summaryrefslogtreecommitdiff
path: root/source3/rpc_server
diff options
context:
space:
mode:
authorAndrew Bartlett <abartlet@samba.org>2010-09-17 15:31:28 +1000
committerAndrew Tridgell <tridge@samba.org>2010-10-14 02:35:04 +0000
commit170b345e0c688b178eb37a73a8110dec68a8ae31 (patch)
tree79e5191ba2681c55e8846cd301662b8cc0749ede /source3/rpc_server
parent58cf83732a3af2cf2098b1b2108e4b5f36e8fa9e (diff)
downloadsamba-170b345e0c688b178eb37a73a8110dec68a8ae31.tar.gz
samba-170b345e0c688b178eb37a73a8110dec68a8ae31.tar.bz2
samba-170b345e0c688b178eb37a73a8110dec68a8ae31.zip
s3-auth Use security_token_debug() from common code
This prints the security token including the privileges as strings instead of just a bitmap. Andrew Bartlett Signed-off-by: Andrew Tridgell <tridge@samba.org>
Diffstat (limited to 'source3/rpc_server')
-rw-r--r--source3/rpc_server/srv_wkssvc_nt.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/source3/rpc_server/srv_wkssvc_nt.c b/source3/rpc_server/srv_wkssvc_nt.c
index ee2b419696..000b605913 100644
--- a/source3/rpc_server/srv_wkssvc_nt.c
+++ b/source3/rpc_server/srv_wkssvc_nt.c
@@ -359,7 +359,7 @@ WERROR _wkssvc_NetWkstaGetInfo(struct pipes_struct *p,
"Users %s:\n",
sid_string_dbg(
&global_sid_Authenticated_Users)));
- debug_nt_user_token(DBGC_CLASS, 3,
+ security_token_debug(DBGC_CLASS, 3,
p->server_info->ptok);
return WERR_ACCESS_DENIED;
}
@@ -377,7 +377,7 @@ WERROR _wkssvc_NetWkstaGetInfo(struct pipes_struct *p,
DEBUGADD(3,(" - does not have sid for Administrators "
"group %s, sids are:\n",
sid_string_dbg(&global_sid_Builtin_Administrators)));
- debug_nt_user_token(DBGC_CLASS, 3,
+ security_token_debug(DBGC_CLASS, 3,
p->server_info->ptok);
return WERR_ACCESS_DENIED;
}
@@ -562,7 +562,7 @@ WERROR _wkssvc_NetWkstaEnumUsers(struct pipes_struct *p,
DEBUGADD(3,(" - does not have sid for Administrators group "
"%s\n", sid_string_dbg(
&global_sid_Builtin_Administrators)));
- debug_nt_user_token(DBGC_CLASS, 3, p->server_info->ptok);
+ security_token_debug(DBGC_CLASS, 3, p->server_info->ptok);
return WERR_ACCESS_DENIED;
}