}
/* Force check of the request packet, now we know the session key */
- smbsrv_signing_check_incoming(req);
-/* TODO: why don't we check the result here? */
+ if (!smbsrv_signing_check_incoming(req)) {
+ status = NT_STATUS_ACCESS_DENIED;
+ goto failed;
+ }
/* Unfortunetly win2k3 as a client doesn't sign the request
* packet here, so we have to force signing to start again */
if (NT_STATUS_IS_OK(skey_status) &&
smbsrv_setup_signing(req->smb_conn, &session_key, NULL)) {
/* Force check of the request packet, now we know the session key */
- smbsrv_signing_check_incoming(req);
+ if (!smbsrv_signing_check_incoming(req)) {
+ status = NT_STATUS_ACCESS_DENIED;
+ goto failed;
+ }
smbsrv_signing_restart(req->smb_conn, &session_key, NULL,
session_info->server_info->authenticated);