summaryrefslogtreecommitdiff
path: root/source3
diff options
context:
space:
mode:
authorVolker Lendecke <vl@samba.org>2018-12-13 22:23:30 +0100
committerAndrew Bartlett <abartlet@samba.org>2018-12-20 23:40:25 +0100
commitd425cd5b683feeb7fd2d9a532fe7fe9b28c077c8 (patch)
treeed7ee5d44b5bc59f95638d0757c44c2e1c624ec4 /source3
parent1ab6c336a3f242eebb64b88407be86fa2e00da46 (diff)
downloadsamba-d425cd5b683feeb7fd2d9a532fe7fe9b28c077c8.tar.gz
wkssvc: Use dom_sid_str_buf
Signed-off-by: Volker Lendecke <vl@samba.org> Reviewed-by: Gary Lockyer <gary@catalyst.net.nz>
Diffstat (limited to 'source3')
-rw-r--r--source3/rpc_server/wkssvc/srv_wkssvc_nt.c18
1 files changed, 13 insertions, 5 deletions
diff --git a/source3/rpc_server/wkssvc/srv_wkssvc_nt.c b/source3/rpc_server/wkssvc/srv_wkssvc_nt.c
index 82f5b972d74..f661833abe2 100644
--- a/source3/rpc_server/wkssvc/srv_wkssvc_nt.c
+++ b/source3/rpc_server/wkssvc/srv_wkssvc_nt.c
@@ -345,6 +345,8 @@ static struct wkssvc_NetWkstaInfo102 *create_wks_info_102(TALLOC_CTX *mem_ctx)
WERROR _wkssvc_NetWkstaGetInfo(struct pipes_struct *p,
struct wkssvc_NetWkstaGetInfo *r)
{
+ struct dom_sid_buf buf;
+
switch (r->in.level) {
case 100:
/* Level 100 can be allowed from anyone including anonymous
@@ -362,8 +364,9 @@ WERROR _wkssvc_NetWkstaGetInfo(struct pipes_struct *p,
"101\n"));
DEBUGADD(3,(" - does not have sid for Authenticated "
"Users %s:\n",
- sid_string_dbg(
- &global_sid_Authenticated_Users)));
+ dom_sid_str_buf(
+ &global_sid_Authenticated_Users,
+ &buf)));
security_token_debug(DBGC_CLASS, 3,
p->session_info->security_token);
return WERR_ACCESS_DENIED;
@@ -381,7 +384,9 @@ WERROR _wkssvc_NetWkstaGetInfo(struct pipes_struct *p,
"102\n"));
DEBUGADD(3,(" - does not have sid for Administrators "
"group %s, sids are:\n",
- sid_string_dbg(&global_sid_Builtin_Administrators)));
+ dom_sid_str_buf(
+ &global_sid_Builtin_Administrators,
+ &buf)));
security_token_debug(DBGC_CLASS, 3,
p->session_info->security_token);
return WERR_ACCESS_DENIED;
@@ -563,10 +568,13 @@ WERROR _wkssvc_NetWkstaEnumUsers(struct pipes_struct *p,
/* This with any level should only be allowed from a domain administrator */
if (!nt_token_check_sid(&global_sid_Builtin_Administrators,
p->session_info->security_token)) {
+ struct dom_sid_buf buf;
DEBUG(1,("User not allowed for NetWkstaEnumUsers\n"));
DEBUGADD(3,(" - does not have sid for Administrators group "
- "%s\n", sid_string_dbg(
- &global_sid_Builtin_Administrators)));
+ "%s\n",
+ dom_sid_str_buf(
+ &global_sid_Builtin_Administrators,
+ &buf)));
security_token_debug(DBGC_CLASS, 3, p->session_info->security_token);
return WERR_ACCESS_DENIED;
}