const char *target_principal = gensec_get_target_principal(gensec_security);
const char *hostname = gensec_get_target_hostname(gensec_security);
const char *service = gensec_get_target_service(gensec_security);
- const char *client_realm = cli_credentials_get_realm(cli_creds);
- const char *server_realm = NULL;
gss_OID gss_oid_p = NULL;
OM_uint32 time_req = 0;
OM_uint32 time_rec = 0;
switch (gensec_security->gensec_role) {
case GENSEC_CLIENT:
{
+ const char *client_realm = NULL;
#ifdef SAMBA4_USES_HEIMDAL
struct gsskrb5_send_to_kdc send_to_kdc;
krb5_error_code ret;
* transitive forest trusts, would have to do the
* fallback ourself.
*/
+ client_realm = cli_credentials_get_realm(cli_creds);
#ifndef SAMBA4_USES_HEIMDAL
if (gensec_gssapi_state->server_name == NULL) {
nt_status = gensec_gssapi_setup_server_principal(gensec_gssapi_state,
}
#endif /* !SAMBA4_USES_HEIMDAL */
if (gensec_gssapi_state->server_name == NULL) {
+ const char *server_realm = NULL;
+
server_realm = smb_krb5_get_realm_from_hostname(gensec_gssapi_state,
hostname,
client_realm);