static void test_ntlmv2_only_ntlm_once(void **state)
{
DATA_BLOB user_sess_key, lm_sess_key;
+ DATA_BLOB null_blob = {};
struct ntlm_state *ntlm_state
= talloc_get_type_abort(*state,
struct ntlm_state);
NTLM_AUTH_NTLMV2_ONLY,
0,
&ntlm_state->challenge,
- &data_blob_null,
+ &null_blob,
&ntlm_state->ntlm,
ntlm_state->username,
ntlm_state->username,
DATA_BLOB source_syntax;
const char *attribute = NULL;
const struct ldb_val *name = NULL;
+ const struct ldb_val null_name = {};
if (claim_attribute_source == NULL) {
continue;
name = ldb_msg_find_ldb_val(res->msgs[i], "name");
if (name == NULL) {
- name = &data_blob_null;
+ name = &null_name;
}
ad_claims[ad_claims_count++] = (struct ad_claim_info) {
const struct auth_user_info_dc *deleg_info_dc = NULL;
struct auth_claims deleg_claims = {};
size_t i = 0;
+#ifdef SAMBA4_USES_HEIMDAL
+ DATA_BLOB null_blob = {};
+#endif
if (server_audit_info_out != NULL) {
*server_audit_info_out = NULL;
/* Not needed with MIT Kerberos */
code = pac_blobs_replace_existing(pac_blobs,
PAC_TYPE_LOGON_NAME,
- &data_blob_null);
+ &null_blob);
if (code != 0) {
goto done;
}
code = pac_blobs_replace_existing(pac_blobs,
PAC_TYPE_SRV_CHECKSUM,
- &data_blob_null);
+ &null_blob);
if (code != 0) {
goto done;
}
code = pac_blobs_replace_existing(pac_blobs,
PAC_TYPE_KDC_CHECKSUM,
- &data_blob_null);
+ &null_blob);
if (code != 0) {
goto done;
}