summaryrefslogtreecommitdiff
path: root/net/samba3/files/patch-jerry-srv_pipe.c
diff options
context:
space:
mode:
authorEdwin Groothuis <edwin@FreeBSD.org>2004-07-03 12:46:41 +0000
committerEdwin Groothuis <edwin@FreeBSD.org>2004-07-03 12:46:41 +0000
commitd281f6efd9cd4d33ba800e7b1e57ebb9226548ea (patch)
treeea007d28d8a536cbb9cbcf4f1ac89bbfb376dd74 /net/samba3/files/patch-jerry-srv_pipe.c
parentUpgrading to 1.3.0. (diff)
Here I attach the patch that fixes mentioned 3 problems as well as few others:
* BUG 1315 - wbinfo -t unsuccessful on 3.0.4 * BUG 1319 - Cannot write to a share with write-list users * BUG 1345 - Macromedia Homesite cannot connect anymore after upgrade to 3.0.4 * Patch from Rudolf Cejka <cejkar@fit.vutbr.cz> - rpcclient does not recognize parameters in -c <command> correctly. * Patch from Joerg Pulz <Joerg.Pulz@frm2.tum.de> - fixes to samba.sh startup script. PR: ports/67865 Submitted by: edwin@mavetju.org,Rudolf Cejka <cejkar@fit.vutbr.cz>,Joerg Pulz <Joerg.Pulz@frm2.tum.de> Approved by: maintainer
Notes
Notes: svn path=/head/; revision=112848
Diffstat (limited to 'net/samba3/files/patch-jerry-srv_pipe.c')
-rw-r--r--net/samba3/files/patch-jerry-srv_pipe.c54
1 files changed, 54 insertions, 0 deletions
diff --git a/net/samba3/files/patch-jerry-srv_pipe.c b/net/samba3/files/patch-jerry-srv_pipe.c
new file mode 100644
index 000000000000..9185fac2e4b9
--- /dev/null
+++ b/net/samba3/files/patch-jerry-srv_pipe.c
@@ -0,0 +1,54 @@
+Index: source/rpc_server/srv_pipe.c
+===================================================================
+--- rpc_server/srv_pipe.c (revision 842)
++++ rpc_server/srv_pipe.c (working copy)
+@@ -124,7 +124,7 @@
+ if(p->ntlmssp_auth_validated) {
+ data_space_available -= (RPC_HDR_AUTH_LEN + RPC_AUTH_NTLMSSP_CHK_LEN);
+ } else if(p->netsec_auth_validated) {
+- data_space_available -= (RPC_HDR_AUTH_LEN + RPC_AUTH_NETSEC_CHK_LEN);
++ data_space_available -= (RPC_HDR_AUTH_LEN + RPC_AUTH_NETSEC_SIGN_OR_SEAL_CHK_LEN);
+ }
+
+ /*
+@@ -177,8 +177,8 @@
+ } else if (p->netsec_auth_validated) {
+ p->hdr.frag_len = RPC_HEADER_LEN + RPC_HDR_RESP_LEN +
+ data_len + ss_padding_len +
+- RPC_HDR_AUTH_LEN + RPC_AUTH_NETSEC_CHK_LEN;
+- p->hdr.auth_len = RPC_AUTH_NETSEC_CHK_LEN;
++ RPC_HDR_AUTH_LEN + RPC_AUTH_NETSEC_SIGN_OR_SEAL_CHK_LEN;
++ p->hdr.auth_len = RPC_AUTH_NETSEC_SIGN_OR_SEAL_CHK_LEN;
+ } else {
+ p->hdr.frag_len = RPC_HEADER_LEN + RPC_HDR_RESP_LEN + data_len;
+ p->hdr.auth_len = 0;
+@@ -309,7 +309,8 @@
+ SENDER_IS_ACCEPTOR,
+ &verf, data, data_len + ss_padding_len);
+
+- smb_io_rpc_auth_netsec_chk("", &verf, &outgoing_pdu, 0);
++ smb_io_rpc_auth_netsec_chk("", RPC_AUTH_NETSEC_SIGN_OR_SEAL_CHK_LEN,
++ &verf, &outgoing_pdu, 0);
+
+ p->netsec_auth.seq_num++;
+ }
+@@ -1339,7 +1340,7 @@
+
+ auth_len = p->hdr.auth_len;
+
+- if (auth_len != RPC_AUTH_NETSEC_CHK_LEN) {
++ if (auth_len != RPC_AUTH_NETSEC_SIGN_OR_SEAL_CHK_LEN) {
+ DEBUG(0,("Incorrect auth_len %d.\n", auth_len ));
+ return False;
+ }
+@@ -1384,7 +1385,9 @@
+ return False;
+ }
+
+- if(!smb_io_rpc_auth_netsec_chk("", &netsec_chk, rpc_in, 0)) {
++ if(!smb_io_rpc_auth_netsec_chk("", RPC_AUTH_NETSEC_SIGN_OR_SEAL_CHK_LEN,
++ &netsec_chk, rpc_in, 0))
++ {
+ DEBUG(0,("failed to unmarshal RPC_AUTH_NETSEC_CHK.\n"));
+ return False;
+ }