[PATCH 20/20] kerberos: Don't fail InitializeSecurityContext if there are unsupported flags.

Dmitry Timoshkov dmitry at baikal.ru
Thu Jan 18 09:52:10 CST 2018


Kerberos Authentication Tester passes ISC_REQ_CONNECTION along with some other
flags that currently lead InitializeSecurityContext to fail. With this patch
applied, and the patch that implements switch between NTLM and Kerberos in
Negotiate provider Kerberos Authentication Tester works in the real Kerberos
environment.

This is another fix to make Kerberos Authentication Tester work.

Signed-off-by: Dmitry Timoshkov <dmitry at baikal.ru>
---
 dlls/kerberos/krb5_ap.c | 3 ---
 1 file changed, 3 deletions(-)

diff --git a/dlls/kerberos/krb5_ap.c b/dlls/kerberos/krb5_ap.c
index cdfbbd66bc..640eff7855 100644
--- a/dlls/kerberos/krb5_ap.c
+++ b/dlls/kerberos/krb5_ap.c
@@ -471,10 +471,7 @@ static NTSTATUS NTAPI kerberos_SpInitLsaModeContext( LSA_SEC_HANDLE credential,
            context_req, target_data_rep, input, new_context, output, context_attr, ts_expiry,
            mapped_context, context_data );
     if (context_req & ~supported)
-    {
         FIXME( "flags 0x%08x not supported\n", context_req & ~supported );
-        return SEC_E_UNSUPPORTED_FUNCTION;
-    }
 
     if (!context && !input && !credential) return SEC_E_INVALID_HANDLE;
     cred_handle = credhandle_sspi_to_gss( credential );
-- 
2.15.1




More information about the wine-devel mailing list