diff options
author | Andrew Bartlett <abartlet@samba.org> | 2011-07-26 17:20:35 +1000 |
---|---|---|
committer | Andrew Bartlett <abartlet@samba.org> | 2011-08-03 18:48:03 +1000 |
commit | 6d7ac4f1ad364cac6266bd3e88d141a7517a7d15 (patch) | |
tree | 379f8644e55e5ac500478adac62720a35ee286d8 /source3/smbd/seal.c | |
parent | 763243d6ed470d1ff5c0d1c4ab6cda227103cc15 (diff) | |
download | samba-6d7ac4f1ad364cac6266bd3e88d141a7517a7d15.tar.gz samba-6d7ac4f1ad364cac6266bd3e88d141a7517a7d15.tar.bz2 samba-6d7ac4f1ad364cac6266bd3e88d141a7517a7d15.zip |
s3-ntlmssp Add mem_ctx argument to auth_ntlmssp_update
This clarifies the lifetime of the returned token.
Andrew Bartlett
Signed-off-by: Andrew Tridgell <tridge@samba.org>
Diffstat (limited to 'source3/smbd/seal.c')
-rw-r--r-- | source3/smbd/seal.c | 10 |
1 files changed, 7 insertions, 3 deletions
diff --git a/source3/smbd/seal.c b/source3/smbd/seal.c index e6b683d97f..5481e52fe0 100644 --- a/source3/smbd/seal.c +++ b/source3/smbd/seal.c @@ -478,7 +478,9 @@ static NTSTATUS srv_enc_ntlm_negotiate(const struct tsocket_address *remote_addr return status; } - status = auth_ntlmssp_update(partial_srv_trans_enc_ctx->auth_ntlmssp_state, secblob, &chal); + status = auth_ntlmssp_update(partial_srv_trans_enc_ctx->auth_ntlmssp_state, + partial_srv_trans_enc_ctx->auth_ntlmssp_state, + secblob, &chal); /* status here should be NT_STATUS_MORE_PROCESSING_REQUIRED * for success ... */ @@ -601,7 +603,7 @@ static NTSTATUS srv_enc_spnego_ntlm_auth(connection_struct *conn, return NT_STATUS_INVALID_PARAMETER; } - status = auth_ntlmssp_update(ec->auth_ntlmssp_state, auth, &auth_reply); + status = auth_ntlmssp_update(ec->auth_ntlmssp_state, talloc_tos(), auth, &auth_reply); data_blob_free(&auth); /* From RFC4178. @@ -671,7 +673,9 @@ static NTSTATUS srv_enc_raw_ntlm_auth(connection_struct *conn, } /* Second step. */ - status = auth_ntlmssp_update(partial_srv_trans_enc_ctx->auth_ntlmssp_state, blob, &response); + status = auth_ntlmssp_update(partial_srv_trans_enc_ctx->auth_ntlmssp_state, + talloc_tos(), + blob, &response); if (NT_STATUS_IS_OK(status)) { /* Return the context we're using for this encryption state. */ |