This will make it easier to implement netr_ServerAuthenticateKerberos() later...
BUG: https://bugzilla.samba.org/show_bug.cgi?id=15425
Signed-off-by: Stefan Metzmacher <metze@samba.org>
Reviewed-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
(cherry picked from commit
7b02fb50143ba5044605ec67ed41180391835dcb)
const char *computer_name,
struct netr_Authenticator *received_authenticator,
struct netr_Authenticator *return_authenticator,
+ enum dcerpc_AuthType auth_type,
+ enum dcerpc_AuthLevel auth_level,
struct netlogon_creds_CredentialState **creds_out);
NTSTATUS schannel_get_challenge(struct loadparm_context *lp_ctx,
const char *computer_name,
struct netr_Authenticator *received_authenticator,
struct netr_Authenticator *return_authenticator,
+ enum dcerpc_AuthType auth_type,
+ enum dcerpc_AuthLevel auth_level,
struct netlogon_creds_CredentialState **creds_out)
{
TALLOC_CTX *tmpctx;
computer_name,
received_authenticator,
return_authenticator,
+ auth_type,
+ auth_level,
&creds);
if (!NT_STATUS_IS_OK(nt_status)) {
ZERO_STRUCTP(return_authenticator);