struct dcerpc_binding_handle *b = NULL;
bool retry = false;
- DEBUG(0, ("_winbind_SendToSam received\n"));
+ DEBUG(5, ("_winbind_SendToSam received\n"));
domain = wb_child_domain();
if (domain == NULL) {
return NT_STATUS_REQUEST_NOT_ACCEPTED;
return NT_STATUS_NO_SUCH_DOMAIN;
}
- DEBUG(0, ("wb_irpc_SendToSam called\n"));
+ DEBUG(5, ("wb_irpc_SendToSam called\n"));
return wb_irpc_forward_rpc_call(msg, msg,
global_event_context(),
#include "dsdb/samdb/ldb_modules/util.h"
#include "dsdb/common/util.h"
#include "param/param.h"
-#include "librpc/gen_ndr/ndr_netlogon.h"
#include "librpc/gen_ndr/ndr_irpc_c.h"
#include "librpc/gen_ndr/ndr_winbind_c.h"
#include "lib/messaging/irpc.h"
r.in.message = *send_to_sam;
- NDR_PRINT_DEBUG(netr_SendToSamBase, send_to_sam);
/*
* This seem to rely on the current IRPC implementation,
* which delivers the message in the _send function.
* TODO: we need a ONE_WAY IRPC handle and register
* a callback and wait for it to be triggered!
*/
- DBG_ERR("calling dcerpc_winbind_SendToSam_r_send\n");
req = dcerpc_winbind_SendToSam_r_send(tmp_ctx,
event_ctx,
irpc_handle,
&r);
/* we aren't interested in a reply */
- DBG_ERR("before talloc_free(req)\n");
talloc_free(req);
- DBG_ERR("after talloc_free(req)\n");
TALLOC_FREE(tmp_ctx);
- NDR_PRINT_DEBUG(netr_SendToSamBase, send_to_sam);
+
}
/*
#include "dsdb/common/util.h"
#include "libcli/ldap/ldap_ndr.h"
#include "param/param.h"
-#include "librpc/gen_ndr/ndr_netlogon.h"
#include "librpc/gen_ndr/ndr_winbind_c.h"
#include "lib/dbwrap/dbwrap.h"
#include "cluster/cluster.h"
int ldb_transaction_active(struct ldb_context *ldb);
-static int netr_SendToSamBase_destructor(struct netr_SendToSamBase *send_to_sam)
-{
- DBG_ERR("netr_SendToSamBase_destructor(%p)\n", send_to_sam);
- //smb_panic(__location__);
- //log_stack_trace();
- return 0;
-}
-
/* Reset the badPwdCount to zero and update the lastLogon time. */
NTSTATUS authsam_logon_success_accounting(struct ldb_context *sam_ctx,
const struct ldb_message *msg,
base_msg->message_size = 16;
base_msg->message.reset_bad_password.guid = guid;
*send_to_sam = base_msg;
- DBG_ERR("base_msg=%p\n", base_msg);
- talloc_set_destructor(base_msg, netr_SendToSamBase_destructor);
- NDR_PRINT_DEBUG(netr_SendToSamBase, base_msg);
}
}
#include "dsdb/samdb/samdb.h"
#include "param/param.h"
#include "../lib/tsocket/tsocket.h"
-#include "librpc/gen_ndr/ndr_netlogon.h"
#include "librpc/gen_ndr/ndr_winbind_c.h"
#include "lib/messaging/irpc.h"
#include "hdb.h"
struct winbind_SendToSam req;
struct tevent_req *subreq = NULL;
- NDR_PRINT_DEBUG(netr_SendToSamBase, send_to_sam);
irpc_handle = irpc_binding_handle_by_name(mem_ctx, kdc_db_ctx->msg_ctx,
"winbind_server",
&ndr_table_winbind);
* TODO: we need a ONE_WAY IRPC handle and register
* a callback and wait for it to be triggered!
*/
- DBG_ERR("calling dcerpc_winbind_SendToSam_r_send\n");
subreq = dcerpc_winbind_SendToSam_r_send(mem_ctx, kdc_db_ctx->ev_ctx,
irpc_handle, &req);
/* we aren't interested in a reply */
- DBG_ERR("before talloc_free(subreq)\n");
TALLOC_FREE(subreq);
- DBG_ERR("after talloc_free(subreq)\n");
- NDR_PRINT_DEBUG(netr_SendToSamBase, send_to_sam);
}
#define SAMBA_HDB_AUTHN_AUDIT_INFO_OBJ "samba:authn_audit_info_obj"
bool print_in = false;
bool print_out = false;
- if (DEBUGLEVEL >= 0) {
+ if (DEBUGLEVEL >= 11) {
print_in = true;
print_out = true;
}
/* We only partially implement SendToSam */
return NT_STATUS_NOT_IMPLEMENTED;
}
- NDR_PRINT_DEBUG(netr_SendToSamBase, &base_msg);
/* Now 'send' to SAM */
switch (base_msg.message_type) {
return NT_STATUS_INVALID_PARAMETER;
}
- DBG_ERR("Reset bad password on user: %s\n",
- ldb_dn_get_linearized(dn));
-
msg->dn = dn;
ret = samdb_msg_add_int(sam_ctx, mem_ctx, msg, "badPwdCount", 0);
return NT_STATUS_INTERNAL_ERROR;
}
- DBG_ERR("Committed bad password reset on user: %s\n",
- ldb_dn_get_linearized(dn));
break;
}
default: