diff options
| author | Stefan Metzmacher <metze@samba.org> | 2014-06-12 10:47:51 +0200 |
|---|---|---|
| committer | Michael Adam <obnox@samba.org> | 2014-08-06 09:51:14 +0200 |
| commit | d47c006d9d45eb65691b87f07d90e63785bc2f4e (patch) | |
| tree | 5e657ba83d4c50ae6a2d44f117ec899f8f2d48b9 /source3 | |
| parent | f261dd9c7d742e818c483cce1debf1407fae6430 (diff) | |
| download | samba-d47c006d9d45eb65691b87f07d90e63785bc2f4e.tar.gz samba-d47c006d9d45eb65691b87f07d90e63785bc2f4e.tar.xz samba-d47c006d9d45eb65691b87f07d90e63785bc2f4e.zip | |
s3:smb2_sesssetup: make use of smb2req->xconn
We should use stuff relative to the current request.
Signed-off-by: Stefan Metzmacher <metze@samba.org>
Reviewed-by: Volker Lendecke <vl@samba.org>
Reviewed-by: Michael Adam <obnox@samba.org>
Diffstat (limited to 'source3')
| -rw-r--r-- | source3/smbd/smb2_sesssetup.c | 22 |
1 files changed, 11 insertions, 11 deletions
diff --git a/source3/smbd/smb2_sesssetup.c b/source3/smbd/smb2_sesssetup.c index a8e4c3864f..9004e691bb 100644 --- a/source3/smbd/smb2_sesssetup.c +++ b/source3/smbd/smb2_sesssetup.c @@ -183,7 +183,7 @@ static NTSTATUS smbd_smb2_auth_generic_return(struct smbXsrv_session *session, bool guest = false; uint8_t session_key[16]; struct smbXsrv_session *x = session; - struct smbXsrv_connection *conn = session->connection; + struct smbXsrv_connection *xconn = smb2req->xconn; if ((in_security_mode & SMB2_NEGOTIATE_SIGNING_REQUIRED) || lp_server_signing() == SMB_SIGNING_REQUIRED) { @@ -208,11 +208,11 @@ static NTSTATUS smbd_smb2_auth_generic_return(struct smbXsrv_session *session, return NT_STATUS_ACCESS_DENIED; } - if (!(conn->smb2.server.capabilities & SMB2_CAP_ENCRYPTION)) { + if (!(xconn->smb2.server.capabilities & SMB2_CAP_ENCRYPTION)) { if (x->global->encryption_required) { DEBUG(1,("reject session with dialect[0x%04X] " "as encryption is required\n", - conn->smb2.server.dialect)); + xconn->smb2.server.dialect)); return NT_STATUS_ACCESS_DENIED; } } @@ -233,7 +233,7 @@ static NTSTATUS smbd_smb2_auth_generic_return(struct smbXsrv_session *session, return NT_STATUS_NO_MEMORY; } - if (conn->protocol >= PROTOCOL_SMB2_24) { + if (xconn->protocol >= PROTOCOL_SMB2_24) { const DATA_BLOB label = data_blob_string_const_null("SMB2AESCMAC"); const DATA_BLOB context = data_blob_string_const_null("SmbSign"); @@ -243,7 +243,7 @@ static NTSTATUS smbd_smb2_auth_generic_return(struct smbXsrv_session *session, x->global->signing_key.data); } - if (conn->protocol >= PROTOCOL_SMB2_24) { + if (xconn->protocol >= PROTOCOL_SMB2_24) { const DATA_BLOB label = data_blob_string_const_null("SMB2AESCCM"); const DATA_BLOB context = data_blob_string_const_null("ServerIn "); @@ -261,7 +261,7 @@ static NTSTATUS smbd_smb2_auth_generic_return(struct smbXsrv_session *session, x->global->decryption_key.data); } - if (conn->protocol >= PROTOCOL_SMB2_24) { + if (xconn->protocol >= PROTOCOL_SMB2_24) { const DATA_BLOB label = data_blob_string_const_null("SMB2AESCCM"); const DATA_BLOB context = data_blob_string_const_null("ServerOut"); @@ -289,7 +289,7 @@ static NTSTATUS smbd_smb2_auth_generic_return(struct smbXsrv_session *session, return NT_STATUS_NO_MEMORY; } - if (conn->protocol >= PROTOCOL_SMB2_24) { + if (xconn->protocol >= PROTOCOL_SMB2_24) { const DATA_BLOB label = data_blob_string_const_null("SMB2APP"); const DATA_BLOB context = data_blob_string_const_null("SmbRpc"); @@ -382,7 +382,7 @@ static NTSTATUS smbd_smb2_reauth_generic_return(struct smbXsrv_session *session, { NTSTATUS status; struct smbXsrv_session *x = session; - struct smbXsrv_connection *conn = session->connection; + struct smbXsrv_connection *xconn = smb2req->xconn; data_blob_clear_free(&session_info->session_key); session_info->session_key = data_blob_dup_talloc(session_info, @@ -419,7 +419,7 @@ static NTSTATUS smbd_smb2_reauth_generic_return(struct smbXsrv_session *session, return NT_STATUS_LOGON_FAILURE; } - conn_clear_vuid_caches(conn->sconn, session->compat->vuid); + conn_clear_vuid_caches(xconn->sconn, session->compat->vuid); *out_session_id = session->global->session_wire_id; @@ -596,7 +596,7 @@ static struct tevent_req *smbd_smb2_session_setup_send(TALLOC_CTX *mem_ctx, if (state->session->gensec == NULL) { status = auth_generic_prepare(state->session, - state->session->connection->remote_address, + state->smb2req->xconn->remote_address, &state->session->gensec); if (tevent_req_nterror(req, status)) { return tevent_req_post(req, ev); @@ -667,7 +667,7 @@ static void smbd_smb2_session_setup_gensec_done(struct tevent_req *subreq) state->in_previous_session_id)) { subreq = smb2srv_session_close_previous_send(state, state->ev, - state->session->connection, + state->smb2req->xconn, state->session_info, state->in_previous_session_id, state->session->global->session_wire_id); |
