WERROR _wkssvc_NetWkstaGetInfo(struct pipes_struct *p,
struct wkssvc_NetWkstaGetInfo *r)
{
+ struct dom_sid_buf buf;
+
switch (r->in.level) {
case 100:
/* Level 100 can be allowed from anyone including anonymous
"101\n"));
DEBUGADD(3,(" - does not have sid for Authenticated "
"Users %s:\n",
- sid_string_dbg(
- &global_sid_Authenticated_Users)));
+ dom_sid_str_buf(
+ &global_sid_Authenticated_Users,
+ &buf)));
security_token_debug(DBGC_CLASS, 3,
p->session_info->security_token);
return WERR_ACCESS_DENIED;
"102\n"));
DEBUGADD(3,(" - does not have sid for Administrators "
"group %s, sids are:\n",
- sid_string_dbg(&global_sid_Builtin_Administrators)));
+ dom_sid_str_buf(
+ &global_sid_Builtin_Administrators,
+ &buf)));
security_token_debug(DBGC_CLASS, 3,
p->session_info->security_token);
return WERR_ACCESS_DENIED;
/* This with any level should only be allowed from a domain administrator */
if (!nt_token_check_sid(&global_sid_Builtin_Administrators,
p->session_info->security_token)) {
+ struct dom_sid_buf buf;
DEBUG(1,("User not allowed for NetWkstaEnumUsers\n"));
DEBUGADD(3,(" - does not have sid for Administrators group "
- "%s\n", sid_string_dbg(
- &global_sid_Builtin_Administrators)));
+ "%s\n",
+ dom_sid_str_buf(
+ &global_sid_Builtin_Administrators,
+ &buf)));
security_token_debug(DBGC_CLASS, 3, p->session_info->security_token);
return WERR_ACCESS_DENIED;
}