diff options
author | Jeremy Allison <jra@samba.org> | 2001-06-18 20:27:35 +0000 |
---|---|---|
committer | Jeremy Allison <jra@samba.org> | 2001-06-18 20:27:35 +0000 |
commit | 809c0258780cc75cd456518571891fc30998d30d (patch) | |
tree | 17cc3a7ce2e01eecbd807388637cc2f1d02977e5 /source3/rpc_server | |
parent | 0417200fa9af35167de3e4d6df7c3071f07b15a9 (diff) | |
download | samba-809c0258780cc75cd456518571891fc30998d30d.tar.gz samba-809c0258780cc75cd456518571891fc30998d30d.tar.bz2 samba-809c0258780cc75cd456518571891fc30998d30d.zip |
Added patches to remove Linux specific XFS ACLs. These are now handled by the
generic Linux ACL code.
rpc_server/srv_samr_nt.c: Don't delete a policy handle before it's created.
Jeremy.
(This used to be commit db5b82e53a7061c4764d39ceb3df82e706aad42f)
Diffstat (limited to 'source3/rpc_server')
-rw-r--r-- | source3/rpc_server/srv_samr_nt.c | 4 |
1 files changed, 0 insertions, 4 deletions
diff --git a/source3/rpc_server/srv_samr_nt.c b/source3/rpc_server/srv_samr_nt.c index 010da5c3e5..1db69716be 100644 --- a/source3/rpc_server/srv_samr_nt.c +++ b/source3/rpc_server/srv_samr_nt.c @@ -1850,7 +1850,6 @@ uint32 _api_samr_create_user(pipes_struct *p, SAMR_Q_CREATE_USER *q_u, SAMR_R_CR if (!local_password_change(mach_acct, local_flags, NULL, err_str, sizeof(err_str), msg_str, sizeof(msg_str))) { DEBUG(0, ("%s\n", err_str)); - close_policy_hnd(p, user_pol); pdb_free_sam(sam_pass); return NT_STATUS_ACCESS_DENIED; } @@ -1860,21 +1859,18 @@ uint32 _api_samr_create_user(pipes_struct *p, SAMR_Q_CREATE_USER *q_u, SAMR_R_CR unbecome_root(); if (ret == False) { /* account doesn't exist: say so */ - close_policy_hnd(p, user_pol); pdb_free_sam(sam_pass); return NT_STATUS_ACCESS_DENIED; } /* Get the domain SID stored in the domain policy */ if(!get_lsa_policy_samr_sid(p, &dom_pol, &sid)) { - close_policy_hnd(p, user_pol); pdb_free_sam(sam_pass); return NT_STATUS_INVALID_HANDLE; } /* append the user's RID to it */ if(!sid_append_rid(&sid, pdb_get_user_rid(sam_pass) )) { - close_policy_hnd(p, user_pol); pdb_free_sam(sam_pass); return NT_STATUS_NO_SUCH_USER; } |