1
0
mirror of https://github.com/samba-team/samba.git synced 2025-02-25 17:57:42 +03:00

auth: Use DBGC_AUTH as DBGC_CLASS for AD DC auth session code.

Signed-off-by: Andrew Bartlett <abartlet@samba.org>
Reviewed-by: Jeremy Allison <jra@samba.org>

Autobuild-User(master): Jeremy Allison <jra@samba.org>
Autobuild-Date(master): Tue May 22 02:42:32 CEST 2018 on sn-devel-144
This commit is contained in:
Andrew Bartlett 2018-05-21 13:58:12 +12:00 committed by Jeremy Allison
parent 8cd905d575
commit 20fda4f600
4 changed files with 17 additions and 5 deletions

View File

@ -32,7 +32,10 @@
#include "param/param.h"
#include "librpc/gen_ndr/ndr_winbind_c.h"
#define KRBTGT_ATTRS \
#undef DBGC_CLASS
#define DBGC_CLASS DBGC_AUTH
#define KRBTGT_ATTRS \
/* required for the krb5 kdc */ \
"objectClass", \
"sAMAccountName", \

View File

@ -34,6 +34,9 @@
#include <gssapi/gssapi.h>
#include "libcli/wbclient/wbclient.h"
#undef DBGC_CLASS
#define DBGC_CLASS DBGC_AUTH
_PUBLIC_ struct auth_session_info *anonymous_session(TALLOC_CTX *mem_ctx,
struct loadparm_context *lp_ctx)
{
@ -415,5 +418,6 @@ void auth_session_info_debug(int dbg_lev,
return;
}
security_token_debug(0, dbg_lev, session_info->security_token);
security_token_debug(DBGC_AUTH, dbg_lev,
session_info->security_token);
}

View File

@ -29,6 +29,8 @@
#include "auth/session.h"
#include "auth/system_session_proto.h"
#undef DBGC_CLASS
#define DBGC_CLASS DBGC_AUTH
/*
prevent the static system session being freed

View File

@ -25,6 +25,9 @@
#include "libcli/wbclient/wbclient.h"
#include "param/param.h"
#undef DBGC_CLASS
#define DBGC_CLASS DBGC_AUTH
/*
form a security_unix_token from the current security_token
*/
@ -76,7 +79,7 @@ NTSTATUS security_token_to_unix_token(TALLOC_CTX *mem_ctx,
char *sid_str = dom_sid_string(mem_ctx, ids[0].sid);
DEBUG(0, ("Unable to convert first SID (%s) in user token to a UID. Conversion was returned as type %d, full token:\n",
sid_str, (int)ids[0].xid.type));
security_token_debug(0, 0, token);
security_token_debug(DBGC_AUTH, 0, token);
talloc_free(sid_str);
return NT_STATUS_INVALID_SID;
}
@ -90,7 +93,7 @@ NTSTATUS security_token_to_unix_token(TALLOC_CTX *mem_ctx,
char *sid_str = dom_sid_string(mem_ctx, ids[1].sid);
DEBUG(0, ("Unable to convert second SID (%s) in user token to a GID. Conversion was returned as type %d, full token:\n",
sid_str, (int)ids[1].xid.type));
security_token_debug(0, 0, token);
security_token_debug(DBGC_AUTH, 0, token);
talloc_free(sid_str);
return NT_STATUS_INVALID_SID;
}
@ -104,7 +107,7 @@ NTSTATUS security_token_to_unix_token(TALLOC_CTX *mem_ctx,
char *sid_str = dom_sid_string(mem_ctx, ids[s].sid);
DEBUG(0, ("Unable to convert SID (%s) at index %u in user token to a GID. Conversion was returned as type %d, full token:\n",
sid_str, (unsigned int)s, (int)ids[s].xid.type));
security_token_debug(0, 0, token);
security_token_debug(DBGC_AUTH, 0, token);
talloc_free(sid_str);
return NT_STATUS_INVALID_SID;
}