username));
}
+ if (lm_sess_key) {
+ *lm_sess_key = data_blob(NULL, 0);
+ }
+ if (user_sess_key) {
+ *user_sess_key = data_blob(NULL, 0);
+ }
+
if (nt_interactive_password && nt_interactive_password->length && nt_pw) {
if (nt_interactive_password->length != 16) {
DEBUG(3,("ntlm_password_check: Interactive logon: Invalid NT password length (%d) supplied for user %s\n", (int)nt_interactive_password->length,
mem_ctx,
&server_info);
+ /* keep the auth_context for the life of this call */
+ talloc_steal(dce_call, auth_context);
+
if (!NT_STATUS_IS_OK(nt_status)) {
- free_auth_context(&auth_context);
return nt_status;
}
- free_auth_context(&auth_context);
sam = talloc_p(mem_ctx, struct netr_SamBaseInfo);