* guest.
*
* This is a lossy conversion. Variables known to be lost so far
- * include: nss_token (not needed because the only read doesn't happen
+ * include:
+ *
+ * - nss_token (not needed because the only read doesn't happen
* for the GUEST user, as this routine populates ->security_token
+ *
+ * - extra (not needed because the guest account mut have a valid RID per the output of get_guest_info3())
*/
static struct auth_serversupplied_info *copy_session_info_serverinfo(TALLOC_CTX *mem_ctx,
const struct auth3_session_info *src)
TALLOC_FREE(dst);
return NULL;
}
- dst->extra = src->extra;
dst->unix_name = talloc_strdup(dst, src->unix_info->unix_name);
if (!dst->unix_name) {
TALLOC_FREE(dst);
return NULL;
}
- dst->extra = src->extra;
dst->unix_info = talloc_zero(dst, struct auth_user_info_unix);
if (!dst->unix_info) {
TALLOC_FREE(dst);
return NULL;
}
- dst->extra = src->extra;
if (src->unix_info) {
dst->unix_info = talloc_zero(dst, struct auth_user_info_unix);
struct netr_SamInfo3 *info3;
- /* this structure is filled *only* in pathological cases where the user
- * sid or the primary group sid are not sids of the domain. Normally
- * this happens only for unix accounts that have unix domain sids.
- * This is checked only when info3.rid and/or info3.primary_gid are set
- * to the special invalid value of 0xFFFFFFFF */
- struct extra_auth_info extra;
-
struct auth_user_info_unix *unix_info;
};