s4:rpc_server/lsa: make use of dcesrv_handle_create()
authorStefan Metzmacher <metze@samba.org>
Thu, 8 Nov 2018 11:20:44 +0000 (12:20 +0100)
committerJeremy Allison <jra@samba.org>
Sat, 12 Jan 2019 02:13:35 +0000 (03:13 +0100)
BUG: https://bugzilla.samba.org/show_bug.cgi?id=7113
BUG: https://bugzilla.samba.org/show_bug.cgi?id=11892

Signed-off-by: Stefan Metzmacher <metze@samba.org>
Reviewed-by: Jeremy Allison <jra@samba.org>
source4/rpc_server/lsa/dcesrv_lsa.c
source4/rpc_server/lsa/lsa_init.c

index f5f5b373ce1ae7a84e981f49d34444275d33c5e3..8575db6b204768a7c4518415e7bca2eb4a999ae6 100644 (file)
@@ -778,7 +778,7 @@ static NTSTATUS dcesrv_lsa_CreateAccount(struct dcesrv_call_state *dce_call, TAL
                 (unsigned)r->in.access_mask,
                 (unsigned)astate->access_mask));
 
-       ah = dcesrv_handle_new(dce_call->context, LSA_HANDLE_ACCOUNT);
+       ah = dcesrv_handle_create(dce_call, LSA_HANDLE_ACCOUNT);
        if (!ah) {
                talloc_free(astate);
                return NT_STATUS_NO_MEMORY;
@@ -1339,7 +1339,7 @@ static NTSTATUS dcesrv_lsa_CreateTrustedDomain_base(struct dcesrv_call_state *dc
        }
        TALLOC_FREE(server_ids);
 
-       handle = dcesrv_handle_new(dce_call->context, LSA_HANDLE_TRUSTED_DOMAIN);
+       handle = dcesrv_handle_create(dce_call, LSA_HANDLE_TRUSTED_DOMAIN);
        if (!handle) {
                return NT_STATUS_NO_MEMORY;
        }
@@ -1471,7 +1471,7 @@ static NTSTATUS dcesrv_lsa_OpenTrustedDomain_common(
                }
        }
 
-       handle = dcesrv_handle_new(dce_call->context, LSA_HANDLE_TRUSTED_DOMAIN);
+       handle = dcesrv_handle_create(dce_call, LSA_HANDLE_TRUSTED_DOMAIN);
        if (!handle) {
                return NT_STATUS_NO_MEMORY;
        }
@@ -2719,7 +2719,7 @@ static NTSTATUS dcesrv_lsa_OpenAccount(struct dcesrv_call_state *dce_call, TALLO
                 (unsigned)r->in.access_mask,
                 (unsigned)astate->access_mask));
 
-       ah = dcesrv_handle_new(dce_call->context, LSA_HANDLE_ACCOUNT);
+       ah = dcesrv_handle_create(dce_call, LSA_HANDLE_ACCOUNT);
        if (!ah) {
                talloc_free(astate);
                return NT_STATUS_NO_MEMORY;
@@ -3324,7 +3324,7 @@ static NTSTATUS dcesrv_lsa_CreateSecret(struct dcesrv_call_state *dce_call, TALL
                return NT_STATUS_ACCESS_DENIED;
        }
 
-       handle = dcesrv_handle_new(dce_call->context, LSA_HANDLE_SECRET);
+       handle = dcesrv_handle_create(dce_call, LSA_HANDLE_SECRET);
        NT_STATUS_HAVE_NO_MEMORY(handle);
 
        handle->data = talloc_steal(handle, secret_state);
@@ -3446,7 +3446,7 @@ static NTSTATUS dcesrv_lsa_OpenSecret(struct dcesrv_call_state *dce_call, TALLOC
 
        secret_state->secret_dn = talloc_reference(secret_state, msgs[0]->dn);
 
-       handle = dcesrv_handle_new(dce_call->context, LSA_HANDLE_SECRET);
+       handle = dcesrv_handle_create(dce_call, LSA_HANDLE_SECRET);
        if (!handle) {
                return NT_STATUS_NO_MEMORY;
        }
index 7e493e3a313ae86f8a3c67ed255440586b9a262b..f33b61c40357d7ce642436666e726c90f40902d9 100644 (file)
@@ -255,7 +255,7 @@ NTSTATUS dcesrv_lsa_OpenPolicy2(struct dcesrv_call_state *dce_call, TALLOC_CTX *
                return status;
        }
 
-       handle = dcesrv_handle_new(dce_call->context, LSA_HANDLE_POLICY);
+       handle = dcesrv_handle_create(dce_call, LSA_HANDLE_POLICY);
        if (!handle) {
                return NT_STATUS_NO_MEMORY;
        }