*info_out = NULL;
if (entry->info_from_db == NULL) {
+ struct auth_user_info_dc *info_from_db = NULL;
struct loadparm_context *lp_ctx = entry->kdc_db_ctx->lp_ctx;
nt_status = authsam_make_user_info_dc(entry,
msg,
data_blob_null,
data_blob_null,
- &entry->info_from_db);
+ &info_from_db);
if (!NT_STATUS_IS_OK(nt_status)) {
DBG_ERR("Getting user info for PAC failed: %s\n",
nt_errstr(nt_status));
/* NT_STATUS_OBJECT_NAME_NOT_FOUND is mapped to ENOENT. */
return map_errno_from_nt_status(nt_status);
}
+
+ entry->info_from_db = info_from_db;
}
*info_out = entry->info_from_db;
struct ldb_dn *realm_dn;
struct claims_data *claims_from_pac;
struct claims_data *claims_from_db;
- struct auth_user_info_dc *info_from_pac;
- struct PAC_DOMAIN_GROUP_MEMBERSHIP *resource_groups_from_pac;
- struct auth_user_info_dc *info_from_db;
+ const struct auth_user_info_dc *info_from_pac;
+ const struct PAC_DOMAIN_GROUP_MEMBERSHIP *resource_groups_from_pac;
+ const struct auth_user_info_dc *info_from_db;
const struct authn_kerberos_client_policy *client_policy;
const struct authn_server_policy *server_policy;
uint32_t supported_enctypes;