1
0
mirror of https://github.com/samba-team/samba.git synced 2025-03-03 12:58:35 +03:00

s3-netlogon: some more appropriate debug messages.

Guenther
This commit is contained in:
Günther Deschner 2009-02-13 16:56:52 +01:00
parent 4df9f1860e
commit 75562a1e34

View File

@ -157,6 +157,21 @@ WERROR _netr_LogonControl2Ex(pipes_struct *p,
struct netr_NETLOGON_INFO_1 *info1;
struct netr_NETLOGON_INFO_2 *info2;
struct netr_NETLOGON_INFO_3 *info3;
const char *fn;
switch (p->hdr_req.opnum) {
case NDR_NETR_LOGONCONTROL:
fn = "_netr_LogonControl";
break;
case NDR_NETR_LOGONCONTROL2:
fn = "_netr_LogonControl2";
break;
case NDR_NETR_LOGONCONTROL2EX:
fn = "_netr_LogonControl2Ex";
break;
default:
return WERR_INVALID_PARAM;
}
tc_status = W_ERROR_V(WERR_NO_SUCH_DOMAIN);
@ -203,8 +218,8 @@ WERROR _netr_LogonControl2Ex(pipes_struct *p,
default:
/* no idea what this should be */
DEBUG(0,("_netr_LogonControl2: unimplemented function level [%d]\n",
r->in.function_code));
DEBUG(0,("%s: unimplemented function level [%d]\n",
fn, r->in.function_code));
return WERR_UNKNOWN_LEVEL;
}
@ -820,12 +835,15 @@ NTSTATUS _netr_LogonSamLogon(pipes_struct *p,
struct auth_context *auth_context = NULL;
uint8_t pipe_session_key[16];
bool process_creds = true;
const char *fn;
switch (p->hdr_req.opnum) {
case NDR_NETR_LOGONSAMLOGON:
process_creds = true;
fn = "_netr_LogonSamLogon";
break;
case NDR_NETR_LOGONSAMLOGONEX:
fn = "_netr_LogonSamLogonEx";
default:
process_creds = false;
}
@ -834,8 +852,8 @@ NTSTATUS _netr_LogonSamLogon(pipes_struct *p,
/* 'server schannel = yes' should enforce use of
schannel, the client did offer it in auth2, but
obviously did not use it. */
DEBUG(0,("_netr_LogonSamLogon: client %s not using schannel for netlogon\n",
get_remote_machine_name() ));
DEBUG(0,("%s: client %s not using schannel for netlogon\n",
fn, get_remote_machine_name() ));
return NT_STATUS_ACCESS_DENIED;
}
@ -848,8 +866,8 @@ NTSTATUS _netr_LogonSamLogon(pipes_struct *p,
r->out.validation->sam3 = sam3;
*r->out.authoritative = true; /* authoritative response */
if (r->in.validation_level != 2 && r->in.validation_level != 3) {
DEBUG(0,("_netr_LogonSamLogon: bad validation_level value %d.\n",
(int)r->in.validation_level));
DEBUG(0,("%s: bad validation_level value %d.\n",
fn, (int)r->in.validation_level));
return NT_STATUS_ACCESS_DENIED;
}
@ -879,9 +897,9 @@ NTSTATUS _netr_LogonSamLogon(pipes_struct *p,
/* checks and updates credentials. creates reply credentials */
if (!netlogon_creds_server_step(p->dc, r->in.credential, r->out.return_authenticator)) {
DEBUG(2,("_netr_LogonSamLogon: creds_server_step failed. Rejecting auth "
DEBUG(2,("%s: creds_server_step failed. Rejecting auth "
"request from client %s machine account %s\n",
r->in.computer_name, p->dc->mach_acct ));
fn, r->in.computer_name, p->dc->mach_acct ));
return NT_STATUS_INVALID_PARAMETER;
}
@ -995,8 +1013,8 @@ NTSTATUS _netr_LogonSamLogon(pipes_struct *p,
(auth_context->free)(&auth_context);
free_user_info(&user_info);
DEBUG(5,("_netr_LogonSamLogon: check_password returned status %s\n",
nt_errstr(status)));
DEBUG(5,("%s: check_password returned status %s\n",
fn, nt_errstr(status)));
/* Check account and password */
@ -1016,8 +1034,8 @@ NTSTATUS _netr_LogonSamLogon(pipes_struct *p,
if (server_info->guest) {
/* We don't like guest domain logons... */
DEBUG(5,("_netr_LogonSamLogon: Attempted domain logon as GUEST "
"denied.\n"));
DEBUG(5,("%s: Attempted domain logon as GUEST "
"denied.\n", fn));
TALLOC_FREE(server_info);
return NT_STATUS_LOGON_FAILURE;
}
@ -1055,7 +1073,7 @@ NTSTATUS _netr_LogonSamLogonEx(pipes_struct *p,
/* Only allow this if the pipe is protected. */
if (p->auth.auth_type != PIPE_AUTH_TYPE_SCHANNEL) {
DEBUG(0,("_net_sam_logon_ex: client %s not using schannel for netlogon\n",
DEBUG(0,("_netr_LogonSamLogonEx: client %s not using schannel for netlogon\n",
get_remote_machine_name() ));
return NT_STATUS_INVALID_PARAMETER;
}