bool one_way_seqnum)
{
TALLOC_CTX *frame = NULL;
+ NTSTATUS status;
uint8_t *buf;
/*
*seqnum = smb_signing_next_seqnum(conn->smb1.signing,
one_way_seqnum);
- smb_signing_sign_pdu(conn->smb1.signing,
- buf, talloc_get_size(buf),
- *seqnum);
+ status = smb_signing_sign_pdu(conn->smb1.signing,
+ buf,
+ talloc_get_size(buf),
+ *seqnum);
+ if (!NT_STATUS_IS_OK(status)) {
+ return status;
+ }
memcpy(iov[1].iov_base, buf, iov[1].iov_len);
TALLOC_FREE(frame);
}
}
-void smb_signing_sign_pdu(struct smb_signing_state *si,
- uint8_t *outhdr, size_t len,
- uint32_t seqnum)
+NTSTATUS smb_signing_sign_pdu(struct smb_signing_state *si,
+ uint8_t *outhdr, size_t len,
+ uint32_t seqnum)
{
uint8_t calc_md5_mac[16];
uint8_t com;
if (si->mac_key.length == 0) {
if (!si->negotiated) {
- return;
+ return NT_STATUS_OK;
}
}
seqnum,
calc_md5_mac);
if (!NT_STATUS_IS_OK(status)) {
- return;
+ return status;
}
}
/* outhdr[HDR_SS_FIELD+2]=0;
Uncomment this to test if the remote server actually verifies signatures...*/
+
+ return NT_STATUS_OK;
}
bool smb_signing_check_pdu(struct smb_signing_state *si,
void (*free_fn)(TALLOC_CTX *, void *));
uint32_t smb_signing_next_seqnum(struct smb_signing_state *si, bool oneway);
void smb_signing_cancel_reply(struct smb_signing_state *si, bool oneway);
-void smb_signing_sign_pdu(struct smb_signing_state *si,
- uint8_t *outhdr, size_t len,
- uint32_t seqnum);
+NTSTATUS smb_signing_sign_pdu(struct smb_signing_state *si,
+ uint8_t *outhdr, size_t len,
+ uint32_t seqnum);
bool smb_signing_check_pdu(struct smb_signing_state *si,
const uint8_t *inhdr, size_t len,
uint32_t seqnum);