s3:smbd: pass down trusted_channel via receive_smb_talloc()
authorStefan Metzmacher <metze@samba.org>
Thu, 18 Mar 2010 14:36:19 +0000 (15:36 +0100)
committerMichael Adam <obnox@samba.org>
Mon, 22 Mar 2010 16:48:05 +0000 (17:48 +0100)
metze

source3/smbd/process.c

index 4fdd115df7c988c7a848fc6cdf3f271a33596148..a7ea567fcd80124764b7f6110eff995fef91e851 100644 (file)
@@ -338,7 +338,8 @@ static NTSTATUS receive_smb_talloc(TALLOC_CTX *mem_ctx,     int fd,
                                   char **buffer, unsigned int timeout,
                                   size_t *p_unread, bool *p_encrypted,
                                   size_t *p_len,
-                                  uint32_t *seqnum)
+                                  uint32_t *seqnum,
+                                  bool trusted_channel)
 {
        size_t len = 0;
        NTSTATUS status;
@@ -363,7 +364,7 @@ static NTSTATUS receive_smb_talloc(TALLOC_CTX *mem_ctx,     int fd,
        }
 
        /* Check the incoming SMB signature. */
-       if (!srv_check_sign_mac(smbd_server_conn, *buffer, seqnum, false)) {
+       if (!srv_check_sign_mac(smbd_server_conn, *buffer, seqnum, trusted_channel)) {
                DEBUG(0, ("receive_smb: SMB Signature verification failed on "
                          "incoming packet!\n"));
                return NT_STATUS_INVALID_NETWORK_RESPONSE;
@@ -1914,7 +1915,8 @@ static void smbd_server_connection_read_handler(struct smbd_server_connection *c
                                    0, /* timeout */
                                    &unread_bytes,
                                    &encrypted,
-                                   &inbuf_len, &seqnum);
+                                   &inbuf_len, &seqnum,
+                                   false /* trusted channel */);
        ok = smbd_unlock_socket(conn);
        if (!ok) {
                exit_server_cleanly("failed to unlock");