/* decode and verify the pac */
nt_status = kerberos_pac_logon_info(mem_ctx, &logon_info, pac_blob,
- gensec_gssapi_state->smb_krb5_context,
+ gensec_gssapi_state->smb_krb5_context->krb5_context,
NULL, keyblock);
if (NT_STATUS_IS_OK(nt_status)) {
/* decode and verify the pac */
nt_status = kerberos_pac_logon_info(gensec_krb5_state, &logon_info, gensec_krb5_state->pac,
- gensec_krb5_state->smb_krb5_context,
+ gensec_krb5_state->smb_krb5_context->krb5_context,
NULL, gensec_krb5_state->keyblock);
/* IF we have the PAC - otherwise we need to get this
NTSTATUS kerberos_decode_pac(TALLOC_CTX *mem_ctx,
struct PAC_DATA **pac_data_out,
DATA_BLOB blob,
- struct smb_krb5_context *smb_krb5_context,
+ krb5_context context,
krb5_keyblock *krbtgt_keyblock,
krb5_keyblock *service_keyblock);
NTSTATUS kerberos_pac_logon_info(TALLOC_CTX *mem_ctx,
struct PAC_LOGON_INFO **logon_info,
DATA_BLOB blob,
- struct smb_krb5_context *smb_krb5_context,
+ krb5_context context,
krb5_keyblock *krbtgt_keyblock,
krb5_keyblock *service_keyblock);
krb5_error_code kerberos_create_pac(TALLOC_CTX *mem_ctx,
NTSTATUS kerberos_decode_pac(TALLOC_CTX *mem_ctx,
struct PAC_DATA **pac_data_out,
DATA_BLOB blob,
- struct smb_krb5_context *smb_krb5_context,
+ krb5_context context,
krb5_keyblock *krbtgt_keyblock,
krb5_keyblock *service_keyblock)
{
/* verify by service_key */
status = check_pac_checksum(mem_ctx,
modified_pac_blob, &srv_sig,
- smb_krb5_context->krb5_context,
+ context,
service_keyblock);
if (!NT_STATUS_IS_OK(status)) {
DEBUG(1, ("PAC Decode: Failed to verify the service signature\n"));
status = check_pac_checksum(mem_ctx,
service_checksum_blob, &kdc_sig,
- smb_krb5_context->krb5_context, krbtgt_keyblock);
+ context, krbtgt_keyblock);
if (!NT_STATUS_IS_OK(status)) {
DEBUG(1, ("PAC Decode: Failed to verify the krbtgt signature\n"));
return status;
NTSTATUS kerberos_pac_logon_info(TALLOC_CTX *mem_ctx,
struct PAC_LOGON_INFO **logon_info,
DATA_BLOB blob,
- struct smb_krb5_context *smb_krb5_context,
+ krb5_context context,
krb5_keyblock *krbtgt_keyblock,
krb5_keyblock *service_keyblock)
{
nt_status = kerberos_decode_pac(mem_ctx, &pac_data,
blob,
- smb_krb5_context,
+ context,
krbtgt_keyblock,
service_keyblock);
if (!NT_STATUS_IS_OK(nt_status)) {
/* Now check that we can read it back */
nt_status = kerberos_decode_pac(mem_ctx, &pac_data,
tmp_blob,
- smb_krb5_context,
+ smb_krb5_context->krb5_context,
&krbtgt_keyblock,
&server_keyblock);
/* Now check that we can read it back */
nt_status = kerberos_pac_logon_info(mem_ctx, &logon_info,
tmp_blob,
- smb_krb5_context,
+ smb_krb5_context->krb5_context,
&krbtgt_keyblock,
&server_keyblock);