Hans Leidekker (@hans) commented about dlls/kerberos/krb5_ap.c:
{ struct context_handle *context_handle = (void *)context;
struct verify_signature_params params = { context_handle->handle, message, quality_of_protection };
struct verify_signature_params params;
int data_idx, token_idx;
if ((data_idx = get_buffer_index( message, SECBUFFER_DATA )) == -1) return SEC_E_INVALID_TOKEN;
if ((token_idx = get_buffer_index( message, SECBUFFER_TOKEN )) == -1) return SEC_E_INVALID_TOKEN;
params.context = context_handle->handle;
params.data_length = message->pBuffers[data_idx].cbBuffer;
params.data = message->pBuffers[data_idx].pvBuffer;
params.token_length = message->pBuffers[token_idx].cbBuffer;
params.token = message->pBuffers[token_idx].pvBuffer;
return KRB5_CALL( verify_signature, ¶ms );
quality_of_protection should still be passed to the Unix call.