krb5_error_code
samba_kdc_check_s4u2proxy(krb5_context context,
struct samba_kdc_db_context *kdc_db_ctx,
- hdb_entry_ex *entry,
+ struct samba_kdc_entry *skdc_entry,
krb5_const_principal target_principal)
{
krb5_error_code ret;
struct ldb_val val;
unsigned int i;
bool found = false;
- struct samba_kdc_entry *p = talloc_get_type(entry->ctx, struct samba_kdc_entry);
TALLOC_CTX *mem_ctx = talloc_named(kdc_db_ctx, 0, "samba_kdc_check_s4u2proxy");
return ret;
}
- client_dn = ldb_dn_get_linearized(p->msg->dn);
+ client_dn = ldb_dn_get_linearized(skdc_entry->msg->dn);
if (!client_dn) {
if (errno == 0) {
errno = ENOMEM;
return ret;
}
- el = ldb_msg_find_element(p->msg, "msDS-AllowedToDelegateTo");
+ el = ldb_msg_find_element(skdc_entry->msg, "msDS-AllowedToDelegateTo");
if (el == NULL) {
goto bad_option;
}
krb5_error_code
samba_kdc_check_s4u2proxy(krb5_context context,
struct samba_kdc_db_context *kdc_db_ctx,
- hdb_entry_ex *entry,
+ struct samba_kdc_entry *skdc_entry,
krb5_const_principal target_principal);
NTSTATUS samba_kdc_setup_db_ctx(TALLOC_CTX *mem_ctx, struct samba_kdc_base_context *base_ctx,
krb5_const_principal target_principal)
{
struct samba_kdc_db_context *kdc_db_ctx;
+ struct samba_kdc_entry *skdc_entry;
kdc_db_ctx = talloc_get_type_abort(db->hdb_db,
struct samba_kdc_db_context);
+ skdc_entry = talloc_get_type_abort(entry->ctx,
+ struct samba_kdc_entry);
return samba_kdc_check_s4u2proxy(context, kdc_db_ctx,
- entry,
+ skdc_entry,
target_principal);
}
ret = samba_kdc_check_s4u2proxy(ctx->context,
ctx->db_ctx,
- entry,
+ skdc_entry,
target_principal);
krb5_free_principal(ctx->context, target_principal);