Changeset 919 for vendor/current/source4/librpc
- Timestamp:
- Jun 9, 2016, 2:17:22 PM (9 years ago)
- Location:
- vendor/current/source4/librpc/rpc
- Files:
-
- 2 edited
Legend:
- Unmodified
- Added
- Removed
-
vendor/current/source4/librpc/rpc/dcerpc.c
r860 r919 700 700 default: 701 701 return NT_STATUS_INVALID_LEVEL; 702 } 703 704 if (pkt->auth_length == 0) { 705 return NT_STATUS_INVALID_NETWORK_RESPONSE; 706 } 707 708 if (c->security_state.generic_state == NULL) { 709 return NT_STATUS_INTERNAL_ERROR; 702 710 } 703 711 … … 1075 1083 1076 1084 /* the bind_ack might contain a reply set of credentials */ 1077 if (conn->security_state.auth_info && pkt-> u.bind_ack.auth_info.length) {1085 if (conn->security_state.auth_info && pkt->auth_length) { 1078 1086 NTSTATUS status; 1079 1087 uint32_t auth_length; … … 1848 1856 1849 1857 /* the alter_resp might contain a reply set of credentials */ 1850 if (recv_pipe->conn->security_state.auth_info && 1851 pkt->u.alter_resp.auth_info.length) { 1858 if (recv_pipe->conn->security_state.auth_info && pkt->auth_length) { 1852 1859 struct dcecli_connection *conn = recv_pipe->conn; 1853 1860 NTSTATUS status; -
vendor/current/source4/librpc/rpc/dcerpc_util.c
r917 r919 594 594 /* Perform an authenticated DCE-RPC bind 595 595 */ 596 if (!(conn->flags & (DCERPC_ SIGN|DCERPC_SEAL))) {596 if (!(conn->flags & (DCERPC_CONNECT|DCERPC_SEAL))) { 597 597 /* 598 598 we are doing an authenticated connection, 599 but not using sign or seal. We must force600 the CONNECT dcerpc auth type as a NONE auth601 type doesn't allow authentication602 information to be passed.599 which needs to use [connect], [sign] or [seal]. 600 If nothing is specified, we default to [sign] now. 601 This give roughly the same protection as 602 ncacn_np with smb signing. 603 603 */ 604 conn->flags |= DCERPC_ CONNECT;604 conn->flags |= DCERPC_SIGN; 605 605 } 606 606
Note:
See TracChangeset
for help on using the changeset viewer.