This matches what Samba3 does.
Andrew Bartlett
NTSTATUS (*generate_session_info)(TALLOC_CTX *mem_ctx,
struct auth4_context *auth_context,
void *server_returned_info,
+ const char *original_user_name,
uint32_t session_info_flags,
struct auth_session_info **session_info);
static NTSTATUS auth_generate_session_info_wrapper(TALLOC_CTX *mem_ctx,
struct auth4_context *auth_context,
void *server_returned_info,
- uint32_t session_info_flags,
+ const char *original_user_name,
+ uint32_t session_info_flags,
struct auth_session_info **session_info);
/***************************************************************************
nt_status = auth_generate_session_info_wrapper(mem_ctx, auth_ctx,
user_info_dc,
+ user_info_dc->info->account_name,
session_info_flags, session_info);
talloc_free(user_info_dc);
static NTSTATUS auth_generate_session_info_wrapper(TALLOC_CTX *mem_ctx,
struct auth4_context *auth_context,
void *server_returned_info,
+ const char *original_user_name,
uint32_t session_info_flags,
struct auth_session_info **session_info)
{
return NT_STATUS_INVALID_SERVER_STATE;
}
status = auth_session_info_fill_unix(wbc_ctx, auth_context->lp_ctx,
- *session_info);
+ original_user_name, *session_info);
if (!NT_STATUS_IS_OK(status)) {
TALLOC_FREE(*session_info);
}
status = auth_generate_session_info_wrapper(mem_ctx, auth_ctx,
user_info_dc,
+ user_info_dc->info->account_name,
session_info_flags, session_info);
talloc_free(tmp_ctx);
return status;
}
nt_status = auth_context->generate_session_info(tmp_ctx, auth_context,
user_info_dc,
+ nt4_username,
flags,
session_info);
if (gensec_security->auth_context && gensec_security->auth_context->generate_session_info) {
nt_status = gensec_security->auth_context->generate_session_info(mem_ctx, gensec_security->auth_context,
gensec_ntlmssp->server_returned_info,
+ gensec_ntlmssp->ntlmssp_state->user,
session_info_flags,
session_info);
} else {
/*
Fill in the auth_user_info_unix and auth_unix_token elements in a struct session_info
*/
-NTSTATUS auth_session_info_fill_unix( struct wbc_context *wbc_ctx,
+NTSTATUS auth_session_info_fill_unix(struct wbc_context *wbc_ctx,
struct loadparm_context *lp_ctx,
+ const char *original_user_name,
struct auth_session_info *session_info)
{
char *su;
session_info->info->account_name);
NT_STATUS_HAVE_NO_MEMORY(session_info->unix_info->unix_name);
- len = strlen(session_info->info->account_name) + 1;
+ len = strlen(original_user_name) + 1;
session_info->unix_info->sanitized_username = su = talloc_array(session_info->unix_info, char, len);
NT_STATUS_HAVE_NO_MEMORY(su);
- alpha_strcpy(su, session_info->info->account_name,
+ alpha_strcpy(su, original_user_name,
". _-$", len);
return NT_STATUS_OK;
/* This references user_info_dc into session_info */
status = req->smb_conn->negotiate.auth_context->generate_session_info(req,
req->smb_conn->negotiate.auth_context,
- user_info_dc, flags, &session_info);
+ user_info_dc, sess->old.in.user,
+ flags, &session_info);
if (!NT_STATUS_IS_OK(status)) goto failed;
/* allocate a new session */
status = state->auth_context->generate_session_info(req,
state->auth_context,
user_info_dc,
+ sess->nt1.in.user,
flags,
&session_info);
if (!NT_STATUS_IS_OK(status)) goto failed;