chal_out, &srv_flgs, NT_STATUS_OK);
     452
    434453        rpcstr_pull(mach_acct, q_u->clnt_id.uni_acct_name.buffer,sizeof(fstring),
    435454                                q_u->clnt_id.uni_acct_name.uni_str_len*2,0);
     
    480499        }
    481500
    482         srv_flgs.neg_flags = 0x000001ff;
    483 
    484         if (lp_server_schannel() != False) {
    485                 srv_flgs.neg_flags |= NETLOGON_NEG_SCHANNEL;
    486         }
    487 
    488         /* set up the LSA AUTH 2 response */
     501        /* set up the real LSA AUTH 2 response */
    489502        init_net_r_auth_2(r_u, &srv_chal_out, &srv_flgs, NT_STATUS_OK);
    490503
  • branches/samba-3.0/source/rpc_server/srv_pipe.c

    r1 r312  
    20632063        auth_len = p->hdr.auth_len;
    20642064
    2065         if (auth_len != RPC_AUTH_SCHANNEL_SIGN_OR_SEAL_CHK_LEN) {
     2065        if (auth_len < RPC_AUTH_SCHANNEL_SIGN_OR_SEAL_CHK_LEN ||
     2066                        auth_len > RPC_HEADER_LEN +
     2067                                        RPC_HDR_REQ_LEN +
     2068                                        RPC_HDR_AUTH_LEN +
     2069                                        auth_len) {
    20662070                DEBUG(0,("Incorrect auth_len %u.\n", (unsigned int)auth_len ));
    20672071                return False;
Note: See TracChangeset for help on using the changeset viewer.