smb2_server: decouple IOCTL check from signing/encryption states
authorStefan Metzmacher <metze@samba.org>
Wed, 15 Sep 2021 15:25:53 +0000 (17:25 +0200)
committerRalph Boehme <slow@samba.org>
Wed, 1 Dec 2021 11:04:29 +0000 (11:04 +0000)
There's no reason to handle FSCTL_SMBTORTURE_FORCE_UNACKED_TIMEOUT
differently if signing/encryption is used.

BUG: https://bugzilla.samba.org/show_bug.cgi?id=14788

Signed-off-by: Stefan Metzmacher <metze@samba.org>
Reviewed-by: Ralph Boehme <slow@samba.org>
source3/smbd/smb2_server.c

index fd02c129c408276fd5b1e9280b4b632af6e257b3..6b66eb1d32232001adf8b541ff7da0cb6c980484 100644 (file)
@@ -3174,7 +3174,9 @@ NTSTATUS smbd_smb2_request_dispatch(struct smbd_smb2_request *req)
                if (!NT_STATUS_IS_OK(session_status)) {
                        return smbd_smb2_request_error(req, session_status);
                }
-       } else if (opcode == SMB2_OP_IOCTL) {
+       }
+
+       if (opcode == SMB2_OP_IOCTL) {
                /*
                 * Some special IOCTL calls don't require
                 * file, tcon nor session.