srv_flgs |= NETLOGON_NEG_SCHANNEL;
}
- *r->out.negotiate_flags = srv_flgs;
-
switch (p->hdr_req.opnum) {
case NDR_NETR_SERVERAUTHENTICATE2:
fn = "_netr_ServerAuthenticate2";
if (!p->dc || !p->dc->challenge_sent) {
DEBUG(0,("%s: no challenge sent to client %s\n", fn,
r->in.computer_name));
+ *r->out.negotiate_flags = srv_flgs;
return NT_STATUS_ACCESS_DENIED;
}
DEBUG(0,("%s: schannel required but client failed "
"to offer it. Client was %s\n",
fn, r->in.account_name));
+ *r->out.negotiate_flags = srv_flgs;
return NT_STATUS_ACCESS_DENIED;
}
"account %s: %s\n",
fn, r->in.account_name, nt_errstr(status) ));
/* always return NT_STATUS_ACCESS_DENIED */
+ *r->out.negotiate_flags = srv_flgs;
return NT_STATUS_ACCESS_DENIED;
}
"request from client %s machine account %s\n",
fn, r->in.computer_name,
r->in.account_name));
+ *r->out.negotiate_flags = srv_flgs;
return NT_STATUS_ACCESS_DENIED;
}
/* set up the LSA AUTH 2 response */
p->dc);
unbecome_root();
+ *r->out.negotiate_flags = srv_flgs;
+
return NT_STATUS_OK;
}