secword |= NEGOTIATE_SECURITY_CHALLENGE_RESPONSE;
}
- if (lp_server_signing()) {
+ if (lp_server_signing() != SMB_SIGNING_OFF) {
if (lp_security() >= SEC_USER) {
secword |= NEGOTIATE_SECURITY_SIGNATURES_ENABLED;
/* No raw mode with smb signing. */
capabilities &= ~CAP_RAW_MODE;
- if (lp_server_signing() == Required)
+ if (lp_server_signing() == SMB_SIGNING_REQUIRED)
secword |=NEGOTIATE_SECURITY_SIGNATURES_REQUIRED;
} else {
DEBUG(0,("reply_nt1: smb signing is incompatible with share level security !\n"));
- if (lp_server_signing() == Required) {
+ if (lp_server_signing() == SMB_SIGNING_REQUIRED) {
exit_server_cleanly("reply_nt1: smb signing required and share level security selected.");
}
}
DEBUG( 5, ( "negprot index=%d\n", choice ) );
- if ((lp_server_signing() == Required) && (get_Protocol() < PROTOCOL_NT1)) {
+ if ((lp_server_signing() == SMB_SIGNING_REQUIRED)
+ && (get_Protocol() < PROTOCOL_NT1)) {
exit_server_cleanly("SMB signing is required and "
"client negotiated a downlevel protocol");
}
bool mandatory = false;
switch (lp_server_signing()) {
- case Required:
+ case SMB_SIGNING_REQUIRED:
mandatory = true;
break;
- case True:
+ case SMB_SIGNING_IF_REQUIRED:
break;
- case False:
+ case SMB_SIGNING_DEFAULT:
+ case SMB_SIGNING_OFF:
allowed = false;
break;
}
}
security_mode = SMB2_NEGOTIATE_SIGNING_ENABLED;
- if (lp_server_signing() == Required) {
+ if (lp_server_signing() == SMB_SIGNING_REQUIRED) {
security_mode |= SMB2_NEGOTIATE_SIGNING_REQUIRED;
}
}
if ((in_security_mode & SMB2_NEGOTIATE_SIGNING_REQUIRED) ||
- lp_server_signing() == Required) {
+ lp_server_signing() == SMB_SIGNING_REQUIRED) {
session->do_signing = true;
}
bool guest = false;
if ((in_security_mode & SMB2_NEGOTIATE_SIGNING_REQUIRED) ||
- lp_server_signing() == Required) {
+ lp_server_signing() == SMB_SIGNING_REQUIRED) {
session->do_signing = true;
}