this stuff doesn't need to be done as root anyway.
uint8 attr = mem[count].attr;
char *name = mem[count].name;
- become_root(True);
+ become_root();
status = lookup_grp_rid(name, &rid, &type);
- unbecome_root(True);
+ unbecome_root();
if (status == 0x0)
{
DEBUG(5,("lookup_user_name: rid: %d", rid));
/* find the user account */
- become_root(True);
+ become_root();
disp_info = getsamdisprid(rid);
- unbecome_root(True);
+ unbecome_root();
if (disp_info != NULL)
{
(*grp_rid) = 0;
/* find the user account */
- become_root(True);
+ become_root();
sam_pass = getsam21pwnam(user_name);
- unbecome_root(True);
+ unbecome_root();
if (sam_pass != NULL)
{
(*type) = SID_NAME_USER;
/* find the user account */
- become_root(True);
+ become_root();
sam_pass = getsam21pwnam(user_name);
- unbecome_root(True);
+ unbecome_root();
if (sam_pass != NULL)
{
}
#endif /* 0 */
- become_root(True);
+ become_root();
smb_pass = getsmbpwnam(mach_acct);
- unbecome_root(True);
+ unbecome_root();
if ((smb_pass) != NULL && !(smb_pass->acct_ctrl & ACB_DISABLED) &&
(smb_pass->smb_nt_passwd != NULL))
DEBUG(3,("Server Password Set Wksta:[%s]\n", mach_acct));
- become_root(True);
+ become_root();
smb_pass = getsmbpwnam(mach_acct);
- unbecome_root(True);
+ unbecome_root();
if (smb_pass != NULL) {
unsigned char pwd[16];
smb_pass->smb_nt_passwd = pwd;
smb_pass->acct_ctrl = ACB_WSTRUST;
- become_root(True);
+ become_root();
ret = mod_smbpwd_entry(smb_pass,False);
- unbecome_root(True);
+ unbecome_root();
if (ret) {
/* hooray! */
*/
pw=Get_Pwnam(nt_username, True);
- become_root(True);
+ become_root();
smb_pass = getsmbpwnam(nt_username);
- unbecome_root(True);
+ unbecome_root();
if (smb_pass == NULL)
status = 0xC0000000 | NT_STATUS_NO_SUCH_USER;
if(!guest_user) {
- become_root(True);
+ become_root();
if(!(p->ntlmssp_auth_validated = pass_check_smb(unix_user_name, domain,
(uchar*)p->challenge, lm_owf, nt_owf, NULL))) {
DEBUG(1,("api_pipe_ntlmssp_verify: User %s\\%s from machine %s \
failed authentication on named pipe %s.\n", domain, unix_user_name, wks, p->name ));
- unbecome_root(True);
+ unbecome_root();
return False;
}
if(!(smb_pass = getsmbpwnam(unix_user_name))) {
DEBUG(1,("api_pipe_ntlmssp_verify: Cannot find user %s in smb passwd database.\n",
unix_user_name));
- unbecome_root(True);
+ unbecome_root();
return False;
}
- unbecome_root(True);
+ unbecome_root();
if (smb_pass == NULL) {
DEBUG(1,("api_pipe_ntlmssp_verify: Couldn't find user '%s' in smb_passwd file.\n",
make_creds_nt_sec(&usr.nts);
*/
- become_root(False); /* to connect to pipe */
+ become_root(); /* to connect to pipe */
p->m = msrpc_use_add(p->name, sys_getpid(), &usr, False);
- unbecome_root(False);
+ unbecome_root();
if (p->m == NULL)
DEBUG(10,("attempt_remote_rpc_connect: msrpc redirect failed - using local implementation.\n"));
DEBUG(5,("samr_reply_enum_dom_users: %d\n", __LINE__));
- become_root(True);
+ become_root();
get_sampwd_entries(pass, 0, &total_entries, &num_entries, MAX_SAM_ENTRIES, q_u->acb_mask);
- unbecome_root(True);
+ unbecome_root();
init_samr_r_enum_dom_users(&r_e, total_entries,
q_u->unknown_0, num_entries,
DEBUG(10,("samr_reply_query_dispinfo: Setting q_u->max_entries to %u\n",q_u->max_entries));
- become_root(True);
+ become_root();
got_pwds = get_passwd_entries(pass, q_u->start_idx, &total_entries, &num_entries, q_u->max_entries, 0);
- unbecome_root(True);
+ unbecome_root();
/* more left - set resume handle */
if(total_entries > num_entries)
q_u->uni_user_name[i].uni_str_len));
/* find the user account */
- become_root(True);
+ become_root();
sam_pass = get_smb21pwd_entry(user_name, 0);
- unbecome_root(True);
+ unbecome_root();
if (sam_pass == NULL)
{
r_u.status = 0xC0000000 | NT_STATUS_OBJECT_NAME_NOT_FOUND;
}
- become_root(True);
+ become_root();
sam_pass = getsam21pwrid(q_u->user_rid);
- unbecome_root(True);
+ unbecome_root();
/* check that the RID exists in our domain. */
if (r_u.status == 0x0 && sam_pass == NULL)
return False;
}
- become_root(True);
+ become_root();
smb_pass = getsmbpwrid(user_rid);
- unbecome_root(True);
+ unbecome_root();
if (smb_pass == NULL)
{
return False;
}
- become_root(True);
+ become_root();
sam_pass = getsam21pwrid(user_rid);
- unbecome_root(True);
+ unbecome_root();
if (sam_pass == NULL)
{
if (status == 0x0)
{
- become_root(True);
+ become_root();
sam_pass = getsam21pwrid(rid);
- unbecome_root(True);
+ unbecome_root();
if (sam_pass == NULL)
{
fstrcpy(mach_acct, dos_unistrn2(q_u.uni_mach_acct.buffer,
q_u.uni_mach_acct.uni_str_len));
- become_root(True);
+ become_root();
sam_pass = getsam21pwnam(mach_acct);
- unbecome_root(True);
+ unbecome_root();
if (sam_pass != NULL)
{
}
/* ok, it's a user. find the user account */
- become_root(True);
+ become_root();
disp_info = getsamdisprid(rid);
- unbecome_root(True);
+ unbecome_root();
if (disp_info != NULL)
{
(*rid) = 0;
/* find the user account */
- become_root(True);
+ become_root();
sam_pass = getsam21pwnam(user_name);
- unbecome_root(True);
+ unbecome_root();
if (sam_pass != NULL)
{