info3);
if (NT_STATUS_IS_OK(nt_status)) {
- if (user_info->was_mapped) {
- (*server_info)->was_mapped = user_info->was_mapped;
- }
+ (*server_info)->nss_token |= user_info->was_mapped;
if ( ! (*server_info)->guest) {
/* if a real user check pam account restrictions */
return nt_status;
}
- auth_ntlmssp_state->server_info->was_mapped |= username_was_mapped;
+ auth_ntlmssp_state->server_info->nss_token |= username_was_mapped;
nt_status = create_local_token(auth_ntlmssp_state->server_info);
lm_sess_key.length);
data_blob_free(&lm_sess_key);
- (*server_info)->was_mapped |= user_info->was_mapped;
+ (*server_info)->nss_token |= user_info->was_mapped;
return nt_status;
}
*/
if (((lp_server_role() == ROLE_DOMAIN_MEMBER) && !winbind_ping()) ||
- (server_info->was_mapped)) {
+ (server_info->nss_token)) {
status = create_token_from_username(server_info,
server_info->unix_name,
server_info->guest,
sizeof(info3->base.LMSessKey.key));
}
- result->was_mapped = username_was_mapped;
+ result->nss_token |= username_was_mapped;
*server_info = result;
sizeof(info->lm_session_key));
}
- result->was_mapped = username_was_mapped;
+ result->nss_token |= username_was_mapped;
*server_info = result;
return nt_status;
}
- if (user_info->was_mapped) {
- (*server_info)->was_mapped = user_info->was_mapped;
- }
+ (*server_info)->nss_token |= user_info->was_mapped;
return nt_status;
}
void *pam_handle;
- bool was_mapped; /* Did the username map match? */
+ /*
+ * This is a token from /etc/passwd and /etc/group
+ */
+ bool nss_token;
+
char *unix_name;
/*
}
}
- if (username_was_mapped) {
- server_info->was_mapped = username_was_mapped;
- }
+ server_info->nss_token |= username_was_mapped;
/* we need to build the token for the user. make_server_info_guest()
already does this */