} auth_user_info_torture;
typedef [public] struct {
- /* These match exactly the values from the
- * auth_serversupplied_info, but should be changed to
- * checks involving just the SIDs */
- boolean8 system;
-
[unique,charset(UTF8),string] char *unix_name;
/*
session_info->unix_info->sanitized_username =
talloc_strdup(session_info->unix_info, tmp);
- session_info->unix_info->system = server_info->system;
-
if (session_key) {
data_blob_free(&session_info->session_key);
session_info->session_key = data_blob_talloc(session_info,
return status;
}
- (*session_info)->unix_info->system = true;
-
TALLOC_FREE((*session_info)->security_token->sids);
(*session_info)->security_token->num_sids = 0;
ZERO_STRUCTP(r);
- if (p->session_info->unix_info->system) {
+ if (security_token_is_system(p->session_info->security_token)) {
goto query;
}
session_info->unix_info = talloc_zero(session_info, struct auth_user_info_unix);
NT_STATUS_HAVE_NO_MEMORY(session_info->unix_info);
- session_info->unix_info->system = security_token_is_system(session_info->security_token);
-
session_info->unix_info->unix_name = talloc_asprintf(session_info->unix_info,
"%s%s%s", session_info->info->domain_name,
lpcfg_winbind_separator(lp_ctx),