From 7ec3a35d2a67ca93a49094f07a12b0e37cec1661 Mon Sep 17 00:00:00 2001 From: Stefan Metzmacher Date: Tue, 6 Sep 2011 14:01:43 +0200 Subject: [PATCH] s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_negprot.c metze --- source3/smbd/smb2_negprot.c | 14 ++++---------- 1 file changed, 4 insertions(+), 10 deletions(-) diff --git a/source3/smbd/smb2_negprot.c b/source3/smbd/smb2_negprot.c index 56a30d0d71ea..15bff823ef81 100644 --- a/source3/smbd/smb2_negprot.c +++ b/source3/smbd/smb2_negprot.c @@ -80,6 +80,7 @@ void reply_smb20ff(struct smb_request *req, uint16_t choice) NTSTATUS smbd_smb2_request_process_negprot(struct smbd_smb2_request *req) { + NTSTATUS status; const uint8_t *inbody; const uint8_t *indyn = NULL; int i = req->current_idx; @@ -88,8 +89,6 @@ NTSTATUS smbd_smb2_request_process_negprot(struct smbd_smb2_request *req) DATA_BLOB negprot_spnego_blob; uint16_t security_offset; DATA_BLOB security_buffer; - size_t expected_body_size = 0x24; - size_t body_size; size_t expected_dyn_size = 0; size_t c; uint16_t security_mode; @@ -104,17 +103,12 @@ NTSTATUS smbd_smb2_request_process_negprot(struct smbd_smb2_request *req) /* TODO: drop the connection with INVALID_PARAMETER */ - if (req->in.vector[i+1].iov_len != (expected_body_size & 0xFFFFFFFE)) { - return smbd_smb2_request_error(req, NT_STATUS_INVALID_PARAMETER); + status = smbd_smb2_request_verify_sizes(req, 0x24); + if (!NT_STATUS_IS_OK(status)) { + return smbd_smb2_request_error(req, status); } - inbody = (const uint8_t *)req->in.vector[i+1].iov_base; - body_size = SVAL(inbody, 0x00); - if (body_size != expected_body_size) { - return smbd_smb2_request_error(req, NT_STATUS_INVALID_PARAMETER); - } - dialect_count = SVAL(inbody, 0x02); if (dialect_count == 0) { return smbd_smb2_request_error(req, NT_STATUS_INVALID_PARAMETER); -- 2.34.1