s3:rpc_server: Fix a regression verifying the security trailer
authorAndreas Schneider <asn@samba.org>
Fri, 15 Apr 2016 09:56:08 +0000 (11:56 +0200)
committerAndreas Schneider <asn@samba.org>
Wed, 20 Apr 2016 08:24:39 +0000 (10:24 +0200)
We do not support header signing so we should not check verify it if a
client sends the flag.

Signed-off-by: Andreas Schneider <asn@samba.org>
Reviewed-by: Guenther Deschner <gd@samba.org>
source3/rpc_server/srv_pipe.c

index d659705375d6a64574b475f0de7a0f0c9b0767f5..fa354a6a06cd25664fad55f3db3c536ba033ecee 100644 (file)
@@ -1552,7 +1552,6 @@ static bool srv_pipe_check_verification_trailer(struct pipes_struct *p,
 {
        TALLOC_CTX *frame = talloc_stackframe();
        struct dcerpc_sec_verification_trailer *vt = NULL;
-       const uint32_t bitmask1 = 0;
        const struct dcerpc_sec_vt_pcontext pcontext = {
                .abstract_syntax = pipe_fns->syntax,
                .transfer_syntax = ndr_transfer_syntax,
@@ -1573,7 +1572,7 @@ static bool srv_pipe_check_verification_trailer(struct pipes_struct *p,
                goto done;
        }
 
-       ret = dcerpc_sec_verification_trailer_check(vt, &bitmask1,
+       ret = dcerpc_sec_verification_trailer_check(vt, NULL,
                                                    &pcontext, &header2);
 done:
        TALLOC_FREE(frame);