const char *password,
const char *workstation,
enum netr_LogonInfoClass logon_type,
+ uint8_t *authoritative,
+ uint32_t *flags,
struct netr_SamInfo3 **info3)
{
TALLOC_CTX *frame = talloc_stackframe();
union netr_LogonLevel *logon;
uint16_t validation_level = 0;
union netr_Validation *validation = NULL;
- uint8_t authoritative = 0;
- uint32_t flags = 0;
char *workstation_slash = NULL;
logon = talloc_zero(frame, union netr_LogonLevel);
frame,
&validation_level,
&validation,
- &authoritative,
- &flags);
+ authoritative,
+ flags);
if (!NT_STATUS_IS_OK(status)) {
TALLOC_FREE(frame);
return status;
const char *password,
const char *workstation,
enum netr_LogonInfoClass logon_type,
+ uint8_t *authoritative,
+ uint32_t *flags,
struct netr_SamInfo3 **info3);
NTSTATUS rpccli_netlogon_network_logon(struct netlogon_creds_cli_context *creds,
struct dcerpc_binding_handle *binding_handle,
uint32_t logon_param = 0;
const char *workstation = NULL;
struct netr_SamInfo3 *info3 = NULL;
+ uint8_t authoritative = 0;
+ uint32_t flags = 0;
/* Check arguments */
password,
workstation,
logon_type,
+ &authoritative,
+ &flags,
&info3);
if (!NT_STATUS_IS_OK(result))
goto done;
password,
workstation,
NetlogonInteractiveInformation,
+ &authoritative,
+ &flags,
info3);
} else {
result = rpccli_netlogon_network_logon(domain->conn.netlogon_creds,