switch (auth->auth_level) {
case DCERPC_AUTH_LEVEL_NONE:
case DCERPC_AUTH_LEVEL_CONNECT:
- case DCERPC_AUTH_LEVEL_PACKET:
max_len = max_xmit_frag - header_len;
*data_to_send = MIN(max_len, data_left);
*pad_len = 0;
case DCERPC_AUTH_LEVEL_INTEGRITY:
break;
+ case DCERPC_AUTH_LEVEL_PACKET:
+ break;
+
default:
return NT_STATUS_INVALID_PARAMETER;
}
break;
case DCERPC_AUTH_LEVEL_INTEGRITY:
+ case DCERPC_AUTH_LEVEL_PACKET:
/* Data is signed. */
status = gensec_sign_packet(gensec_security,
rpc_out->data,
auth_token);
case DCERPC_AUTH_LEVEL_INTEGRITY:
+ case DCERPC_AUTH_LEVEL_PACKET:
/* Data is signed. */
return gensec_check_packet(gensec_security,
data->data,
DEBUG(10, ("Requested Integrity.\n"));
break;
+ case DCERPC_AUTH_LEVEL_PACKET:
+ DEBUG(10, ("Requested packet.\n"));
+ break;
+
case DCERPC_AUTH_LEVEL_CONNECT:
if (pkt->auth_length != 0) {
break;