NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
DOM_SID dom_sid;
uint32 access_mask = SEC_RIGHTS_MAXIMUM_ALLOWED;
- union lsa_TrustedDomainInfo info;
+ union lsa_TrustedDomainInfo *info = NULL;
enum lsa_TrustDomInfoEnum info_class = 1;
if (argc > 3 || argc < 2) {
if (!NT_STATUS_IS_OK(result))
goto done;
- display_trust_dom_info(mem_ctx, &info, info_class, cli->pwd.password);
+ display_trust_dom_info(mem_ctx, info, info_class, cli->pwd.password);
done:
rpccli_lsa_Close(cli, mem_ctx, &pol);
POLICY_HND pol, trustdom_pol;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
uint32 access_mask = SEC_RIGHTS_MAXIMUM_ALLOWED;
- union lsa_TrustedDomainInfo info;
+ union lsa_TrustedDomainInfo *info = NULL;
DOM_SID dom_sid;
enum lsa_TrustDomInfoEnum info_class = 1;
if (!NT_STATUS_IS_OK(result))
goto done;
- display_trust_dom_info(mem_ctx, &info, info_class, cli->pwd.password);
+ display_trust_dom_info(mem_ctx, info, info_class, cli->pwd.password);
done:
rpccli_lsa_Close(cli, mem_ctx, &pol);
const char *trusted_dom_name)
{
NTSTATUS nt_status;
- union lsa_TrustedDomainInfo info;
+ union lsa_TrustedDomainInfo *info = NULL;
char *cleartextpwd = NULL;
DATA_BLOB data;
goto done;
}
- data = data_blob(NULL, info.password.password->length);
-
- memcpy(data.data,
- info.password.password->data,
- info.password.password->length);
- data.length = info.password.password->length;
+ data = data_blob(info->password.password->data,
+ info->password.password->length);
cleartextpwd = decrypt_trustdom_secret(pipe_hnd->cli->pwd.password,
&data);