*/
krb5_ret = dsdb_extract_aes_256_key(io->smb_krb5_context->krb5_context,
io->ac,
+ ldb,
io->ac->search_res->message,
io->u.userAccountControl,
&request_kvno, /* kvno */
*/
krb5_ret = dsdb_extract_aes_256_key(io->smb_krb5_context->krb5_context,
io->ac,
+ ldb,
existing_msg,
io->u.userAccountControl,
NULL, /* kvno */
krb5_error_code samba_kdc_message2entry_keys(krb5_context context,
TALLOC_CTX *mem_ctx,
+ struct ldb_context *ldb,
const struct ldb_message *msg,
bool is_krbtgt,
bool is_rodc,
supported_session_etypes &= kdc_enctypes;
/* Get keys from the db */
- ret = samba_kdc_message2entry_keys(context, p, msg,
+ ret = samba_kdc_message2entry_keys(context, p,
+ kdc_db_ctx->samdb, msg,
is_krbtgt, is_rodc,
userAccountControl,
ent_type, flags, kvno, entry,
(kdc_enctypes & ENC_RC4_HMAC_MD5) != 0)
{
supported_enctypes = ENC_RC4_HMAC_MD5;
- ret = samba_kdc_message2entry_keys(context, p, msg,
+ ret = samba_kdc_message2entry_keys(context, p,
+ kdc_db_ctx->samdb, msg,
is_krbtgt, is_rodc,
userAccountControl,
ent_type, flags, kvno, entry,
krb5_error_code dsdb_extract_aes_256_key(krb5_context context,
TALLOC_CTX *mem_ctx,
+ struct ldb_context *ldb,
const struct ldb_message *msg,
uint32_t user_account_control,
const uint32_t *kvno,
krb5_ret = samba_kdc_message2entry_keys(context,
mem_ctx,
+ ldb,
msg,
false, /* is_krbtgt */
false, /* is_rodc */
*/
krb5_error_code samba_kdc_message2entry_keys(krb5_context context,
TALLOC_CTX *mem_ctx,
+ struct ldb_context *ldb,
const struct ldb_message *msg,
bool is_krbtgt,
bool is_rodc,
krb5_error_code dsdb_extract_aes_256_key(krb5_context context,
TALLOC_CTX *mem_ctx,
+ struct ldb_context *ldb,
const struct ldb_message *msg,
uint32_t user_account_control,
const uint32_t *kvno,