s3:rpc_client: use netsec_ougoing_sig_size() instead of hardcoded value
authorStefan Metzmacher <metze@samba.org>
Tue, 29 Sep 2009 07:31:52 +0000 (09:31 +0200)
committerStefan Metzmacher <metze@samba.org>
Tue, 29 Sep 2009 07:36:49 +0000 (09:36 +0200)
metze

source3/rpc_client/cli_pipe.c

index 34b861690704c4edf3a54349218a866c422501be..5c5c6c64d13c07a3524c605b6e18b0a3825d1ac1 100644 (file)
@@ -2030,7 +2030,7 @@ static uint32 calculate_data_len_tosend(struct rpc_pipe_client *cli,
                                        *p_auth_len = NTLMSSP_SIG_SIZE;
                                        break;
                                case PIPE_AUTH_TYPE_SCHANNEL:
-                                       *p_auth_len = RPC_AUTH_SCHANNEL_SIGN_OR_SEAL_CHK_LEN;
+                                       *p_auth_len = netsec_outgoing_sig_size(cli->auth->a_u.schannel_auth);
                                        break;
                                default:
                                        smb_panic("bad auth type");