{
if (sid->num_auths > 0) {
sid->num_auths--;
- *rid = sid->sub_auths[sid->num_auths];
+ if (rid != NULL) {
+ *rid = sid->sub_auths[sid->num_auths];
+ }
return true;
}
return false;
* correct info. AD might prohibit winbind looking up that
* information. */
- uint32 dummy;
-
/* We must always assign the *uid. */
if (!sid_to_uid(&user_sid, uid)) {
DEBUG(1, ("winbindd case, sid_to_uid for %s (%s) failed\n",
}
sid_copy(&group_sids[0], &user_sid);
- sid_split_rid(&group_sids[0], &dummy);
+ sid_split_rid(&group_sids[0], NULL);
sid_append_rid(&group_sids[0], DOMAIN_RID_USERS);
if (!sid_to_gid(&group_sids[0], gid)) {
bool non_mappable_sid(struct dom_sid *sid)
{
struct dom_sid dom;
- uint32 rid;
sid_copy(&dom, sid);
- sid_split_rid(&dom, &rid);
+ sid_split_rid(&dom, NULL);
if (dom_sid_equal(&dom, &global_sid_Builtin))
return True;
* domsid */
struct dom_sid domsid;
- uint32 dummy_rid;
sid_copy(&domsid, &tmp_user_sid);
- if (!sid_split_rid(&domsid, &dummy_rid)) {
+ if (!sid_split_rid(&domsid, NULL)) {
ads_msgfree(ads, res);
return ADS_ERROR_LDAP(LDAP_NO_MEMORY);
}
if (IS_DC && winbind_lookup_name("", name, &sid, &type)) {
struct dom_sid dom_sid;
- uint32 tmp_rid;
enum lsa_SidType domain_type;
if (type == SID_NAME_DOMAIN) {
* domain it figured out itself. Maybe fix that later... */
sid_copy(&dom_sid, &sid);
- sid_split_rid(&dom_sid, &tmp_rid);
+ sid_split_rid(&dom_sid, NULL);
if (!winbind_lookup_sid(tmp_ctx, &dom_sid, &domain, NULL,
&domain_type) ||
bool sid_check_is_in_our_domain(const struct dom_sid *sid)
{
struct dom_sid dom_sid;
- uint32 rid;
sid_copy(&dom_sid, sid);
- sid_split_rid(&dom_sid, &rid);
+ sid_split_rid(&dom_sid, NULL);
return sid_check_is_domain(&dom_sid);
}
bool sid_check_is_in_builtin(const struct dom_sid *sid)
{
struct dom_sid dom_sid;
- uint32 rid;
sid_copy(&dom_sid, sid);
- sid_split_rid(&dom_sid, &rid);
-
+ sid_split_rid(&dom_sid, NULL);
+
return sid_check_is_builtin(&dom_sid);
}
bool sid_check_is_in_unix_users(const struct dom_sid *sid)
{
struct dom_sid dom_sid;
- uint32 rid;
sid_copy(&dom_sid, sid);
- sid_split_rid(&dom_sid, &rid);
+ sid_split_rid(&dom_sid, NULL);
return sid_check_is_unix_users(&dom_sid);
}
bool sid_check_is_in_unix_groups(const struct dom_sid *sid)
{
struct dom_sid dom_sid;
- uint32 rid;
sid_copy(&dom_sid, sid);
- sid_split_rid(&dom_sid, &rid);
+ sid_split_rid(&dom_sid, NULL);
return sid_check_is_unix_groups(&dom_sid);
}
bool sid_check_is_in_wellknown_domain(const struct dom_sid *sid)
{
struct dom_sid dom_sid;
- uint32 rid;
sid_copy(&dom_sid, sid);
- sid_split_rid(&dom_sid, &rid);
-
+ sid_split_rid(&dom_sid, NULL);
+
return sid_check_is_wellknown_domain(&dom_sid, NULL);
}