matches.
*/
if (!base->domain_sid) {
- DEBUG(0, ("Cannot operate on a Netlogon Validation without a domain SID"));
+ DEBUG(0, ("Cannot operate on a Netlogon Validation without a domain SID\n"));
talloc_free(user_info_dc);
return NT_STATUS_INVALID_PARAMETER;
}
*/
if (rg->domain_sid == NULL) {
talloc_free(user_info_dc);
- DEBUG(0, ("Cannot operate on a PAC without a resource domain SID"));
+ DEBUG(0, ("Cannot operate on a PAC without a resource domain SID\n"));
return NT_STATUS_INVALID_PARAMETER;
}
* NETLOGON pipe session key .
*/
if (all_zero(data.data, data.length)) {
- DBG_ERR("Supplied data all zeros, could leak session key");
+ DBG_ERR("Supplied data all zeros, could leak session key\n");
return NT_STATUS_INVALID_PARAMETER;
}
if (state->negotiate_flags & NETLOGON_NEG_SUPPORTS_AES) {
data.data,
data.length);
} else {
- DBG_ERR("Unsupported encryption option negotiated");
+ DBG_ERR("Unsupported encryption option negotiated\n");
status = NT_STATUS_NOT_SUPPORTED;
}
if (!NT_STATUS_IS_OK(status)) {