bool ads_cldap_netlogon_5(TALLOC_CTX *mem_ctx,
struct sockaddr_storage *ss,
const char *realm,
+ uint32_t required_flags,
struct NETLOGON_SAM_LOGON_RESPONSE_EX *reply5)
{
uint32_t nt_version = NETLOGON_NT_VERSION_5 | NETLOGON_NT_VERSION_5EX;
struct netlogon_samlogon_response *reply = NULL;
bool ret;
- ret = ads_cldap_netlogon(mem_ctx, ss, realm, nt_version, 0, &reply);
+ ret = ads_cldap_netlogon(
+ mem_ctx, ss, realm, nt_version, required_flags, &reply);
if (!ret) {
return false;
}
bool ads_cldap_netlogon_5(TALLOC_CTX *mem_ctx,
struct sockaddr_storage *ss,
const char *realm,
+ uint32_t required_flags,
struct NETLOGON_SAM_LOGON_RESPONSE_EX *reply5);
#endif /* _LIBADS_CLDAP_H_ */
DBG_INFO("ads_try_connect: sending CLDAP request to %s (realm: %s)\n",
addr, ads->server.realm);
- ok = ads_cldap_netlogon_5(frame, ss, ads->server.realm, &cldap_reply);
+ ok = ads_cldap_netlogon_5(
+ frame, ss, ads->server.realm, 0, &cldap_reply);
if (!ok) {
DBG_NOTICE("ads_cldap_netlogon_5(%s, %s) failed.\n",
addr, ads->server.realm);
{
char addr[INET6_ADDRSTRLEN];
struct NETLOGON_SAM_LOGON_RESPONSE_EX reply;
+ bool ok;
print_sockaddr(addr, sizeof(addr), &ads->ldap.ss);
- if ( !ads_cldap_netlogon_5(talloc_tos(), &ads->ldap.ss, ads->server.realm, &reply ) ) {
+ ok = ads_cldap_netlogon_5(
+ talloc_tos(), &ads->ldap.ss, ads->server.realm, 0, &reply);
+ if (!ok) {
d_fprintf(stderr, _("CLDAP query failed!\n"));
return -1;
}
ads->ldap.port = 389;
}
- ok = ads_cldap_netlogon_5(tmp_ctx,
- &ads->ldap.ss, ads->server.realm, &reply);
+ ok = ads_cldap_netlogon_5(
+ tmp_ctx, &ads->ldap.ss, ads->server.realm, 0, &reply);
if (!ok) {
d_fprintf(stderr, _("CLDAP query failed!\n"));
goto out;