From a4a6ed27df245c98217276a2919673164387b0aa Mon Sep 17 00:00:00 2001 From: Luke Leighton Date: Mon, 7 Feb 2000 23:46:09 +0000 Subject: trying to sort out policy handle state info, and making a mess of it. how to set up user-security-context info on a per-connection basis: each POLICY_HND that is created must have a vuser_key associated with it. this must be transferred from POLICY_HND to POLICY_HND (e.g samr_open_domain(connect_pol, &domain_pol) { policy_link_key(connect_pol, domain_pol); } so that the user session key can be picked up from a chain of samr_connect(), samr_open_domain(), samr_open_user(), samr_set_userinfo(). the only consistent info is the POLICY_HND, passed from one call to the next. --- source/rpc_parse/parse_samr.c | 2 ++ 1 file changed, 2 insertions(+) (limited to 'source/rpc_parse/parse_samr.c') diff --git a/source/rpc_parse/parse_samr.c b/source/rpc_parse/parse_samr.c index 2c5685c28e1..0212eb9ffac 100644 --- a/source/rpc_parse/parse_samr.c +++ b/source/rpc_parse/parse_samr.c @@ -4715,6 +4715,7 @@ BOOL sam_io_user_info11(char *desc, SAM_USER_INFO_11 *usr, prs_struct *ps, int BOOL make_sam_user_info24(SAM_USER_INFO_24 *usr, const char newpass[516], uint16 passlen) { + DEBUG(10,("make_sam_user_info24: passlen: %d\n", passlen)); memcpy(usr->pass, newpass, sizeof(usr->pass)); usr->unk_0 = passlen; @@ -5733,6 +5734,7 @@ BOOL make_samr_q_set_userinfo(SAMR_Q_SET_USERINFO *q_u, if (!cli_get_usr_sesskey(hnd, sess_key)) { + DEBUG(0,("make_samr_set_userinfo: could not obtain session key\n")); return False; } if (!make_samr_userinfo_ctr(q_u->ctr, sess_key, switch_value, info)) -- cgit