return status;
}
-
/* check signature or unseal the packet */
switch (c->security_state.auth_info->auth_level) {
case DCERPC_AUTH_LEVEL_PRIVACY:
return status;
}
dcerpc_set_auth_length(blob, creds2.length);
+ if (c->security_state.auth_info->credentials.length == 0) {
+ /* this is needed for krb5 only, to correct the total packet
+ length */
+ dcerpc_set_frag_length(blob,
+ dcerpc_get_frag_length(blob)
+ +creds2.length);
+ }
break;
case DCERPC_AUTH_LEVEL_INTEGRITY:
return status;
}
dcerpc_set_auth_length(blob, creds2.length);
+ if (c->security_state.auth_info->credentials.length == 0) {
+ /* this is needed for krb5 only, to correct the total packet
+ length */
+ dcerpc_set_frag_length(blob,
+ dcerpc_get_frag_length(blob)
+ +creds2.length);
+ }
break;
case DCERPC_AUTH_LEVEL_CONNECT:
&creds2);
if (NT_STATUS_IS_OK(status)) {
- status = data_blob_realloc(call, blob,
- blob->length - dce_conn->auth_state.auth_info->credentials.length +
- creds2.length);
- }
-
- if (NT_STATUS_IS_OK(status)) {
- memcpy(blob->data + blob->length - dce_conn->auth_state.auth_info->credentials.length,
- creds2.data, creds2.length);
+ blob->length -= dce_conn->auth_state.auth_info->credentials.length;
+ status = data_blob_append(call, blob, creds2.data, creds2.length);
}
/* If we did AEAD signing of the packet headers, then we hope
* this value didn't change... */
dcerpc_set_auth_length(blob, creds2.length);
+ dcerpc_set_frag_length(blob, dcerpc_get_frag_length(blob)+creds2.length);
data_blob_free(&creds2);
break;
blob->length - dce_conn->auth_state.auth_info->credentials.length,
&creds2);
if (NT_STATUS_IS_OK(status)) {
- status = data_blob_realloc(call, blob,
- blob->length - dce_conn->auth_state.auth_info->credentials.length +
- creds2.length);
- }
-
- if (NT_STATUS_IS_OK(status)) {
- memcpy(blob->data + blob->length - dce_conn->auth_state.auth_info->credentials.length,
- creds2.data, creds2.length);
+ blob->length -= dce_conn->auth_state.auth_info->credentials.length;
+ status = data_blob_append(call, blob, creds2.data, creds2.length);
}
/* If we did AEAD signing of the packet headers, then we hope
* this value didn't change... */
dcerpc_set_auth_length(blob, creds2.length);
-
+ dcerpc_set_frag_length(blob, dcerpc_get_frag_length(blob)+creds2.length);
data_blob_free(&creds2);
break;