if (composite_nomem(c->conn, ctx)) {
return;
}
+ dcerpc_connection_set_max_fragment_sizes(c->conn,
+ TSTREAM_SMBXCLI_NP_MAX_BUF_SIZE);
dcerpc_connection_set_use_trans_fn(c->conn,
- tstream_smbXcli_np_use_trans);
-
- /*
- * Windows uses 4280 for ncacn_np,
- * so we also use it, this is what our
- * tstream_smbXcli_np code relies on.
- */
- c->srv_max_xmit_frag = 4280;
- c->srv_max_recv_frag = 4280;
+ tstream_smbXcli_np_use_trans);
/* Over-ride the default session key with the SMB session key */
c->security_state.session_key = smb_session_key;
conn->transport.transport = s->transport;
conn->transport.private_data = NULL;
- /*
- * Windows uses 5840 for ncacn_ip_tcp,
- * so we also use it (for every transport which uses bsd sockets)
- */
- conn->srv_max_xmit_frag = 5840;
- conn->srv_max_recv_frag = 5840;
-
- conn->transport.pending_reads = 0;
conn->server_name = strupper_talloc(conn, s->target_hostname);
rc = tstream_bsd_existing_socket(conn, sock_fd, &stream);
if (composite_nomem(conn->conn, c)) {
return;
}
+ if (s->transport == NCACN_IP_TCP) {
+ /*
+ * Windows uses 5840 for ncacn_ip_tcp,
+ */
+ dcerpc_connection_set_max_fragment_sizes(conn->conn, 5840);
+ }
/* ensure we don't get SIGPIPE */
BlockSignals(true, SIGPIPE);