auth: Add a new cli_credentials_ccache_init()
[metze/samba/wip.git] / auth / credentials / credentials_internal.h
index 5a3655b7352828895df6bf0f3e4ea3afc765c0fb..faf6a92dec4ee2b00522e1c5b5c755ee18cbe9af 100644 (file)
@@ -32,6 +32,7 @@ struct cli_credentials {
        enum credentials_obtained domain_obtained;
        enum credentials_obtained realm_obtained;
        enum credentials_obtained ccache_obtained;
+       enum credentials_obtained krb5_ccache_obtained;
        enum credentials_obtained client_gss_creds_obtained;
        enum credentials_obtained principal_obtained;
        enum credentials_obtained keytab_obtained;
@@ -60,12 +61,14 @@ struct cli_credentials {
 
        /* Allows authentication from a keytab or similar */
        struct samr_Password *nt_hash;
+       struct samr_Password *old_nt_hash;
 
        /* Allows NTLM pass-though authentication */
        DATA_BLOB lm_response;
        DATA_BLOB nt_response;
 
        struct ccache_container *ccache;
+       struct ccache_container *krb5_ccache;
        struct gssapi_creds_container *client_gss_creds;
        struct keytab_container *keytab;
        struct gssapi_creds_container *server_gss_creds;
@@ -101,14 +104,21 @@ struct cli_credentials {
        /* Should we get a forwardable ticket? */
        enum credentials_krb_forwardable krb_forwardable;
 
+       /* Forced SASL mechansim */
+       char *forced_sasl_mech;
+
        /* gensec features which should be used for connections */
        uint32_t gensec_features;
 
        /* Number of retries left before bailing out */
-       int tries;
+       uint32_t password_tries;
 
        /* Whether any callback is currently running */
        bool callback_running;
+
+       char winbind_separator;
+
+       bool password_will_be_nt_hash;
 };
 
 #endif /* __CREDENTIALS_INTERNAL_H__ */