s3: smbd: SMB1 check_fsp_open() implicitly calls reply_nterror(.., NT_STATUS_INVALID_...
commit55f4ac65f9120d12ed4059b5c3214e9a97f97205
authorJeremy Allison <jra@samba.org>
Tue, 10 Jan 2023 01:28:06 +0000 (9 17:28 -0800)
committerVolker Lendecke <vl@samba.org>
Wed, 11 Jan 2023 07:13:29 +0000 (11 07:13 +0000)
tree77706523dd5358ea264d81c5efe326468620585a
parentd7bab36ad11eb4d67dcb6b12fc18d421074b9c5e
s3: smbd: SMB1 check_fsp_open() implicitly calls reply_nterror(.., NT_STATUS_INVALID_HANDLE) on error so don't duplicate in reply_close().

We'd end up sending 2 SMB1 error packets in this case.

Signed-off-by: Jeremy Allison <jra@samba.org>
Reviewed-by: Volker Lendecke <vl@samba.org>
source3/smbd/smb1_reply.c