discard_const_p(char *, &result->account_name),
vals[0], &converted_size))
{
- DEBUG(0,("ldapuser2displayentry: pull_utf8_talloc failed: %s",
+ DEBUG(0,("ldapuser2displayentry: pull_utf8_talloc failed: %s\n",
strerror(errno)));
}
discard_const_p(char *, &result->fullname),
vals[0], &converted_size))
{
- DEBUG(0,("ldapuser2displayentry: pull_utf8_talloc failed: %s",
+ DEBUG(0,("ldapuser2displayentry: pull_utf8_talloc failed: %s\n",
strerror(errno)));
}
discard_const_p(char *, &result->description),
vals[0], &converted_size))
{
- DEBUG(0,("ldapuser2displayentry: pull_utf8_talloc failed: %s",
+ DEBUG(0,("ldapuser2displayentry: pull_utf8_talloc failed: %s\n",
strerror(errno)));
}
vals[0], &converted_size))
{
DEBUG(0,("ldapgroup2displayentry: pull_utf8_talloc "
- "failed: %s", strerror(errno)));
+ "failed: %s\n", strerror(errno)));
}
}
else if (!pull_utf8_talloc(mem_ctx,
&result->account_name),
vals[0], &converted_size))
{
- DEBUG(0,("ldapgroup2displayentry: pull_utf8_talloc failed: %s",
+ DEBUG(0,("ldapgroup2displayentry: pull_utf8_talloc failed: %s\n",
strerror(errno)));
}
discard_const_p(char *, &result->description),
vals[0], &converted_size))
{
- DEBUG(0,("ldapgroup2displayentry: pull_utf8_talloc failed: %s",
+ DEBUG(0,("ldapgroup2displayentry: pull_utf8_talloc failed: %s\n",
strerror(errno)));
}
ldap_value_free(vals);
switch (modop) {
case LDAP_MOD_ADD:
- DEBUG(1,("ldapsam_change_groupmem: add new member(rid=%d) to a domain group(rid=%d)", member_rid, group_rid));
+ DEBUG(1,("ldapsam_change_groupmem: add new member(rid=%d) to a domain group(rid=%d)\n", member_rid, group_rid));
break;
case LDAP_MOD_DELETE:
- DEBUG(1,("ldapsam_change_groupmem: delete member(rid=%d) from a domain group(rid=%d)", member_rid, group_rid));
+ DEBUG(1,("ldapsam_change_groupmem: delete member(rid=%d) from a domain group(rid=%d)\n", member_rid, group_rid));
break;
default:
return NT_STATUS_UNSUCCESSFUL;
if (id_map.xid.type == ID_TYPE_GID || id_map.xid.type == ID_TYPE_BOTH) {
map->gid = id_map.xid.id;
} else {
- DEBUG(1, (__location__ "Did not get GUID when mapping SID for %s", expression));
+ DEBUG(1, (__location__ "Did not get GUID when mapping SID for %s\n", expression));
talloc_free(tmp_ctx);
return NT_STATUS_INTERNAL_DB_CORRUPTION;
}
} else if (samdb_find_attribute(state->ldb, msg, "objectClass", "user")) {
- DEBUG(1, (__location__ "Got SID_NAME_USER when searching for a group with %s", expression));
+ DEBUG(1, (__location__ "Got SID_NAME_USER when searching for a group with %s\n", expression));
talloc_free(tmp_ctx);
return NT_STATUS_INTERNAL_DB_CORRUPTION;
}
status = dsdb_trust_search_tdos(state->ldb, NULL,
attrs, tmp_ctx, &res);
if (!NT_STATUS_IS_OK(status)) {
- DBG_ERR("dsdb_trust_search_tdos() - %s ", nt_errstr(status));
+ DBG_ERR("dsdb_trust_search_tdos() - %s\n", nt_errstr(status));
TALLOC_FREE(tmp_ctx);
return status;
}
status = dsdb_trust_search_tdo(state->ldb, domain, NULL,
attrs, tmp_ctx, &msg);
if (!NT_STATUS_IS_OK(status)) {
- DBG_ERR("dsdb_trust_search_tdo(%s) - %s ",
+ DBG_ERR("dsdb_trust_search_tdo(%s) - %s\n",
domain, nt_errstr(status));
TALLOC_FREE(tmp_ctx);
return status;
status = pdb_samba_dsdb_msg_to_trusted_domain(msg, mem_ctx, &d);
if (!NT_STATUS_IS_OK(status)) {
- DBG_ERR("pdb_samba_dsdb_msg_to_trusted_domain(%s) - %s ",
+ DBG_ERR("pdb_samba_dsdb_msg_to_trusted_domain(%s) - %s\n",
domain, nt_errstr(status));
TALLOC_FREE(tmp_ctx);
return status;
status = dsdb_trust_search_tdo_by_sid(state->ldb, sid,
attrs, tmp_ctx, &msg);
if (!NT_STATUS_IS_OK(status)) {
- DBG_ERR("dsdb_trust_search_tdo_by_sid(%s) - %s ",
+ DBG_ERR("dsdb_trust_search_tdo_by_sid(%s) - %s\n",
dom_sid_str_buf(sid, &buf),
nt_errstr(status));
TALLOC_FREE(tmp_ctx);
status = pdb_samba_dsdb_msg_to_trusted_domain(msg, mem_ctx, &d);
if (!NT_STATUS_IS_OK(status)) {
- DBG_ERR("pdb_samba_dsdb_msg_to_trusted_domain(%s) - %s ",
+ DBG_ERR("pdb_samba_dsdb_msg_to_trusted_domain(%s) - %s\n",
dom_sid_str_buf(sid, &buf),
nt_errstr(status));
TALLOC_FREE(tmp_ctx);
status = dsdb_trust_search_tdos(state->ldb, NULL,
attrs, tmp_ctx, &res);
if (!NT_STATUS_IS_OK(status)) {
- DBG_ERR("dsdb_trust_search_tdos() - %s ", nt_errstr(status));
+ DBG_ERR("dsdb_trust_search_tdos() - %s\n", nt_errstr(status));
TALLOC_FREE(tmp_ctx);
return status;
}
status = pdb_samba_dsdb_msg_to_trusted_domain(msg, domains, &d);
if (!NT_STATUS_IS_OK(status)) {
- DBG_ERR("pdb_samba_dsdb_msg_to_trusted_domain() - %s ",
+ DBG_ERR("pdb_samba_dsdb_msg_to_trusted_domain() - %s\n",
nt_errstr(status));
TALLOC_FREE(tmp_ctx);
return status;
exist. File successfully created.\n", pfile));
} else {
DEBUG(0, ("startsmbfilepwent_internal: file %s did not \
-exist. Couldn't create new one. Error was: %s",
+exist. Couldn't create new one. Error was: %s\n",
pfile, strerror(errno)));
return NULL;
}
status = dbwrap_store_bystring(db_sam, keystr, data, flag);
if (!NT_STATUS_IS_OK(status)) {
- DEBUG(0, ("Unable to modify passwd TDB: %s!",
+ DEBUG(0, ("Unable to modify passwd TDB: %s!\n",
nt_errstr(status)));
goto done;
}
char *tdbkey = NULL;
if (( ! owner) || ( ! key)) {
- DEBUG(1, ("Invalid Parameters"));
+ DEBUG(1, ("Invalid Parameters\n"));
return NULL;
}