TALLOC_FREE(keys);
return ENOMEM;
}
+ talloc_keep_secret(arc4_b.data);
#ifdef HAVE_ADS
if (salt_principal == NULL) {
TALLOC_FREE(salt_data);
return ENOMEM;
}
+ talloc_keep_secret(aes_256_b.data);
krb5_ret = smb_krb5_create_key_from_string(krb5_ctx,
NULL,
TALLOC_FREE(salt_data);
return ENOMEM;
}
+ talloc_keep_secret(aes_128_b.data);
krb5_free_context(krb5_ctx);
no_kerberos:
TALLOC_FREE(p);
return status;
}
+ talloc_keep_secret(p->cleartext_blob.data);
mdfour(p->nt_hash.hash,
p->cleartext_blob.data,
p->cleartext_blob.length);
+ talloc_set_destructor(p, password_nt_hash_destructor);
ret = secrets_domain_info_kerberos_keys(p, salt_principal);
if (ret != 0) {
NTSTATUS status = krb5_to_nt_status(ret);