return NT_STATUS_OK;
}
-NTSTATUS wbc_xids_to_sids(struct tevent_context *ev, struct id_map *ids,
- uint32_t count)
+NTSTATUS wbc_xids_to_sids(struct id_map *ids, uint32_t count)
{
TALLOC_CTX *mem_ctx;
uint32_t i;
NTSTATUS wbc_sids_to_xids(struct id_map *ids, uint32_t count);
-NTSTATUS wbc_xids_to_sids(struct tevent_context *ev, struct id_map *ids,
- uint32_t count);
+NTSTATUS wbc_xids_to_sids(struct id_map *ids, uint32_t count);
ids[1].xid.type = ID_TYPE_GID;
ids[1].sid = NULL;
- status = wbc_xids_to_sids(pvfs->ntvfs->ctx->event_ctx, ids, 2);
+ status = wbc_xids_to_sids(ids, 2);
NT_STATUS_NOT_OK_RETURN(status);
sd->owner_sid = talloc_steal(sd, ids[0].sid);
ids[1].sid = NULL;
ids[1].status = ID_UNKNOWN;
- status = wbc_xids_to_sids(pvfs->ntvfs->ctx->event_ctx, ids, 2);
+ status = wbc_xids_to_sids(ids, 2);
if (!NT_STATUS_IS_OK(status)) {
TALLOC_FREE(tmp_ctx);
return status;
/* Allocate memory for the sids from the security descriptor to be on
* the safe side. */
- status = wbc_xids_to_sids(pvfs->ntvfs->ctx->event_ctx, ids, num_ids);
+ status = wbc_xids_to_sids(ids, num_ids);
NT_STATUS_NOT_OK_RETURN(status);
sd->owner_sid = talloc_steal(sd, ids[0].sid);
ids->xid.id = uid;
ids->xid.type = ID_TYPE_UID;
- status = wbc_xids_to_sids(dce_call->event_ctx, ids, 1);
+ status = wbc_xids_to_sids(ids, 1);
NT_STATUS_NOT_OK_RETURN(status);
r->out.sid = ids->sid;
ids->xid.id = gid;
ids->xid.type = ID_TYPE_GID;
- status = wbc_xids_to_sids(dce_call->event_ctx, ids, 1);
+ status = wbc_xids_to_sids(ids, 1);
NT_STATUS_NOT_OK_RETURN(status);
r->out.sid = ids->sid;