if (ent_type == SAMBA_KDC_ENT_TYPE_CLIENT && (flags & SDB_F_FOR_AS_REQ)) {
int result;
- const struct auth_user_info_dc *user_info_dc = NULL;
+ struct auth_user_info_dc *user_info_dc = NULL;
/*
* These protections only apply to clients, so servers in the
* Protected Users group may still have service tickets to them
* and computers should never be members of Protected Users, or
* they may fail to authenticate.
*/
- status = samba_kdc_get_user_info_from_db(p, msg, &user_info_dc);
+ status = samba_kdc_get_user_info_dc(tmp_ctx,
+ p,
+ msg,
+ &user_info_dc);
if (!NT_STATUS_IS_OK(status)) {
ret = EINVAL;
goto out;
enum samPwdChangeReason reject_reason;
struct samr_DomInfo1 *dominfo;
const char *error_string = NULL;
- const struct auth_user_info_dc *user_info_dc = NULL;
+ struct auth_user_info_dc *user_info_dc = NULL;
struct samba_kdc_entry *p =
talloc_get_type_abort(db_entry->e_data, struct samba_kdc_entry);
krb5_error_code code = 0;
return ENOMEM;
}
- status = samba_kdc_get_user_info_from_db(p,
- p->msg,
- &user_info_dc);
+ status = samba_kdc_get_user_info_dc(tmp_ctx,
+ p,
+ p->msg,
+ &user_info_dc);
if (!NT_STATUS_IS_OK(status)) {
- DBG_WARNING("samba_kdc_get_user_info_from_db failed: %s\n",
+ DBG_WARNING("samba_kdc_get_user_info_dc failed: %s\n",
nt_errstr(status));
code = EINVAL;
goto out;
}
if (!samba_krb5_pac_is_trusted(client)) {
- const struct auth_user_info_dc *user_info_dc = NULL;
+ struct auth_user_info_dc *user_info_dc = NULL;
WERROR werr;
struct dom_sid *object_sids = NULL;
goto done;
}
- nt_status = samba_kdc_get_user_info_from_db(client.entry,
- client.entry->msg,
- &user_info_dc);
+ nt_status = samba_kdc_get_user_info_dc(tmp_ctx,
+ client.entry,
+ client.entry->msg,
+ &user_info_dc);
if (!NT_STATUS_IS_OK(nt_status)) {
DBG_ERR("Getting user info for PAC failed: %s\n",
nt_errstr(nt_status));