cli_credentials_set_password_last_changed_time(cred, lct);
- machine_account = ldb_msg_find_attr_as_string(msg, "samAccountName", NULL);
+ machine_account = ldb_msg_find_attr_as_string(msg, "sAMAccountName", NULL);
if (!machine_account) {
machine_account = ldb_msg_find_attr_as_string(msg, "servicePrincipalName", NULL);
const char *attrs[] = {
/* This is how Windows checks for machine accounts */
"objectClass",
- "SamAccountName",
+ "sAMAccountName",
"userAccountControl",
"DnsHostName",
"ServicePrincipalName",
/* the easiest way to find a machine account anywhere in the tree
is to look for hostname$ */
- expr = talloc_asprintf(frame, "(samAccountName=%s$)", machine);
+ expr = talloc_asprintf(frame, "(sAMAccountName=%s$)", machine);
if (expr == NULL) {
status = ADS_ERROR_NT(NT_STATUS_NO_MEMORY);
goto done;
const char *dns_domain_name)
{
ADS_STATUS ret;
- char *samAccountName = NULL;
+ char *samaccountname = NULL;
char *controlstr = NULL;
TALLOC_CTX *ctx = NULL;
ADS_MODLIST mods;
/* Create machine account */
- samAccountName = talloc_asprintf(ctx, "%s$", machine_name);
- if (samAccountName == NULL) {
+ samaccountname = talloc_asprintf(ctx, "%s$", machine_name);
+ if (samaccountname == NULL) {
ret = ADS_ERROR(LDAP_NO_MEMORY);
goto done;
}
}
ads_mod_str(ctx, &mods, "objectClass", "Computer");
- ads_mod_str(ctx, &mods, "SamAccountName", samAccountName);
+ ads_mod_str(ctx, &mods, "sAMAccountName", samaccountname);
ads_mod_str(ctx, &mods, "userAccountControl", controlstr);
ads_mod_str(ctx, &mods, "DnsHostName", dns_hostname);
ads_mod_strlist(ctx, &mods, "ServicePrincipalName", spn_array);
char *computer_rdn = NULL;
bool need_move = False;
- if (asprintf(&filter, "(samAccountName=%s$)", machine_name) == -1) {
+ if (asprintf(&filter, "(sAMAccountName=%s$)", machine_name) == -1) {
rc = ADS_ERROR(LDAP_NO_MEMORY);
goto done;
}
return ADS_ERROR(LDAP_NO_MEMORY);
}
- if (asprintf(&ldap_exp, "(samAccountName=%s)", escaped_user) == -1) {
+ if (asprintf(&ldap_exp, "(sAMAccountName=%s)", escaped_user) == -1) {
TALLOC_FREE(escaped_user);
return ADS_ERROR(LDAP_NO_MEMORY);
}
status = store_or_fetch_attribute(mem_ctx,
ctx,
object_dn,
- "SAMACCOUNTNAME",
+ "sAMAccountName",
&name);
if (!NT_STATUS_IS_OK(status)) {
DBG_ERR("store_or_fetch_attribute(%s, %s, %s): %s\n",
- object_dn, "SAMACCOUNTNAME", name,
+ object_dn, "sAMAccountName", name,
nt_errstr(status));
return status;
}
uint64_t n;
const DATA_BLOB *blob;
- str = ldb_msg_find_attr_as_string(msg, "samAccountName", NULL);
+ str = ldb_msg_find_attr_as_string(msg, "sAMAccountName", NULL);
if (str == NULL) {
- DEBUG(10, ("no samAccountName\n"));
+ DEBUG(10, ("no sAMAccountName\n"));
goto fail;
}
pdb_set_username(sam, str, PDB_SET);
}
if (need_update(sam, PDB_USERNAME)) {
- ret |= ldb_msg_add_string(msg, "samAccountName",
+ ret |= ldb_msg_add_string(msg, "sAMAccountName",
pdb_get_username(sam));
}
m->private_data, struct pdb_samba_dsdb_state);
return pdb_samba_dsdb_getsampwfilter(m, state, sam_acct,
- "(&(samaccountname=%s)(objectclass=user))",
+ "(&(sAMAccountName=%s)(objectclass=user))",
username);
}
{
struct pdb_samba_dsdb_state *state = talloc_get_type_abort(
m->private_data, struct pdb_samba_dsdb_state);
- const char *attrs[] = { "objectClass", "objectSid", "description", "samAccountName", "groupType",
+ const char *attrs[] = { "objectClass", "objectSid", "description", "sAMAccountName", "groupType",
NULL };
struct ldb_message *msg;
va_list ap;
return NT_STATUS_INTERNAL_DB_CORRUPTION;
}
- str = ldb_msg_find_attr_as_string(msg, "samAccountName",
+ str = ldb_msg_find_attr_as_string(msg, "sAMAccountName",
NULL);
if (str == NULL) {
talloc_free(tmp_ctx);
NTSTATUS status;
filter = talloc_asprintf(talloc_tos(),
- "(&(samaccountname=%s)(objectclass=group))",
+ "(&(sAMAccountName=%s)(objectclass=group))",
name);
if (filter == NULL) {
return NT_STATUS_NO_MEMORY;
e->acct_flags = samdb_result_acct_flags(res->msgs[i], "userAccountControl");
e->account_name = ldb_msg_find_attr_as_string(
- res->msgs[i], "samAccountName", NULL);
+ res->msgs[i], "sAMAccountName", NULL);
if (e->account_name == NULL) {
talloc_free(tmp_ctx);
return false;
return NT_STATUS_NO_MEMORY;
}
- ret = ldb_msg_add_fmt(msg, "samAccountName", "%s$", netbios_name);
+ ret = ldb_msg_add_fmt(msg, "sAMAccountName", "%s$", netbios_name);
if (ret != LDB_SUCCESS) {
return NT_STATUS_NO_MEMORY;
}
ldb_get_default_basedn(state->ldb),
&msgs,
attrs,
- "samAccountName=%s$",
+ "sAMAccountName=%s$",
trust_user);
if (ret > 1) {
return NT_STATUS_INTERNAL_DB_CORRUPTION;
talloc_free(tmp_ctx);
return NT_STATUS_NO_MEMORY;
}
- rc = dsdb_search_one(ldb, tmp_ctx, &msg, dn, LDB_SCOPE_BASE, attrs, 0, "samAccountName=*");
+ rc = dsdb_search_one(ldb, tmp_ctx, &msg, dn, LDB_SCOPE_BASE, attrs, 0, "sAMAccountName=*");
if (rc == LDB_ERR_NO_SUCH_OBJECT) {
continue;
} else if (rc != LDB_SUCCESS) {
return NT_STATUS_INTERNAL_DB_CORRUPTION;
}
- names[i] = ldb_msg_find_attr_as_string(msg, "samAccountName", NULL);
+ names[i] = ldb_msg_find_attr_as_string(msg, "sAMAccountName", NULL);
if (names[i] == NULL) {
DEBUG(10, ("no samAccountName\n"));
continue;
const char * const _result_attrs_spn[] = { "servicePrincipalName", NULL};
const char * const _domain_attrs_display[] = { "ncName", "dnsRoot", NULL};
- const char * const _result_attrs_display[] = { "displayName", "samAccountName", NULL};
+ const char * const _result_attrs_display[] = { "displayName", "sAMAccountName", NULL};
const char * const _domain_attrs_sid[] = { "ncName", "dnsRoot", NULL};
const char * const _result_attrs_sid[] = { "objectSid", NULL};
const struct ldb_message *search_res = NULL;
static const char *acl_attrs[] = {
- "samAccountName",
+ "sAMAccountName",
"dnsHostName",
"userAccountControl",
NULL
ret = dsdb_get_expected_new_values(ac,
ac->msg,
- "samAccountName",
+ "sAMAccountName",
&el,
ac->req->operation);
if (ret != LDB_SUCCESS) {
}
}
- ret = samldb_unique_attr_check(ac, "samAccountName", NULL,
+ ret = samldb_unique_attr_check(ac, "sAMAccountName", NULL,
ldb_get_default_basedn(
ldb_module_get_ctx(ac->module)));
krb5_ret = smb_krb5_update_keytab(tmp_ctx, smb_krb5_context->krb5_context,
keytab_name_from_msg(tmp_ctx, ldb, p->msg),
- ldb_msg_find_attr_as_string(p->msg, "samAccountName", NULL),
+ ldb_msg_find_attr_as_string(p->msg, "sAMAccountName", NULL),
realm, SPNs, num_SPNs,
ldb_msg_find_attr_as_string(p->msg, "saltPrincipal", NULL),
ldb_msg_find_attr_as_string(p->msg, "secret", NULL),
config_kdc_enctypes != 0 ?
config_kdc_enctypes :
ENC_ALL_TYPES;
- const char *samAccountName = ldb_msg_find_attr_as_string(msg, "samAccountName", NULL);
+ const char *samAccountName = ldb_msg_find_attr_as_string(msg, "sAMAccountName", NULL);
const struct authn_kerberos_client_policy *authn_client_policy = NULL;
const struct authn_server_policy *authn_server_policy = NULL;
return NT_STATUS_NO_MEMORY;
}
- ret = ldb_msg_add_fmt(msg, "samAccountName", "%s$", netbios_name);
+ ret = ldb_msg_add_fmt(msg, "sAMAccountName", "%s$", netbios_name);
if (ret != LDB_SUCCESS) {
return NT_STATUS_NO_MEMORY;
}
ret = gendb_search(sam_ldb, mem_ctx,
base_dn, &msgs, attrs,
- "samAccountName=%s$", netbios_name);
+ "sAMAccountName=%s$", netbios_name);
if (ret > 1) {
return NT_STATUS_INTERNAL_DB_CORRUPTION;
}
"unicodePwd",
"userAccountControl",
"objectSid",
- "samAccountName",
+ "sAMAccountName",
/* Required for Group Managed Service Accounts. */
"msDS-ManagedPasswordId",
"msDS-ManagedPasswordInterval",
}
*trust_account_in_db = ldb_msg_find_attr_as_string(msgs[0],
- "samAccountName",
+ "sAMAccountName",
NULL);
if (*trust_account_in_db == NULL) {
DEBUG(0,("No samAccountName returned in record matching user [%s]\n",
break;
case 6:
- SET_STRING(msg, info6.account_name, "samAccountName");
+ SET_STRING(msg, info6.account_name, "sAMAccountName");
SET_STRING(msg, info6.full_name, "displayName");
break;
case 7:
- SET_STRING(msg, info7.account_name, "samAccountName");
+ SET_STRING(msg, info7.account_name, "sAMAccountName");
break;
case 8:
IFSET(SAMR_FIELD_ACCT_EXPIRY)
SET_UINT64(msg, info21.acct_expiry, "accountExpires");
IFSET(SAMR_FIELD_ACCOUNT_NAME)
- SET_STRING(msg, info21.account_name, "samAccountName");
+ SET_STRING(msg, info21.account_name, "sAMAccountName");
IFSET(SAMR_FIELD_FULL_NAME)
SET_STRING(msg, info21.full_name, "displayName");
IFSET(SAMR_FIELD_HOME_DIRECTORY)
IFSET(SAMR_FIELD_ACCT_EXPIRY)
SET_UINT64(msg, info23.info.acct_expiry, "accountExpires");
IFSET(SAMR_FIELD_ACCOUNT_NAME)
- SET_STRING(msg, info23.info.account_name, "samAccountName");
+ SET_STRING(msg, info23.info.account_name, "sAMAccountName");
IFSET(SAMR_FIELD_FULL_NAME)
SET_STRING(msg, info23.info.full_name, "displayName");
IFSET(SAMR_FIELD_HOME_DIRECTORY)
IFSET(SAMR_FIELD_ACCT_EXPIRY)
SET_UINT64(msg, info25.info.acct_expiry, "accountExpires");
IFSET(SAMR_FIELD_ACCOUNT_NAME)
- SET_STRING(msg, info25.info.account_name, "samAccountName");
+ SET_STRING(msg, info25.info.account_name, "sAMAccountName");
IFSET(SAMR_FIELD_FULL_NAME)
SET_STRING(msg, info25.info.full_name, "displayName");
IFSET(SAMR_FIELD_HOME_DIRECTORY)
{
SET_STRING(msg,
info32.info.account_name,
- "samAccountName");
+ "sAMAccountName");
}
IFSET(SAMR_FIELD_FULL_NAME)
{
}
dn = msg->dn;
- samAccountName = ldb_msg_find_attr_as_string(msg, "samAccountName", NULL);
+ samAccountName = ldb_msg_find_attr_as_string(msg, "sAMAccountName", NULL);
objectSid = samdb_result_dom_sid(msg, msg, "objectSid");
status = samdb_result_passwords(mem_ctx,
}
user_dn = msg->dn;
- user_samAccountName = ldb_msg_find_attr_as_string(msg, "samAccountName", NULL);
+ user_samAccountName = ldb_msg_find_attr_as_string(msg, "sAMAccountName", NULL);
user_objectSid = samdb_result_dom_sid(mem_ctx, msg, "objectSid");
status = samdb_result_passwords(mem_ctx, lp_ctx,
struct ldb_result *ldb_res;
const char *account_name = NULL;
static const char *attrs[] = {
- "samAccountName",
+ "sAMAccountName",
NULL
};
attrs,
"(&(objectClass=user)(name=%s))", user_rdn);
if (LDB_SUCCESS == ldb_ret && 1 == ldb_res->count) {
- account_name = ldb_msg_find_attr_as_string(ldb_res->msgs[0], "samAccountName", NULL);
+ account_name = ldb_msg_find_attr_as_string(ldb_res->msgs[0], "sAMAccountName", NULL);
}
/* return user_rdn by default */