struct rpc_pipe_client *netlogon_pipe;
struct netlogon_creds_cli_context *netlogon_creds_ctx;
- uint32_t netlogon_flags;
bool netlogon_force_reauth;
};
conn->auth_level = DCERPC_AUTH_LEVEL_PRIVACY;
conn->netlogon_force_reauth = false;
- conn->netlogon_flags = 0;
TALLOC_FREE(conn->netlogon_creds_ctx);
if (conn->cli) {
}
if (domain->conn.netlogon_creds_ctx != NULL) {
- if (!(domain->conn.netlogon_flags & NETLOGON_NEG_AUTHENTICATED_RPC)) {
- return NT_STATUS_TRUSTED_DOMAIN_FAILURE;
- }
*ppdc = domain->conn.netlogon_creds_ctx;
return NT_STATUS_OK;
}
return NT_STATUS_TRUSTED_DOMAIN_FAILURE;
}
- if (!(domain->conn.netlogon_flags & NETLOGON_NEG_AUTHENTICATED_RPC)) {
- return NT_STATUS_TRUSTED_DOMAIN_FAILURE;
- }
-
*ppdc = domain->conn.netlogon_creds_ctx;
return NT_STATUS_OK;
}
}
TALLOC_FREE(conn->netlogon_pipe);
- conn->netlogon_flags = 0;
TALLOC_FREE(conn->netlogon_creds_ctx);
result = get_trust_credentials(domain, talloc_tos(), true, &creds);