conn->protocol = protocol;
- DEBUG(0,("%s:%s: client[%p] session_table[%p] xconn[%p]\n", __func__,__location__,
- conn->client, conn->client->session_table, conn));
-
if (conn->client->session_table != NULL) {
return NT_STATUS_OK;
}
}
}
- DEBUG(0,("%s:%s: client[%p] session_table[%p] xconn[%p]\n", __func__,__location__,
- conn->client, conn->client->session_table, conn));
-
set_Protocol(protocol);
return NT_STATUS_OK;
}
return NT_STATUS_NETWORK_ACCESS_DENIED;
}
- DEBUG(0, ("Connection allowed from %s to %s\n",
+ DEBUG(10, ("Connection allowed from %s to %s\n",
tsocket_address_string(remote_address, talloc_tos()),
tsocket_address_string(local_address, talloc_tos())));
xconn->client = client;
talloc_steal(client, xconn);
- DEBUG(0,("%s:%s: client[%p] xconn[%p] conn[%s]\n", __func__,__location__,
- client, xconn, smbXsrv_connection_dbg(xconn)));
*_xconn = xconn;
TALLOC_FREE(frame);
return NT_STATUS_OK;
{
uint32_t local_id = session_id & UINT32_MAX;
uint64_t local_zeros = session_id & 0xFFFFFFFF00000000LLU;
- NTSTATUS status;
-
- DEBUG(0,("%s:%s: table[%p] conn[%p] id[%llu]\n", __func__, __location__,
- table, conn, (unsigned long long)session_id));
if (local_zeros != 0) {
return NT_STATUS_USER_SESSION_DELETED;
}
- status = smbXsrv_session_local_lookup(table, conn, local_id, now,
- session);
-
- DEBUG(0,("%s:%s: table[%p] conn[%p] id[%llu] => %s\n", __func__, __location__,
- table, conn, (unsigned long long)session_id, nt_errstr(status)));
-
- return status;
+ return smbXsrv_session_local_lookup(table, conn, local_id, now,
+ session);
}
NTSTATUS smb2srv_session_lookup_conn(struct smbXsrv_connection *conn,