NTSTATUS (*set_challenge)(struct auth4_context *auth_ctx, const uint8_t chal[8], const char *set_by);
- NTSTATUS (*generate_session_info)(TALLOC_CTX *mem_ctx,
- struct auth4_context *auth_context,
+ NTSTATUS (*generate_session_info)(struct auth4_context *auth_context,
+ TALLOC_CTX *mem_ctx,
void *server_returned_info,
const char *original_user_name,
uint32_t session_info_flags,
session_info_flags |= AUTH_SESSION_INFO_DEFAULT_GROUPS;
if (gensec_security->auth_context && gensec_security->auth_context->generate_session_info) {
- nt_status = gensec_security->auth_context->generate_session_info(mem_ctx, gensec_security->auth_context,
+ nt_status = gensec_security->auth_context->generate_session_info(gensec_security->auth_context, mem_ctx,
gensec_ntlmssp->server_returned_info,
gensec_ntlmssp->ntlmssp_state->user,
session_info_flags,
#include "includes.h"
#include "auth.h"
-NTSTATUS auth3_generate_session_info(TALLOC_CTX *mem_ctx,
- struct auth4_context *auth_context,
+NTSTATUS auth3_generate_session_info(struct auth4_context *auth_context,
+ TALLOC_CTX *mem_ctx,
void *server_returned_info,
const char *original_user_name,
uint32_t session_info_flags,
/* The following definitions come from auth/auth_ntlmssp.c */
-NTSTATUS auth3_generate_session_info(TALLOC_CTX *mem_ctx,
- struct auth4_context *auth_context,
+NTSTATUS auth3_generate_session_info(struct auth4_context *auth_context,
+ TALLOC_CTX *mem_ctx,
void *server_returned_info,
const char *original_user_name,
uint32_t session_info_flags,
#include "auth/kerberos/kerberos.h"
#include "auth/kerberos/kerberos_util.h"
-static NTSTATUS auth_generate_session_info_wrapper(TALLOC_CTX *mem_ctx,
- struct auth4_context *auth_context,
- void *server_returned_info,
+static NTSTATUS auth_generate_session_info_wrapper(struct auth4_context *auth_context,
+ TALLOC_CTX *mem_ctx,
+ void *server_returned_info,
const char *original_user_name,
uint32_t session_info_flags,
struct auth_session_info **session_info);
return nt_status;
}
- nt_status = auth_generate_session_info_wrapper(mem_ctx, auth_ctx,
+ nt_status = auth_generate_session_info_wrapper(auth_ctx, mem_ctx,
user_info_dc,
user_info_dc->info->account_name,
session_info_flags, session_info);
* know that session_info is generated from the main ldb, and because
* we need to break a depenency loop between the DCE/RPC layer and the
* generation of unix tokens via IRPC */
-static NTSTATUS auth_generate_session_info_wrapper(TALLOC_CTX *mem_ctx,
- struct auth4_context *auth_context,
+static NTSTATUS auth_generate_session_info_wrapper(struct auth4_context *auth_context,
+ TALLOC_CTX *mem_ctx,
void *server_returned_info,
const char *original_user_name,
uint32_t session_info_flags,
session_info_flags |= AUTH_SESSION_INFO_AUTHENTICATED;
}
- status = auth_generate_session_info_wrapper(mem_ctx, auth_ctx,
+ status = auth_generate_session_info_wrapper(auth_ctx, mem_ctx,
user_info_dc,
user_info_dc->info->account_name,
session_info_flags, session_info);
if (user_info_dc->info->authenticated) {
flags |= AUTH_SESSION_INFO_AUTHENTICATED;
}
- nt_status = auth_context->generate_session_info(tmp_ctx, auth_context,
+ nt_status = auth_context->generate_session_info(auth_context,
+ tmp_ctx,
user_info_dc,
nt4_username,
flags,
flags |= AUTH_SESSION_INFO_AUTHENTICATED;
}
/* This references user_info_dc into session_info */
- status = req->smb_conn->negotiate.auth_context->generate_session_info(req,
- req->smb_conn->negotiate.auth_context,
+ status = req->smb_conn->negotiate.auth_context->generate_session_info(req->smb_conn->negotiate.auth_context,
+ req,
user_info_dc, sess->old.in.user,
flags, &session_info);
if (!NT_STATUS_IS_OK(status)) goto failed;
flags |= AUTH_SESSION_INFO_AUTHENTICATED;
}
/* This references user_info_dc into session_info */
- status = state->auth_context->generate_session_info(req,
- state->auth_context,
+ status = state->auth_context->generate_session_info(state->auth_context,
+ req,
user_info_dc,
sess->nt1.in.user,
flags,