diff options
author | Edwin Groothuis <edwin@FreeBSD.org> | 2004-07-03 12:46:41 +0000 |
---|---|---|
committer | Edwin Groothuis <edwin@FreeBSD.org> | 2004-07-03 12:46:41 +0000 |
commit | d281f6efd9cd4d33ba800e7b1e57ebb9226548ea (patch) | |
tree | ea007d28d8a536cbb9cbcf4f1ac89bbfb376dd74 /net/samba3/files/patch-jerry-srv_pipe.c | |
parent | Upgrading to 1.3.0. (diff) |
Here I attach the patch that fixes mentioned 3 problems as well as few others:
* BUG 1315 - wbinfo -t unsuccessful on 3.0.4
* BUG 1319 - Cannot write to a share with write-list users
* BUG 1345 - Macromedia Homesite cannot connect anymore after upgrade to 3.0.4
* Patch from Rudolf Cejka <cejkar@fit.vutbr.cz> - rpcclient does not recognize
parameters in -c <command> correctly.
* Patch from Joerg Pulz <Joerg.Pulz@frm2.tum.de> - fixes to samba.sh startup script.
PR: ports/67865
Submitted by: edwin@mavetju.org,Rudolf Cejka <cejkar@fit.vutbr.cz>,Joerg Pulz <Joerg.Pulz@frm2.tum.de>
Approved by: maintainer
Notes
Notes:
svn path=/head/; revision=112848
Diffstat (limited to 'net/samba3/files/patch-jerry-srv_pipe.c')
-rw-r--r-- | net/samba3/files/patch-jerry-srv_pipe.c | 54 |
1 files changed, 54 insertions, 0 deletions
diff --git a/net/samba3/files/patch-jerry-srv_pipe.c b/net/samba3/files/patch-jerry-srv_pipe.c new file mode 100644 index 000000000000..9185fac2e4b9 --- /dev/null +++ b/net/samba3/files/patch-jerry-srv_pipe.c @@ -0,0 +1,54 @@ +Index: source/rpc_server/srv_pipe.c +=================================================================== +--- rpc_server/srv_pipe.c (revision 842) ++++ rpc_server/srv_pipe.c (working copy) +@@ -124,7 +124,7 @@ + if(p->ntlmssp_auth_validated) { + data_space_available -= (RPC_HDR_AUTH_LEN + RPC_AUTH_NTLMSSP_CHK_LEN); + } else if(p->netsec_auth_validated) { +- data_space_available -= (RPC_HDR_AUTH_LEN + RPC_AUTH_NETSEC_CHK_LEN); ++ data_space_available -= (RPC_HDR_AUTH_LEN + RPC_AUTH_NETSEC_SIGN_OR_SEAL_CHK_LEN); + } + + /* +@@ -177,8 +177,8 @@ + } else if (p->netsec_auth_validated) { + p->hdr.frag_len = RPC_HEADER_LEN + RPC_HDR_RESP_LEN + + data_len + ss_padding_len + +- RPC_HDR_AUTH_LEN + RPC_AUTH_NETSEC_CHK_LEN; +- p->hdr.auth_len = RPC_AUTH_NETSEC_CHK_LEN; ++ RPC_HDR_AUTH_LEN + RPC_AUTH_NETSEC_SIGN_OR_SEAL_CHK_LEN; ++ p->hdr.auth_len = RPC_AUTH_NETSEC_SIGN_OR_SEAL_CHK_LEN; + } else { + p->hdr.frag_len = RPC_HEADER_LEN + RPC_HDR_RESP_LEN + data_len; + p->hdr.auth_len = 0; +@@ -309,7 +309,8 @@ + SENDER_IS_ACCEPTOR, + &verf, data, data_len + ss_padding_len); + +- smb_io_rpc_auth_netsec_chk("", &verf, &outgoing_pdu, 0); ++ smb_io_rpc_auth_netsec_chk("", RPC_AUTH_NETSEC_SIGN_OR_SEAL_CHK_LEN, ++ &verf, &outgoing_pdu, 0); + + p->netsec_auth.seq_num++; + } +@@ -1339,7 +1340,7 @@ + + auth_len = p->hdr.auth_len; + +- if (auth_len != RPC_AUTH_NETSEC_CHK_LEN) { ++ if (auth_len != RPC_AUTH_NETSEC_SIGN_OR_SEAL_CHK_LEN) { + DEBUG(0,("Incorrect auth_len %d.\n", auth_len )); + return False; + } +@@ -1384,7 +1385,9 @@ + return False; + } + +- if(!smb_io_rpc_auth_netsec_chk("", &netsec_chk, rpc_in, 0)) { ++ if(!smb_io_rpc_auth_netsec_chk("", RPC_AUTH_NETSEC_SIGN_OR_SEAL_CHK_LEN, ++ &netsec_chk, rpc_in, 0)) ++ { + DEBUG(0,("failed to unmarshal RPC_AUTH_NETSEC_CHK.\n")); + return False; + } |