* and computers should never be members of Protected Users, or
* they may fail to authenticate.
*/
- status = samba_kdc_get_user_info_from_db(mem_ctx, p, msg, &user_info_dc);
+ status = samba_kdc_get_user_info_from_db(p, msg, &user_info_dc);
if (!NT_STATUS_IS_OK(status)) {
ret = EINVAL;
goto out;
* structure. If the resulting structure is not talloc_free()d, it will be
* reused on future calls to this function.
*/
-NTSTATUS samba_kdc_get_user_info_from_db(TALLOC_CTX *mem_ctx,
- struct samba_kdc_entry *skdc_entry,
+NTSTATUS samba_kdc_get_user_info_from_db(struct samba_kdc_entry *skdc_entry,
const struct ldb_message *msg,
const struct auth_user_info_dc **user_info_dc)
{
NTSTATUS nt_status;
const struct auth_user_info_dc *user_info_dc = NULL;
- nt_status = samba_kdc_get_user_info_from_db(mem_ctx, skdc_entry, skdc_entry->msg, &user_info_dc);
+ nt_status = samba_kdc_get_user_info_from_db(skdc_entry, skdc_entry->msg, &user_info_dc);
if (!NT_STATUS_IS_OK(nt_status)) {
DBG_ERR("Getting user info for PAC failed: %s\n",
nt_errstr(nt_status));
goto done;
}
- nt_status = samba_kdc_get_user_info_from_db(mem_ctx, client, client->msg, &user_info_dc);
+ nt_status = samba_kdc_get_user_info_from_db(client, client->msg, &user_info_dc);
if (!NT_STATUS_IS_OK(nt_status)) {
DBG_ERR("Getting user info for PAC failed: %s\n",
nt_errstr(nt_status));
bool *is_in_db,
bool *is_trusted);
-NTSTATUS samba_kdc_get_user_info_from_db(TALLOC_CTX *mem_ctx,
- struct samba_kdc_entry *skdc_entry,
+NTSTATUS samba_kdc_get_user_info_from_db(struct samba_kdc_entry *skdc_entry,
const struct ldb_message *msg,
const struct auth_user_info_dc **user_info_dc);