r->in.credential, r->out.return_authenticator,
&creds);
NT_STATUS_NOT_OK_RETURN(nt_status);
- client_sid = creds->sid;
+ client_sid = &creds->ex->client_sid;
sam_ctx = dcesrv_samdb_connect_as_system(mem_ctx, dce_call);
if (sam_ctx == NULL) {
r->in.credential, r->out.return_authenticator,
&creds);
NT_STATUS_NOT_OK_RETURN(nt_status);
- client_sid = creds->sid;
+ client_sid = &creds->ex->client_sid;
sam_ctx = dcesrv_samdb_connect_as_system(mem_ctx, dce_call);
if (sam_ctx == NULL) {
user_info->netlogon_trust_account.account_name
= creds->account_name;
user_info->netlogon_trust_account.sid
- = creds->sid;
+ = &creds->ex->client_sid;
break;
default:
talloc_free(frame);
}
NT_STATUS_NOT_OK_RETURN(status);
- client_sid = creds->sid;
+ client_sid = &creds->ex->client_sid;
/* We want to avoid connecting as system. */
sam_ctx = dcesrv_samdb_connect_as_user(mem_ctx, dce_call);
&creds);
NT_STATUS_NOT_OK_RETURN(nt_status);
- client_sid = creds->sid;
+ client_sid = &creds->ex->client_sid;
switch (creds->secure_channel_type) {
case SEC_CHAN_BDC:
if (!NT_STATUS_IS_OK(nt_status)) {
return nt_status;
}
- client_sid = creds->sid;
+ client_sid = &creds->ex->client_sid;
/* TODO: check r->in.server_name is our name */
r->out.return_authenticator,
&creds);
NT_STATUS_NOT_OK_RETURN(nt_status);
- client_sid = creds->sid;
+ client_sid = &creds->ex->client_sid;
if (creds->secure_channel_type != SEC_CHAN_RODC) {
return NT_STATUS_ACCESS_DENIED;