}
creds->ex->client_sid = *client_sid;
- creds->sid = &creds->ex->client_sid;
-
if (negotiate_flags & NETLOGON_NEG_SUPPORTS_AES) {
status = netlogon_creds_init_hmac_sha256(creds,
client_challenge,
*creds->ex = *creds_in->ex;
}
- if (creds->ex != NULL) {
- creds->sid = &creds->ex->client_sid;
- } else {
- creds->sid = NULL;
- }
-
memcpy(creds->session_key, creds_in->session_key, sizeof(creds->session_key));
memcpy(creds->seed.data, creds_in->seed.data, sizeof(creds->seed.data));
memcpy(creds->client.data, creds_in->client.data, sizeof(creds->client.data));
return NT_STATUS_INTERNAL_ERROR;
}
- if (creds->sid == NULL) {
- return NT_STATUS_INTERNAL_ERROR;
- }
-
if (strlen(creds->computer_name) > 15) {
/*
* We may want to check for a completely
goto done;
}
- creds->sid = &creds->ex->client_sid;
-
DEBUG(3,("schannel_fetch_session_key_tdb: restored schannel info key %s\n",
keystr));
netr_SchannelType secure_channel_type;
[string,charset(UTF8)] uint8 computer_name[];
[string,charset(UTF8)] uint8 account_name[];
- [skip] dom_sid *sid;
netlogon_creds_CredentialState_extra_info *ex;
} netlogon_creds_CredentialState;