summaryrefslogtreecommitdiff
path: root/libcli
diff options
context:
space:
mode:
authorStefan Metzmacher <metze@samba.org>2021-01-11 10:01:39 +0100
committerVolker Lendecke <vl@samba.org>2021-01-15 07:26:29 +0000
commitfdcdfceefdd3186ef0b70bb6e83dddc8f4c073db (patch)
tree94bc0914f573c08d7881a741b79871dafce9848e /libcli
parent63e6653be608d76a6f91795671cb19ef912811c1 (diff)
downloadsamba-fdcdfceefdd3186ef0b70bb6e83dddc8f4c073db.tar.gz
libcli/smb: Change some checks to SMB_ASSERTS
If we end up here, it's definitely a programming error in the basic parsing layer of the SMB2 packet. BUG: https://bugzilla.samba.org/show_bug.cgi?id=14607 Signed-off-by: Stefan Metzmacher <metze@samba.org> Reviewed-by: Volker Lendecke <vl@samba.org>
Diffstat (limited to 'libcli')
-rw-r--r--libcli/smb/smb2_signing.c9
1 files changed, 2 insertions, 7 deletions
diff --git a/libcli/smb/smb2_signing.c b/libcli/smb/smb2_signing.c
index 6ece5f2e4d3..b1e0253948f 100644
--- a/libcli/smb/smb2_signing.c
+++ b/libcli/smb/smb2_signing.c
@@ -189,13 +189,8 @@ NTSTATUS smb2_signing_check_pdu(struct smb2_signing_key *signing_key,
static const uint8_t zero_sig[16] = { 0, };
int i;
- if (count < 2) {
- return NT_STATUS_INVALID_PARAMETER;
- }
-
- if (vector[0].iov_len != SMB2_HDR_BODY) {
- return NT_STATUS_INVALID_PARAMETER;
- }
+ SMB_ASSERT(count >= 2);
+ SMB_ASSERT(vector[0].iov_len == SMB2_HDR_BODY);
hdr = (const uint8_t *)vector[0].iov_base;