[SCM] Samba Shared Repository - branch master updated - release-4-0-0alpha7-170-g2544ba6

Volker Lendecke vlendec at samba.org
Thu Mar 5 21:22:30 GMT 2009


The branch, master has been updated
       via  2544ba6a0a1b9c4bacc93262b8e776bf98456252 (commit)
      from  bb1dab3a97d07dd6778f414ce3bff4f150b60d5d (commit)

http://gitweb.samba.org/?p=samba.git;a=shortlog;h=master


- Log -----------------------------------------------------------------
commit 2544ba6a0a1b9c4bacc93262b8e776bf98456252
Author: Volker Lendecke <vl at samba.org>
Date:   Thu Mar 5 22:20:55 2009 +0100

    Complete the fix for bug 6100
    
    According to [MS-RPCE].pdf, section 2.2.2.11:
    
    ----
    A client or a server that (during composing of a PDU) has allocated more space
    for the authentication token than the security provider fills in SHOULD fill in
    the rest of the allocated space with zero octets. These zero octets are still
    considered to belong to the authentication token part of the PDU.<36>
    ----
    
    RPC implementations are allowed to send padding bytes at the end of an auth
    footer. Windows 7 makes use of this.
    
    Thanks to Nick Meier <nmeier at microsoft.com>
    
    Volker

-----------------------------------------------------------------------

Summary of changes:
 source3/rpc_server/srv_pipe.c |    2 +-
 1 files changed, 1 insertions(+), 1 deletions(-)


Changeset truncated at 500 lines:

diff --git a/source3/rpc_server/srv_pipe.c b/source3/rpc_server/srv_pipe.c
index 09b1f66..ac491b9 100644
--- a/source3/rpc_server/srv_pipe.c
+++ b/source3/rpc_server/srv_pipe.c
@@ -2113,7 +2113,7 @@ bool api_pipe_schannel_process(pipes_struct *p, prs_struct *rpc_in, uint32 *p_ss
 
 	auth_len = p->hdr.auth_len;
 
-	if (auth_len != RPC_AUTH_SCHANNEL_SIGN_OR_SEAL_CHK_LEN) {
+	if (auth_len < RPC_AUTH_SCHANNEL_SIGN_OR_SEAL_CHK_LEN) {
 		DEBUG(0,("Incorrect auth_len %u.\n", (unsigned int)auth_len ));
 		return False;
 	}


-- 
Samba Shared Repository


More information about the samba-cvs mailing list