[SCM] Samba Shared Repository - branch v3-0-test updated -
release-3-0-32-158-g7274d56
Jeremy Allison
jra at samba.org
Thu Mar 5 23:15:25 GMT 2009
The branch, v3-0-test has been updated
via 7274d5691a339087f2770acf2f954830506f5cdc (commit)
from ac11d94f36e1878f3f5d86f2e7197fd8ecdd196b (commit)
http://gitweb.samba.org/?p=samba.git;a=shortlog;h=v3-0-test
- Log -----------------------------------------------------------------
commit 7274d5691a339087f2770acf2f954830506f5cdc
Author: Volker Lendecke <vl at samba.org>
Date: Thu Mar 5 15:14:27 2009 -0800
Complete the fix for bug 6100
According to [MS-RPCE].pdf, section 2.2.2.11:
----
A client or a server that (during composing of a PDU) has allocated more space
for the authentication token than the security provider fills in SHOULD fill in
the rest of the allocated space with zero octets. These zero octets are still
considered to belong to the authentication token part of the PDU.<36>
----
RPC implementations are allowed to send padding bytes at the end of an auth
footer. Windows 7 makes use of this.
Thanks to Nick Meier <nmeier at microsoft.com>
Volker
-----------------------------------------------------------------------
Summary of changes:
source/rpc_server/srv_pipe.c | 2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
Changeset truncated at 500 lines:
diff --git a/source/rpc_server/srv_pipe.c b/source/rpc_server/srv_pipe.c
index db1c3fe..d491bc2 100644
--- a/source/rpc_server/srv_pipe.c
+++ b/source/rpc_server/srv_pipe.c
@@ -2062,7 +2062,7 @@ BOOL api_pipe_schannel_process(pipes_struct *p, prs_struct *rpc_in, uint32 *p_ss
auth_len = p->hdr.auth_len;
- if (auth_len != RPC_AUTH_SCHANNEL_SIGN_OR_SEAL_CHK_LEN) {
+ if (auth_len < RPC_AUTH_SCHANNEL_SIGN_OR_SEAL_CHK_LEN) {
DEBUG(0,("Incorrect auth_len %u.\n", (unsigned int)auth_len ));
return False;
}
--
Samba Shared Repository
More information about the samba-cvs
mailing list