diff options
author | Andrew Bartlett <abartlet@samba.org> | 2004-01-24 10:56:36 +0000 |
---|---|---|
committer | Andrew Bartlett <abartlet@samba.org> | 2004-01-24 10:56:36 +0000 |
commit | 5f8c17460724f0aaff3226798a0d5c7f7b25854e (patch) | |
tree | ff3561faf112bc670877e009d30493fa18698b65 /source3/nmbd/nmbd_processlogon.c | |
parent | f06603428e4c8e7ad4140092fc4e8f61285af2ae (diff) | |
download | samba-5f8c17460724f0aaff3226798a0d5c7f7b25854e.tar.gz samba-5f8c17460724f0aaff3226798a0d5c7f7b25854e.tar.bz2 samba-5f8c17460724f0aaff3226798a0d5c7f7b25854e.zip |
(merge from 3.0)
A Samba DC is nothing special these days - so every domain controller
location packet from the client is not a DEBUG(1) event anymore...
(Yes, we printed this for each of these UDP packets...)
Andrew Bartlett
(This used to be commit c84e8e91e4d4786ece6288a177f66f260d6e7945)
Diffstat (limited to 'source3/nmbd/nmbd_processlogon.c')
-rw-r--r-- | source3/nmbd/nmbd_processlogon.c | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/source3/nmbd/nmbd_processlogon.c b/source3/nmbd/nmbd_processlogon.c index 728796ea21..6b806f2a05 100644 --- a/source3/nmbd/nmbd_processlogon.c +++ b/source3/nmbd/nmbd_processlogon.c @@ -84,7 +84,7 @@ void process_logon_packet(struct packet_struct *p, char *buf,int len, memset(outbuf, 0, sizeof(outbuf)); if (!lp_domain_logons()) { - DEBUG(3,("process_logon_packet: Logon packet received from IP %s and domain \ + DEBUG(5,("process_logon_packet: Logon packet received from IP %s and domain \ logons are not enabled.\n", inet_ntoa(p->ip) )); return; } @@ -92,7 +92,7 @@ logons are not enabled.\n", inet_ntoa(p->ip) )); pstrcpy(my_name, global_myname()); code = SVAL(buf,0); - DEBUG(1,("process_logon_packet: Logon from %s: code = 0x%x\n", inet_ntoa(p->ip), code)); + DEBUG(4,("process_logon_packet: Logon from %s: code = 0x%x\n", inet_ntoa(p->ip), code)); switch (code) { case 0: @@ -112,7 +112,7 @@ logons are not enabled.\n", inet_ntoa(p->ip) )); pull_ascii_fstring(user_str, user); pull_ascii_fstring(getdc_str, getdc); - DEBUG(3,("process_logon_packet: Domain login request from %s at IP %s user=%s token=%x\n", + DEBUG(5,("process_logon_packet: Domain login request from %s at IP %s user=%s token=%x\n", mach_str,inet_ntoa(p->ip),user_str,token)); q = outbuf; @@ -211,7 +211,7 @@ logons are not enabled.\n", inet_ntoa(p->ip) )); pull_ascii_fstring(mach_str, machine); - DEBUG(3,("process_logon_packet: GETDC request from %s at IP %s, \ + DEBUG(5,("process_logon_packet: GETDC request from %s at IP %s, \ reporting %s domain %s 0x%x ntversion=%x lm_nt token=%x lm_20 token=%x\n", mach_str,inet_ntoa(p->ip), reply_name, lp_workgroup(), QUERYFORPDC_R, (uint32)ntversion, (uint32)lmnttoken, @@ -248,14 +248,14 @@ reporting %s domain %s 0x%x ntversion=%x lm_nt token=%x lm_20 token=%x\n", domainsidsize = IVAL(q, 0); q += 4; - DEBUG(3,("process_logon_packet: SAMLOGON sidsize %d, len = %d\n", domainsidsize, len)); + DEBUG(5,("process_logon_packet: SAMLOGON sidsize %d, len = %d\n", domainsidsize, len)); if (domainsidsize < (len - PTR_DIFF(q, buf)) && (domainsidsize != 0)) { q += domainsidsize; q = ALIGN4(q, buf); } - DEBUG(3,("process_logon_packet: len = %d PTR_DIFF(q, buf) = %ld\n", len, (unsigned long)PTR_DIFF(q, buf) )); + DEBUG(5,("process_logon_packet: len = %d PTR_DIFF(q, buf) = %ld\n", len, (unsigned long)PTR_DIFF(q, buf) )); if (len - PTR_DIFF(q, buf) > 8) { /* with NT5 clients we can sometimes @@ -284,12 +284,12 @@ reporting %s domain %s 0x%x ntversion=%x lm_nt token=%x lm_20 token=%x\n", */ pull_ucs2_pstring(ascuser, uniuser); pull_ucs2_fstring(asccomp, unicomp); - DEBUG(3,("process_logon_packet: SAMLOGON user %s\n", ascuser)); + DEBUG(5,("process_logon_packet: SAMLOGON user %s\n", ascuser)); fstrcpy(reply_name, "\\\\"); /* Here it wants \\LOGONSERVER. */ fstrcat(reply_name, my_name); - DEBUG(3,("process_logon_packet: SAMLOGON request from %s(%s) for %s, returning logon svr %s domain %s code %x token=%x\n", + DEBUG(5,("process_logon_packet: SAMLOGON request from %s(%s) for %s, returning logon svr %s domain %s code %x token=%x\n", asccomp,inet_ntoa(p->ip), ascuser, reply_name, lp_workgroup(), SAMLOGON_R ,lmnttoken)); |