cred_ndr_ptr = &cred_ndr;
}
- nt_status = samba_kdc_get_user_info_dc(tmp_ctx,
- skdc_entry,
- skdc_entry->msg,
- &user_info_dc);
+ nt_status = samba_kdc_get_user_info_from_db(tmp_ctx,
+ skdc_entry,
+ skdc_entry->msg,
+ &user_info_dc);
if (!NT_STATUS_IS_OK(nt_status)) {
talloc_free(tmp_ctx);
if (NT_STATUS_EQUAL(nt_status,
return ENOMEM;
}
- status = samba_kdc_get_user_info_dc(tmp_ctx,
- p,
- p->msg,
- &user_info_dc);
+ status = samba_kdc_get_user_info_from_db(tmp_ctx,
+ p,
+ p->msg,
+ &user_info_dc);
if (!NT_STATUS_IS_OK(status)) {
- DBG_WARNING("samba_kdc_get_user_info_dc failed: %s\n",
+ DBG_WARNING("samba_kdc_get_user_info_from_db failed: %s\n",
nt_errstr(status));
code = EINVAL;
goto out;
return NT_STATUS_OK;
}
-NTSTATUS samba_kdc_get_user_info_dc(TALLOC_CTX *mem_ctx,
- struct samba_kdc_entry *entry,
- const struct ldb_message *msg,
- struct auth_user_info_dc **info_out)
+NTSTATUS samba_kdc_get_user_info_from_db(TALLOC_CTX *mem_ctx,
+ struct samba_kdc_entry *entry,
+ const struct ldb_message *msg,
+ struct auth_user_info_dc **info_out)
{
NTSTATUS nt_status;
struct auth_user_info_dc *user_info_dc = NULL;
* SAMBA_ASSERTED_IDENTITY_AUTHENTICATION_AUTHORITY
* here.
*/
- nt_status = samba_kdc_get_user_info_dc(mem_ctx,
- entry.entry,
- entry.entry->msg,
- &user_info_dc);
+ nt_status = samba_kdc_get_user_info_from_db(mem_ctx,
+ entry.entry,
+ entry.entry->msg,
+ &user_info_dc);
if (!NT_STATUS_IS_OK(nt_status)) {
- DBG_ERR("samba_kdc_get_user_info_dc failed: %s\n",
+ DBG_ERR("samba_kdc_get_user_info_from_db failed: %s\n",
nt_errstr(nt_status));
ret = KRB5KDC_ERR_TGT_REVOKED;
goto out;
frame = talloc_stackframe();
- nt_status = samba_kdc_get_user_info_dc(frame,
- device,
- device->msg,
- &device_info_dc);
+ nt_status = samba_kdc_get_user_info_from_db(frame,
+ device,
+ device->msg,
+ &device_info_dc);
if (!NT_STATUS_IS_OK(nt_status)) {
- DBG_ERR("samba_kdc_get_user_info_dc failed: %s\n",
+ DBG_ERR("samba_kdc_get_user_info_from_db failed: %s\n",
nt_errstr(nt_status));
talloc_free(frame);
return KRB5KDC_ERR_TGT_REVOKED;
goto done;
}
- nt_status = samba_kdc_get_user_info_dc(tmp_ctx,
- client.entry,
- client.entry->msg,
- &user_info_dc);
+ nt_status = samba_kdc_get_user_info_from_db(tmp_ctx,
+ client.entry,
+ client.entry->msg,
+ &user_info_dc);
if (!NT_STATUS_IS_OK(nt_status)) {
DBG_ERR("Getting user info for PAC failed: %s\n",
nt_errstr(nt_status));
goto out;
}
} else {
- nt_status = samba_kdc_get_user_info_dc(frame,
- device.entry,
- device.entry->msg,
- &device_info);
+ nt_status = samba_kdc_get_user_info_from_db(frame,
+ device.entry,
+ device.entry->msg,
+ &device_info);
if (!NT_STATUS_IS_OK(nt_status)) {
- DBG_ERR("samba_kdc_get_user_info_dc failed: %s\n",
+ DBG_ERR("samba_kdc_get_user_info_from_db failed: %s\n",
nt_errstr(nt_status));
code = KRB5KDC_ERR_TGT_REVOKED;
bool *is_in_db,
bool *is_trusted);
-NTSTATUS samba_kdc_get_user_info_dc(TALLOC_CTX *mem_ctx,
- struct samba_kdc_entry *entry,
- const struct ldb_message *msg,
- struct auth_user_info_dc **info_out);
+NTSTATUS samba_kdc_get_user_info_from_db(TALLOC_CTX *mem_ctx,
+ struct samba_kdc_entry *entry,
+ const struct ldb_message *msg,
+ struct auth_user_info_dc **info_out);
krb5_error_code samba_kdc_map_policy_err(NTSTATUS nt_status);