static krb5_error_code
hdb_samba4_check_rbcd(krb5_context context, HDB *db,
- krb5_const_principal client_principal,
+ const hdb_entry *client_krbtgt,
+ const hdb_entry *client,
+ const hdb_entry *device_krbtgt,
+ const hdb_entry *device,
krb5_const_principal server_principal,
krb5_const_pac header_pac,
+ krb5_const_pac device_pac,
const hdb_entry *proxy)
{
struct samba_kdc_db_context *kdc_db_ctx = NULL;
return samba_kdc_check_s4u2proxy_rbcd(context,
kdc_db_ctx,
- client_principal,
+ client->principal,
server_principal,
header_pac,
proxy_skdc_entry);
const hdb_entry *client,
const hdb_entry *krbtgt,
const krb5_pac pac,
- krb5_cksumtype ctype,
- krb5_boolean *is_trusted_out)
+ krb5_cksumtype ctype)
{
krb5_context context = kdc_request_get_context((kdc_request_t)r);
struct samba_kdc_entry *client_skdc_entry = NULL;
goto out;
}
- if (is_trusted_out != NULL) {
- *is_trusted_out = is_trusted;
- }
-
out:
talloc_free(mem_ctx);
return ret;
hdb_entry *_server,
hdb_entry *krbtgt,
EncTicketPart *ticket,
- krb5_pac pac,
- krb5_boolean *is_trusted)
+ krb5_pac pac)
{
krb5_context context = kdc_request_get_context((kdc_request_t)r);
krb5_kdc_configuration *config = kdc_request_get_config((kdc_request_t)r);
client,
krbtgt,
pac,
- ctype,
- is_trusted);
+ ctype);
if (krbtgt == &signing_krbtgt_hdb) {
hdb_free_entry(context, config->db[0], &signing_krbtgt_hdb);