* @param krbtgt The krbtgt samba kdc entry.
*
- * @param device The computer's samba kdc entry; used for compound
- * authentication.
-
- * @param device_pac The PAC from the computer's TGT; used
- * for compound authentication.
-
* @param pac The PAC
* @return A Kerberos error code.
uint32_t flags,
struct samba_kdc_entry *client,
const struct samba_kdc_entry *krbtgt,
- const struct samba_kdc_entry *device,
- const krb5_const_pac *device_pac,
const krb5_const_pac pac)
{
TALLOC_CTX *tmp_ctx = NULL;
uint32_t flags,
struct samba_kdc_entry *client,
const struct samba_kdc_entry *krbtgt,
- const struct samba_kdc_entry *device,
- const krb5_const_pac *device_pac,
krb5_const_pac pac);
struct authn_audit_info;
const hdb_entry *krbtgt,
const krb5_pac pac,
krb5_cksumtype ctype,
- const hdb_entry *device,
- krb5_const_pac *device_pac,
krb5_boolean *is_trusted_out)
{
krb5_context context = kdc_request_get_context((kdc_request_t)r);
struct samba_kdc_entry *client_skdc_entry = NULL;
- struct samba_kdc_entry *device_skdc_entry = NULL;
struct samba_kdc_entry *krbtgt_skdc_entry =
talloc_get_type_abort(krbtgt->context, struct samba_kdc_entry);
TALLOC_CTX *mem_ctx = NULL;
struct samba_kdc_entry);
}
- if (device != NULL) {
- device_skdc_entry = talloc_get_type_abort(device->context,
- struct samba_kdc_entry);
- }
-
/*
* If the krbtgt was generated by an RODC, and we are not that
* RODC, then we need to regenerate the PAC - we can't trust
flags,
client_skdc_entry,
krbtgt_skdc_entry,
- device_skdc_entry,
- device_pac,
pac);
if (ret != 0) {
goto out;
krb5_error_code ret;
krb5_cksumtype ctype = CKSUMTYPE_NONE;
hdb_entry signing_krbtgt_hdb;
- const hdb_entry *explicit_armor_client =
- kdc_request_get_explicit_armor_client(r);
- krb5_const_pac explicit_armor_pac =
- kdc_request_get_explicit_armor_pac(r);
if (delegated_proxy) {
uint16_t pac_kdc_signature_rodc_id;
krbtgt,
pac,
ctype,
- explicit_armor_client,
- &explicit_armor_pac,
is_trusted);
if (krbtgt == &signing_krbtgt_hdb) {