generate_random_buffer(p->dc->srv_chal.data, 8);
/* set up the LSA REQUEST CHALLENGE response */
- init_net_r_req_chal(r->out.credentials, &p->dc->srv_chal);
+ init_net_r_req_chal(r->out.return_credentials, &p->dc->srv_chal);
p->dc->challenge_sent = True;
/* set up the LSA AUTH response */
/* Return the server credentials. */
- memcpy(r->out.credentials->data, &srv_chal_out.data,
- sizeof(r->out.credentials->data));
+ memcpy(r->out.return_credentials->data, &srv_chal_out.data,
+ sizeof(r->out.return_credentials->data));
return NT_STATUS_OK;
}
}
/* set up the LSA AUTH 2 response */
- memcpy(r->out.credentials->data, &srv_chal_out.data,
- sizeof(r->out.credentials->data));
+ memcpy(r->out.return_credentials->data, &srv_chal_out.data,
+ sizeof(r->out.return_credentials->data));
*r->out.negotiate_flags = srv_flgs;
fstrcpy(p->dc->mach_acct, r->in.account_name);