struct policy_handle lsa_policy;
struct rpc_pipe_client *netlogon_pipe;
- struct netlogon_creds_cli_context *netlogon_creds;
+ struct netlogon_creds_cli_context *netlogon_creds_ctx;
uint32_t netlogon_flags;
bool netlogon_force_reauth;
};
conn->auth_level = DCERPC_AUTH_LEVEL_PRIVACY;
conn->netlogon_force_reauth = false;
conn->netlogon_flags = 0;
- TALLOC_FREE(conn->netlogon_creds);
+ TALLOC_FREE(conn->netlogon_creds_ctx);
if (conn->cli) {
cli_shutdown(conn->cli);
return NT_STATUS_TRUSTED_DOMAIN_FAILURE;
}
- if (domain->conn.netlogon_creds != NULL) {
+ if (domain->conn.netlogon_creds_ctx != NULL) {
if (!(domain->conn.netlogon_flags & NETLOGON_NEG_AUTHENTICATED_RPC)) {
return NT_STATUS_TRUSTED_DOMAIN_FAILURE;
}
- *ppdc = domain->conn.netlogon_creds;
+ *ppdc = domain->conn.netlogon_creds_ctx;
return NT_STATUS_OK;
}
return result;
}
- if (domain->conn.netlogon_creds == NULL) {
+ if (domain->conn.netlogon_creds_ctx == NULL) {
return NT_STATUS_TRUSTED_DOMAIN_FAILURE;
}
return NT_STATUS_TRUSTED_DOMAIN_FAILURE;
}
- *ppdc = domain->conn.netlogon_creds;
+ *ppdc = domain->conn.netlogon_creds_ctx;
return NT_STATUS_OK;
}
TALLOC_FREE(conn->netlogon_pipe);
conn->netlogon_flags = 0;
- TALLOC_FREE(conn->netlogon_creds);
+ TALLOC_FREE(conn->netlogon_creds_ctx);
result = get_trust_credentials(domain, talloc_tos(), true, &creds);
if (!NT_STATUS_IS_OK(result)) {
domain->dcname,
msg_ctx,
domain,
- &conn->netlogon_creds);
+ &conn->netlogon_creds_ctx);
if (!NT_STATUS_IS_OK(result)) {
DEBUG(1, ("rpccli_create_netlogon_creds failed for %s, "
"unable to create NETLOGON credentials: %s\n",
}
result = rpccli_setup_netlogon_creds_with_creds(conn->cli, transport,
- conn->netlogon_creds,
+ conn->netlogon_creds_ctx,
conn->netlogon_force_reauth,
creds);
conn->netlogon_force_reauth = false;
return result;
}
- result = netlogon_creds_cli_get(conn->netlogon_creds,
+ result = netlogon_creds_cli_get(conn->netlogon_creds_ctx,
talloc_tos(),
&netlogon_creds);
if (!NT_STATUS_IS_OK(result)) {
result = cli_rpc_pipe_open_schannel_with_creds(
conn->cli, &ndr_table_netlogon, transport,
creds,
- conn->netlogon_creds,
+ conn->netlogon_creds_ctx,
&conn->netlogon_pipe);
if (!NT_STATUS_IS_OK(result)) {
DEBUG(3, ("Could not open schannel'ed NETLOGON pipe. Error "
return;
}
- result = trust_pw_change(child->domain->conn.netlogon_creds,
+ result = trust_pw_change(child->domain->conn.netlogon_creds_ctx,
msg_ctx,
netlogon_pipe->binding_handle,
child->domain->name,
goto done;
}
- status = trust_pw_change(domain->conn.netlogon_creds,
+ status = trust_pw_change(domain->conn.netlogon_creds_ctx,
msg_ctx,
netlogon_pipe->binding_handle,
domain->name,
goto done;
}
- status = netlogon_creds_cli_DsrUpdateReadOnlyServerDnsRecords(domain->conn.netlogon_creds,
+ status = netlogon_creds_cli_DsrUpdateReadOnlyServerDnsRecords(domain->conn.netlogon_creds_ctx,
netlogon_pipe->binding_handle,
r->in.site_name,
r->in.dns_ttl,
}
if (fetch_fti) {
- status = netlogon_creds_cli_GetForestTrustInformation(domain->conn.netlogon_creds,
+ status = netlogon_creds_cli_GetForestTrustInformation(domain->conn.netlogon_creds_ctx,
b, frame,
&new_fti);
if (NT_STATUS_EQUAL(status, NT_STATUS_RPC_PROCNUM_OUT_OF_RANGE)) {
}
}
- status = netlogon_creds_cli_ServerGetTrustInfo(domain->conn.netlogon_creds,
+ status = netlogon_creds_cli_ServerGetTrustInfo(domain->conn.netlogon_creds_ctx,
b, frame,
&new_owf_password,
&old_owf_password,
}
TALLOC_FREE(cur_nt_hash);
- status = trust_pw_change(domain->conn.netlogon_creds,
+ status = trust_pw_change(domain->conn.netlogon_creds_ctx,
msg_ctx, b, domain->name,
domain->dcname,
true); /* force */
}
b = netlogon_pipe->binding_handle;
- status = netlogon_creds_cli_GetForestTrustInformation(domain->conn.netlogon_creds,
+ status = netlogon_creds_cli_GetForestTrustInformation(domain->conn.netlogon_creds_ctx,
b, p->mem_ctx,
&new_fti);
if (!NT_STATUS_IS_OK(status)) {
return status;
}
- status = netlogon_creds_cli_SendToSam(domain->conn.netlogon_creds,
+ status = netlogon_creds_cli_SendToSam(domain->conn.netlogon_creds_ctx,
netlogon_pipe->binding_handle,
&r->in.message);
return result;
}
netr_attempts = 0;
- if (domain->conn.netlogon_creds == NULL) {
+ if (domain->conn.netlogon_creds_ctx == NULL) {
DBG_NOTICE("No security credentials available for "
"domain [%s]\n", domainname);
result = NT_STATUS_CANT_ACCESS_DOMAIN_INFO;
} else if (interactive) {
- result = rpccli_netlogon_password_logon(domain->conn.netlogon_creds,
+ result = rpccli_netlogon_password_logon(domain->conn.netlogon_creds_ctx,
netlogon_pipe->binding_handle,
mem_ctx,
logon_parameters,
flags,
info3);
} else {
- result = rpccli_netlogon_network_logon(domain->conn.netlogon_creds,
+ result = rpccli_netlogon_network_logon(domain->conn.netlogon_creds_ctx,
netlogon_pipe->binding_handle,
mem_ctx,
logon_parameters,