summaryrefslogtreecommitdiff
path: root/source4/winbind
diff options
context:
space:
mode:
Diffstat (limited to 'source4/winbind')
-rw-r--r--source4/winbind/wb_connect_sam.c2
-rw-r--r--source4/winbind/wb_init_domain.c14
2 files changed, 8 insertions, 8 deletions
diff --git a/source4/winbind/wb_connect_sam.c b/source4/winbind/wb_connect_sam.c
index e9adce9c19..49861b3c33 100644
--- a/source4/winbind/wb_connect_sam.c
+++ b/source4/winbind/wb_connect_sam.c
@@ -69,7 +69,7 @@ struct composite_context *wb_connect_samr_send(TALLOC_CTX *mem_ctx,
secured with SPNEGO, NTLMSSP or SCHANNEL */
ctx = dcerpc_secondary_auth_connection_send(domain->netlogon_pipe,
domain->samr_binding,
- &dcerpc_table_samr,
+ &ndr_table_samr,
domain->libnet_ctx->cred);
composite_continue(state->ctx, ctx, connect_samr_recv_pipe, state);
return result;
diff --git a/source4/winbind/wb_init_domain.c b/source4/winbind/wb_init_domain.c
index 83769b1489..da03f0d406 100644
--- a/source4/winbind/wb_init_domain.c
+++ b/source4/winbind/wb_init_domain.c
@@ -157,7 +157,7 @@ struct composite_context *wb_init_domain_send(TALLOC_CTX *mem_ctx,
cli_credentials_set_machine_account(state->domain->libnet_ctx->cred);
if (!NT_STATUS_IS_OK(state->ctx->status)) goto failed;
- state->domain->netlogon_binding = init_domain_binding(state, &dcerpc_table_netlogon);
+ state->domain->netlogon_binding = init_domain_binding(state, &ndr_table_netlogon);
state->domain->netlogon_pipe = NULL;
@@ -179,7 +179,7 @@ struct composite_context *wb_init_domain_send(TALLOC_CTX *mem_ctx,
/* No encryption on anonymous pipes */
ctx = dcerpc_pipe_connect_b_send(state, state->domain->netlogon_binding,
- &dcerpc_table_netlogon,
+ &ndr_table_netlogon,
state->domain->libnet_ctx->cred,
service->task->event_ctx);
@@ -212,7 +212,7 @@ static void init_domain_recv_netlogonpipe(struct composite_context *ctx)
}
talloc_steal(state->domain->netlogon_pipe, state->domain->netlogon_binding);
- state->domain->lsa_binding = init_domain_binding(state, &dcerpc_table_lsarpc);
+ state->domain->lsa_binding = init_domain_binding(state, &ndr_table_lsarpc);
/* For debugging, it can be a real pain if all the traffic is encrypted */
if (lp_winbind_sealed_pipes()) {
@@ -227,7 +227,7 @@ static void init_domain_recv_netlogonpipe(struct composite_context *ctx)
secured with SPNEGO or NTLMSSP */
ctx = dcerpc_secondary_auth_connection_send(state->domain->netlogon_pipe,
state->domain->lsa_binding,
- &dcerpc_table_lsarpc,
+ &ndr_table_lsarpc,
state->domain->libnet_ctx->cred
);
composite_continue(state->ctx, ctx, init_domain_recv_lsa_pipe, state);
@@ -275,7 +275,7 @@ static void init_domain_recv_lsa_pipe(struct composite_context *ctx)
&state->domain->libnet_ctx->lsa.pipe);
if (NT_STATUS_EQUAL(state->ctx->status, NT_STATUS_LOGON_FAILURE)) {
if (retry_with_schannel(state, state->domain->lsa_binding,
- &dcerpc_table_lsarpc,
+ &ndr_table_lsarpc,
init_domain_recv_lsa_pipe)) {
return;
}
@@ -315,7 +315,7 @@ static void init_domain_recv_lsa_policy(struct rpc_request *req)
if ((!NT_STATUS_IS_OK(state->ctx->status)
|| !NT_STATUS_IS_OK(state->lsa_openpolicy.out.result))) {
if (retry_with_schannel(state, state->domain->lsa_binding,
- &dcerpc_table_lsarpc,
+ &ndr_table_lsarpc,
init_domain_recv_lsa_pipe)) {
return;
}
@@ -365,7 +365,7 @@ static void init_domain_recv_queryinfo(struct rpc_request *req)
return;
}
- state->domain->samr_binding = init_domain_binding(state, &dcerpc_table_samr);
+ state->domain->samr_binding = init_domain_binding(state, &ndr_table_samr);
/* We want to use the same flags as the LSA pipe did (so, if
* it needed schannel, then we need that here too) */