summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorVolker Lendecke <vl@samba.org>2009-03-05 15:12:55 -0800
committerKarolin Seeger <kseeger@samba.org>2009-03-27 13:06:51 +0100
commitb7e092783f4a3ea7ef1c62400b7e445eb1e879e1 (patch)
treedee492ce6d0ae931bc5453661da347e521decc24
parent388c52ee16e42b8c637adee8e6e181117bcded5f (diff)
downloadsamba-b7e092783f4a3ea7ef1c62400b7e445eb1e879e1.tar.gz
samba-b7e092783f4a3ea7ef1c62400b7e445eb1e879e1.tar.xz
samba-b7e092783f4a3ea7ef1c62400b7e445eb1e879e1.zip
Complete the fix for bug 6100
According to [MS-RPCE].pdf, section 2.2.2.11: ---- A client or a server that (during composing of a PDU) has allocated more space for the authentication token than the security provider fills in SHOULD fill in the rest of the allocated space with zero octets. These zero octets are still considered to belong to the authentication token part of the PDU.<36> ---- RPC implementations are allowed to send padding bytes at the end of an auth footer. Windows 7 makes use of this. Thanks to Nick Meier <nmeier@microsoft.com> Volker (cherry picked from commit 91e2cd86e24cead352f07cc1a6b4a8e3a364adb5)
-rw-r--r--source/rpc_server/srv_pipe.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/source/rpc_server/srv_pipe.c b/source/rpc_server/srv_pipe.c
index 05cdb65a831..65bc0aed61c 100644
--- a/source/rpc_server/srv_pipe.c
+++ b/source/rpc_server/srv_pipe.c
@@ -2101,7 +2101,7 @@ bool api_pipe_schannel_process(pipes_struct *p, prs_struct *rpc_in, uint32 *p_ss
auth_len = p->hdr.auth_len;
- if (auth_len != RPC_AUTH_SCHANNEL_SIGN_OR_SEAL_CHK_LEN) {
+ if (auth_len < RPC_AUTH_SCHANNEL_SIGN_OR_SEAL_CHK_LEN) {
DEBUG(0,("Incorrect auth_len %u.\n", (unsigned int)auth_len ));
return False;
}