[PATCH 9/9] kerberos: Don't fail InitializeSecurityContext if there are unsupported flags.

Dmitry Timoshkov dmitry at baikal.ru
Wed Jan 24 21:34:08 CST 2018

Kerberos Authentication Tester passes ISC_REQ_CONNECTION along with some other
flags that currently lead InitializeSecurityContext to fail. With this patch
applied, and the patch that implements switch between NTLM and Kerberos in
Negotiate provider Kerberos Authentication Tester works in the real Kerberos

This is another fix to make Kerberos Authentication Tester work.

Signed-off-by: Dmitry Timoshkov <dmitry at baikal.ru>
 dlls/kerberos/krb5_ap.c | 3 ---
 1 file changed, 3 deletions(-)

diff --git a/dlls/kerberos/krb5_ap.c b/dlls/kerberos/krb5_ap.c
index 66c795c377..5fa6783011 100644
--- a/dlls/kerberos/krb5_ap.c
+++ b/dlls/kerberos/krb5_ap.c
@@ -471,10 +471,7 @@ static NTSTATUS NTAPI kerberos_SpInitLsaModeContext( LSA_SEC_HANDLE credential,
            context_req, target_data_rep, input, new_context, output, context_attr, ts_expiry,
            mapped_context, context_data );
     if (context_req & ~supported)
-    {
         FIXME( "flags 0x%08x not supported\n", context_req & ~supported );
-    }
     if (!context && !input && !credential) return SEC_E_INVALID_HANDLE;
     cred_handle = credhandle_sspi_to_gss( credential );

More information about the wine-devel mailing list