summaryrefslogtreecommitdiff
path: root/source3/lib/util_seaccess.c
diff options
context:
space:
mode:
authorVolker Lendecke <vl@samba.org>2007-12-15 21:11:36 +0100
committerVolker Lendecke <vl@samba.org>2007-12-15 22:09:36 +0100
commit900288a2b86abd247f9eb4cd15dc5617a17cfef1 (patch)
tree4d8f4d5ec29c831932088db74773f9e338e86824 /source3/lib/util_seaccess.c
parentf498f661bcd6f2d97d55aa275dcd1eb2cbcda8a4 (diff)
downloadsamba-900288a2b86abd247f9eb4cd15dc5617a17cfef1.tar.gz
samba-900288a2b86abd247f9eb4cd15dc5617a17cfef1.tar.bz2
samba-900288a2b86abd247f9eb4cd15dc5617a17cfef1.zip
Replace sid_string_static by sid_string_dbg in DEBUGs
(This used to be commit bb35e794ec129805e874ceba882bcc1e84791a09)
Diffstat (limited to 'source3/lib/util_seaccess.c')
-rw-r--r--source3/lib/util_seaccess.c25
1 files changed, 14 insertions, 11 deletions
diff --git a/source3/lib/util_seaccess.c b/source3/lib/util_seaccess.c
index ad05300079..0481eea5f0 100644
--- a/source3/lib/util_seaccess.c
+++ b/source3/lib/util_seaccess.c
@@ -215,7 +215,6 @@ bool se_access_check(const SEC_DESC *sd, const NT_USER_TOKEN *token,
{
size_t i;
SEC_ACL *the_acl;
- fstring sid_str;
uint32 tmp_acc_desired = acc_desired;
if (!status || !acc_granted)
@@ -227,9 +226,10 @@ bool se_access_check(const SEC_DESC *sd, const NT_USER_TOKEN *token,
*status = NT_STATUS_OK;
*acc_granted = 0;
- DEBUG(10,("se_access_check: requested access 0x%08x, for NT token with %u entries and first sid %s.\n",
- (unsigned int)acc_desired, (unsigned int)token->num_sids,
- sid_to_string(sid_str, &token->user_sids[0])));
+ DEBUG(10,("se_access_check: requested access 0x%08x, for NT token "
+ "with %u entries and first sid %s.\n",
+ (unsigned int)acc_desired, (unsigned int)token->num_sids,
+ sid_string_dbg(&token->user_sids[0])));
/*
* No security descriptor or security descriptor with no DACL
@@ -247,11 +247,13 @@ bool se_access_check(const SEC_DESC *sd, const NT_USER_TOKEN *token,
/* The user sid is the first in the token */
if (DEBUGLVL(3)) {
- DEBUG(3, ("se_access_check: user sid is %s\n", sid_to_string(sid_str, &token->user_sids[PRIMARY_USER_SID_INDEX]) ));
+ DEBUG(3, ("se_access_check: user sid is %s\n",
+ sid_string_dbg(
+ &token->user_sids[PRIMARY_USER_SID_INDEX])));
for (i = 1; i < token->num_sids; i++) {
DEBUGADD(3, ("se_access_check: also %s\n",
- sid_to_string(sid_str, &token->user_sids[i])));
+ sid_string_dbg(&token->user_sids[i])));
}
}
@@ -282,11 +284,12 @@ bool se_access_check(const SEC_DESC *sd, const NT_USER_TOKEN *token,
for ( i = 0 ; i < the_acl->num_aces && tmp_acc_desired != 0; i++) {
SEC_ACE *ace = &the_acl->aces[i];
- DEBUGADD(10,("se_access_check: ACE %u: type %d, flags = 0x%02x, SID = %s mask = %x, current desired = %x\n",
- (unsigned int)i, ace->type, ace->flags,
- sid_to_string(sid_str, &ace->trustee),
- (unsigned int) ace->access_mask,
- (unsigned int)tmp_acc_desired ));
+ DEBUGADD(10,("se_access_check: ACE %u: type %d, flags = "
+ "0x%02x, SID = %s mask = %x, current desired "
+ "= %x\n", (unsigned int)i, ace->type, ace->flags,
+ sid_string_dbg(&ace->trustee),
+ (unsigned int) ace->access_mask,
+ (unsigned int)tmp_acc_desired ));
tmp_acc_desired = check_ace( ace, token, tmp_acc_desired, status);
if (NT_STATUS_V(*status)) {