summaryrefslogtreecommitdiff
path: root/source3/rpc_server
diff options
context:
space:
mode:
authorJeremy Allison <jra@samba.org>2001-06-18 20:27:35 +0000
committerJeremy Allison <jra@samba.org>2001-06-18 20:27:35 +0000
commit809c0258780cc75cd456518571891fc30998d30d (patch)
tree17cc3a7ce2e01eecbd807388637cc2f1d02977e5 /source3/rpc_server
parent0417200fa9af35167de3e4d6df7c3071f07b15a9 (diff)
downloadsamba-809c0258780cc75cd456518571891fc30998d30d.tar.gz
samba-809c0258780cc75cd456518571891fc30998d30d.tar.bz2
samba-809c0258780cc75cd456518571891fc30998d30d.zip
Added patches to remove Linux specific XFS ACLs. These are now handled by the
generic Linux ACL code. rpc_server/srv_samr_nt.c: Don't delete a policy handle before it's created. Jeremy. (This used to be commit db5b82e53a7061c4764d39ceb3df82e706aad42f)
Diffstat (limited to 'source3/rpc_server')
-rw-r--r--source3/rpc_server/srv_samr_nt.c4
1 files changed, 0 insertions, 4 deletions
diff --git a/source3/rpc_server/srv_samr_nt.c b/source3/rpc_server/srv_samr_nt.c
index 010da5c3e5..1db69716be 100644
--- a/source3/rpc_server/srv_samr_nt.c
+++ b/source3/rpc_server/srv_samr_nt.c
@@ -1850,7 +1850,6 @@ uint32 _api_samr_create_user(pipes_struct *p, SAMR_Q_CREATE_USER *q_u, SAMR_R_CR
if (!local_password_change(mach_acct, local_flags, NULL, err_str,
sizeof(err_str), msg_str, sizeof(msg_str))) {
DEBUG(0, ("%s\n", err_str));
- close_policy_hnd(p, user_pol);
pdb_free_sam(sam_pass);
return NT_STATUS_ACCESS_DENIED;
}
@@ -1860,21 +1859,18 @@ uint32 _api_samr_create_user(pipes_struct *p, SAMR_Q_CREATE_USER *q_u, SAMR_R_CR
unbecome_root();
if (ret == False) {
/* account doesn't exist: say so */
- close_policy_hnd(p, user_pol);
pdb_free_sam(sam_pass);
return NT_STATUS_ACCESS_DENIED;
}
/* Get the domain SID stored in the domain policy */
if(!get_lsa_policy_samr_sid(p, &dom_pol, &sid)) {
- close_policy_hnd(p, user_pol);
pdb_free_sam(sam_pass);
return NT_STATUS_INVALID_HANDLE;
}
/* append the user's RID to it */
if(!sid_append_rid(&sid, pdb_get_user_rid(sam_pass) )) {
- close_policy_hnd(p, user_pol);
pdb_free_sam(sam_pass);
return NT_STATUS_NO_SUCH_USER;
}