srv_flgs |= NETLOGON_NEG_SCHANNEL;
}
- *r->out.negotiate_flags = srv_flgs;
-
/* We use this as the key to store the creds: */
/* r->in.computer_name */
if (!p->dc || !p->dc->challenge_sent) {
DEBUG(0,("_netr_ServerAuthenticate2: no challenge sent to client %s\n",
r->in.computer_name));
+ *r->out.negotiate_flags = srv_flgs;
return NT_STATUS_ACCESS_DENIED;
}
DEBUG(0,("_netr_ServerAuthenticate2: schannel required but client failed "
"to offer it. Client was %s\n",
r->in.account_name));
+ *r->out.negotiate_flags = srv_flgs;
return NT_STATUS_ACCESS_DENIED;
}
"account %s: %s\n",
r->in.account_name, nt_errstr(status) ));
/* always return NT_STATUS_ACCESS_DENIED */
+ *r->out.negotiate_flags = srv_flgs;
return NT_STATUS_ACCESS_DENIED;
}
"request from client %s machine account %s\n",
r->in.computer_name,
r->in.account_name));
+ *r->out.negotiate_flags = srv_flgs;
return NT_STATUS_ACCESS_DENIED;
}
/* set up the LSA AUTH 2 response */
p->dc);
unbecome_root();
+ *r->out.negotiate_flags = srv_flgs;
+
return NT_STATUS_OK;
}