static NTSTATUS check_account(TALLOC_CTX *mem_ctx, const char *domain,
const char *username, char **found_username,
- uid_t *uid, gid_t *gid,
+ struct passwd **pwd,
bool *username_was_mapped)
{
fstring dom_user, lower_username;
return NT_STATUS_NO_SUCH_USER;
}
- *uid = passwd->pw_uid;
- *gid = passwd->pw_gid;
+ *pwd = passwd;
/* This is pointless -- there is no suport for differing
unix and windows names. Make sure to always store the
*found_username = talloc_strdup( mem_ctx, real_username );
- TALLOC_FREE(passwd);
-
return NT_STATUS_OK;
}
struct dom_sid user_sid;
struct dom_sid group_sid;
bool username_was_mapped;
-
- uid_t uid = (uid_t)-1;
- gid_t gid = (gid_t)-1;
-
+ struct passwd *pwd;
struct auth_serversupplied_info *result;
/*
/* this call will try to create the user if necessary */
nt_status = check_account(mem_ctx, nt_domain, sent_nt_username,
- &found_username, &uid, &gid,
+ &found_username, &pwd,
&username_was_mapped);
if (!NT_STATUS_IS_OK(nt_status)) {
/* Fill in the unix info we found on the way */
- result->utok.uid = uid;
- result->utok.gid = gid;
+ result->utok.uid = pwd->pw_uid;
+ result->utok.gid = pwd->pw_gid;
/* ensure we are never given NULL session keys */