diff options
author | Volker Lendecke <vl@samba.org> | 2008-07-21 12:05:46 +0200 |
---|---|---|
committer | Volker Lendecke <vl@samba.org> | 2008-07-21 14:36:31 +0200 |
commit | abce3cdf56e635465e3c5f0bf7340e101c743ed2 (patch) | |
tree | 310a24188b8cbe789e43465a99b027abdd11714e | |
parent | d460ead4680780acb5fded5b33124711de23e536 (diff) | |
download | samba-abce3cdf56e635465e3c5f0bf7340e101c743ed2.tar.gz samba-abce3cdf56e635465e3c5f0bf7340e101c743ed2.tar.bz2 samba-abce3cdf56e635465e3c5f0bf7340e101c743ed2.zip |
Remove some unused code
(This used to be commit b60a681dd09349426aa522d697abacf62ebfdaf2)
-rw-r--r-- | source3/rpc_client/cli_netlogon.c | 91 |
1 files changed, 0 insertions, 91 deletions
diff --git a/source3/rpc_client/cli_netlogon.c b/source3/rpc_client/cli_netlogon.c index 8b905e95fa..fcce18dfc0 100644 --- a/source3/rpc_client/cli_netlogon.c +++ b/source3/rpc_client/cli_netlogon.c @@ -22,97 +22,6 @@ #include "includes.h" -/* LSA Request Challenge. Sends our challenge to server, then gets - server response. These are used to generate the credentials. - The sent and received challenges are stored in the netlog pipe - private data. Only call this via rpccli_netlogon_setup_creds(). JRA. -*/ - -/* instead of rpccli_net_req_chal() we use rpccli_netr_ServerReqChallenge() now - gd */ - -#if 0 -/**************************************************************************** -LSA Authenticate 2 - -Send the client credential, receive back a server credential. -Ensure that the server credential returned matches the session key -encrypt of the server challenge originally received. JRA. -****************************************************************************/ - - NTSTATUS rpccli_net_auth2(struct rpc_pipe_client *cli, - uint16 sec_chan, - uint32 *neg_flags, DOM_CHAL *srv_chal) -{ - prs_struct qbuf, rbuf; - NET_Q_AUTH_2 q; - NET_R_AUTH_2 r; - NTSTATUS result = NT_STATUS_UNSUCCESSFUL; - fstring machine_acct; - - if ( sec_chan == SEC_CHAN_DOMAIN ) - fstr_sprintf( machine_acct, "%s$", lp_workgroup() ); - else - fstrcpy( machine_acct, cli->mach_acct ); - - /* create and send a MSRPC command with api NET_AUTH2 */ - - DEBUG(4,("cli_net_auth2: srv:%s acct:%s sc:%x mc: %s chal %s neg: %x\n", - cli->srv_name_slash, machine_acct, sec_chan, global_myname(), - credstr(cli->clnt_cred.challenge.data), *neg_flags)); - - /* store the parameters */ - - init_q_auth_2(&q, cli->srv_name_slash, machine_acct, - sec_chan, global_myname(), &cli->clnt_cred.challenge, - *neg_flags); - - /* turn parameters into data stream */ - - CLI_DO_RPC(cli, mem_ctx, PI_NETLOGON, NET_AUTH2, - q, r, - qbuf, rbuf, - net_io_q_auth_2, - net_io_r_auth_2, - NT_STATUS_UNSUCCESSFUL); - - result = r.status; - - if (NT_STATUS_IS_OK(result)) { - UTIME zerotime; - - /* - * Check the returned value using the initial - * server received challenge. - */ - - zerotime.time = 0; - if (cred_assert( &r.srv_chal, cli->sess_key, srv_chal, zerotime) == 0) { - - /* - * Server replied with bad credential. Fail. - */ - DEBUG(0,("cli_net_auth2: server %s replied with bad credential (bad machine \ -password ?).\n", cli->cli->desthost )); - return NT_STATUS_ACCESS_DENIED; - } - *neg_flags = r.srv_flgs.neg_flags; - } - - return result; -} -#endif - -/**************************************************************************** - LSA Authenticate 2 - - Send the client credential, receive back a server credential. - The caller *must* ensure that the server credential returned matches the session key - encrypt of the server challenge originally received. JRA. -****************************************************************************/ - -/* instead of rpccli_net_auth2() we use rpccli_netr_ServerAuthenticate2() now - gd */ - - /**************************************************************************** Wrapper function that uses the auth and auth2 calls to set up a NETLOGON credentials chain. Stores the credentials in the struct dcinfo in the |