ids[1].xid.type = ID_TYPE_GID;
ids[1].sid = NULL;
- status = wbc_xids_to_sids(pvfs->wbc_ctx->event_ctx, ids, 2);
+ status = wbc_xids_to_sids(pvfs->ntvfs->ctx->event_ctx, ids, 2);
NT_STATUS_NOT_OK_RETURN(status);
sd->owner_sid = talloc_steal(sd, ids[0].sid);
}
if (!dom_sid_equal(sd->owner_sid, new_sd->owner_sid)) {
ids->sid = new_sd->owner_sid;
- status = wbc_sids_to_xids(pvfs->wbc_ctx->event_ctx,
+ status = wbc_sids_to_xids(pvfs->ntvfs->ctx->event_ctx,
ids, 1);
NT_STATUS_NOT_OK_RETURN(status);
}
if (!dom_sid_equal(sd->group_sid, new_sd->group_sid)) {
ids->sid = new_sd->group_sid;
- status = wbc_sids_to_xids(pvfs->wbc_ctx->event_ctx,
+ status = wbc_sids_to_xids(pvfs->ntvfs->ctx->event_ctx,
ids, 1);
NT_STATUS_NOT_OK_RETURN(status);
ids[1].sid = NULL;
ids[1].status = ID_UNKNOWN;
- status = wbc_xids_to_sids(pvfs->wbc_ctx->event_ctx, ids, 2);
+ status = wbc_xids_to_sids(pvfs->ntvfs->ctx->event_ctx, ids, 2);
NT_STATUS_NOT_OK_RETURN_AND_FREE(status, tmp_ctx);
sd->owner_sid = talloc_steal(sd, ids[0].sid);
/* Allocate memory for the sids from the security descriptor to be on
* the safe side. */
- status = wbc_xids_to_sids(pvfs->wbc_ctx->event_ctx, ids, num_ids);
+ status = wbc_xids_to_sids(pvfs->ntvfs->ctx->event_ctx, ids, num_ids);
NT_STATUS_NOT_OK_RETURN(status);
sd->owner_sid = talloc_steal(sd, ids[0].sid);
ids[i].status = ID_UNKNOWN;
}
- status = wbc_sids_to_xids(pvfs->wbc_ctx->event_ctx, ids, acl.a_count);
+ status = wbc_sids_to_xids(pvfs->ntvfs->ctx->event_ctx, ids,
+ acl.a_count);
if (!NT_STATUS_IS_OK(status)) {
talloc_free(tmp_ctx);
return status;