struct auth_method_context *methods;
/* the event context to use for calls that can block */
- struct tevent_context *event_ctx;
+ //struct tevent_context *event_ctx;
/* the messaging context which can be used by backends */
struct imessaging_context *msg_ctx;
NTSTATUS status;
/*TODO: create a new event context here! */
- ev = auth_ctx->event_ctx;
+ ev = NULL;//auth_ctx->event_ctx;
subreq = auth_check_password_send(mem_ctx,
ev,
NT_STATUS_HAVE_NO_MEMORY(ctx);
ctx->challenge.data = data_blob(NULL, 0);
ctx->methods = NULL;
- ctx->event_ctx = ev;
+// ctx->event_ctx = ev;
ctx->msg_ctx = msg;
ctx->lp_ctx = lp_ctx;
ctx->start_time = timeval_current();
ctx->sam_ctx = sam_ctx;
} else {
ctx->sam_ctx = samdb_connect(ctx,
- ctx->event_ctx,
+ NULL, //ctx->event_ctx,
ctx->lp_ctx,
system_session(ctx->lp_ctx),
NULL,
*/
auth_sam_trigger_repl_secret(auth_context,
auth_context->msg_ctx,
- auth_context->event_ctx,
+ NULL,//auth_context->event_ctx,
msg->dn);
TALLOC_FREE(tmp_ctx);
return NT_STATUS_NOT_IMPLEMENTED;
if (send_to_sam != NULL) {
auth_sam_trigger_zero_password(tmp_ctx,
auth_context->msg_ctx,
- auth_context->event_ctx,
+ NULL,//auth_context->event_ctx,
send_to_sam);
}
state->log(ISC_LOG_INFO, "samba_dlz: started for DN %s",
ldb_dn_get_linearized(dn));
- state->auth_context->event_ctx = state->ev_ctx;
+ //state->auth_context->event_ctx = state->ev_ctx;
state->auth_context->lp_ctx = state->lp;
state->auth_context->sam_ctx = state->samdb;
state->auth_context->generate_session_info_pac = b9_generate_session_info_pac;