krb5_error_code
samba_kdc_check_s4u2self(krb5_context context,
struct samba_kdc_db_context *kdc_db_ctx,
- hdb_entry_ex *entry,
+ struct samba_kdc_entry *skdc_entry,
krb5_const_principal target_principal)
{
krb5_error_code ret;
struct ldb_message *msg;
struct dom_sid *orig_sid;
struct dom_sid *target_sid;
- struct samba_kdc_entry *p = talloc_get_type(entry->ctx, struct samba_kdc_entry);
const char *delegation_check_attrs[] = {
"objectSid", NULL
};
return ret;
}
- orig_sid = samdb_result_dom_sid(mem_ctx, p->msg, "objectSid");
+ orig_sid = samdb_result_dom_sid(mem_ctx, skdc_entry->msg, "objectSid");
target_sid = samdb_result_dom_sid(mem_ctx, msg, "objectSid");
/* Allow delegation to the same principal, even if by a different
krb5_error_code
samba_kdc_check_s4u2self(krb5_context context,
struct samba_kdc_db_context *kdc_db_ctx,
- hdb_entry_ex *entry,
+ struct samba_kdc_entry *skdc_entry,
krb5_const_principal target_principal);
krb5_error_code
krb5_const_principal target_principal)
{
struct samba_kdc_db_context *kdc_db_ctx;
+ struct samba_kdc_entry *skdc_entry;
kdc_db_ctx = talloc_get_type_abort(db->hdb_db,
struct samba_kdc_db_context);
+ skdc_entry = talloc_get_type_abort(entry->ctx,
+ struct samba_kdc_entry);
return samba_kdc_check_s4u2self(context, kdc_db_ctx,
- entry,
- target_principal);
+ skdc_entry,
+ target_principal);
}
static krb5_error_code hdb_samba4_auth_status(krb5_context context, HDB *db,