#endif
}
-bool get_krb5_smb_session_key(TALLOC_CTX *mem_ctx,
- krb5_context context,
- krb5_auth_context auth_context,
- DATA_BLOB *session_key, bool remote)
+bool smb_krb5_get_smb_session_key(TALLOC_CTX *mem_ctx,
+ krb5_context context,
+ krb5_auth_context auth_context,
+ DATA_BLOB *session_key,
+ bool remote)
{
krb5_keyblock *skey = NULL;
krb5_error_code err = 0;
goto failed;
}
- ok = get_krb5_smb_session_key(mem_ctx,
- context,
- auth_context,
- session_key_krb5,
- false);
+ ok = smb_krb5_get_smb_session_key(mem_ctx,
+ context,
+ auth_context,
+ session_key_krb5,
+ false);
if (!ok) {
retval = ENOMEM;
goto failed;
krb5_error_code smb_krb5_get_allowed_etypes(krb5_context context,
krb5_enctype **enctypes);
-bool get_krb5_smb_session_key(TALLOC_CTX *mem_ctx,
- krb5_context context,
- krb5_auth_context auth_context,
- DATA_BLOB *session_key, bool remote);
+bool smb_krb5_get_smb_session_key(TALLOC_CTX *mem_ctx,
+ krb5_context context,
+ krb5_auth_context auth_context,
+ DATA_BLOB *session_key,
+ bool remote);
+
krb5_error_code smb_krb5_kt_free_entry(krb5_context context, krb5_keytab_entry *kt_entry);
void kerberos_set_creds_enctype(krb5_creds *pcreds, int enctype);
bool kerberos_compatible_enctypes(krb5_context context, krb5_enctype enctype1, krb5_enctype enctype2);
break;
}
- ok = get_krb5_smb_session_key(mem_ctx,
- context,
- auth_context,
- session_key,
- remote);
+ ok = smb_krb5_get_smb_session_key(mem_ctx,
+ context,
+ auth_context,
+ session_key,
+ remote);
if (!ok) {
DEBUG(10, ("KRB5 error getting session key %d\n", err));
return NT_STATUS_NO_USER_SESSION_KEY;