s4: fixed a unsigned printf warnings
[ira/wip.git] / source4 / rpc_server / dcesrv_auth.c
index bef7e4be78134b94967ffa67a9a95e053fc2c2db..3499ca2187725cfc43132bd9bb6aab75a33390b0 100644 (file)
@@ -27,6 +27,7 @@
 #include "librpc/gen_ndr/ndr_dcerpc.h"
 #include "auth/credentials/credentials.h"
 #include "auth/gensec/gensec.h"
+#include "auth/auth.h"
 #include "param/param.h"
 
 /*
@@ -61,12 +62,6 @@ bool dcesrv_auth_bind(struct dcesrv_call_state *call)
                return false;
        }
 
-       status = gensec_server_start(dce_conn, call->event_ctx, call->conn->dce_ctx->lp_ctx, call->msg_ctx, &auth->gensec_security);
-       if (!NT_STATUS_IS_OK(status)) {
-               DEBUG(1, ("Failed to start GENSEC for DCERPC server: %s\n", nt_errstr(status)));
-               return false;
-       }
-
        server_credentials 
                = cli_credentials_init(call);
        if (!server_credentials) {
@@ -82,7 +77,12 @@ bool dcesrv_auth_bind(struct dcesrv_call_state *call)
                server_credentials = NULL;
        }
 
-       gensec_set_credentials(auth->gensec_security, server_credentials);
+       status = samba_server_gensec_start(dce_conn, call->event_ctx, 
+                                          call->msg_ctx,
+                                          call->conn->dce_ctx->lp_ctx, 
+                                          server_credentials,
+                                          NULL,
+                                          &auth->gensec_security);
 
        status = gensec_start_mech_by_authtype(auth->gensec_security, auth->auth_info->auth_type, 
                                               auth->auth_info->auth_level);
@@ -516,9 +516,9 @@ bool dcesrv_auth_response(struct dcesrv_call_state *call,
        if (NT_STATUS_IS_OK(status)) {
                if (creds2.length != sig_size) {
                        DEBUG(0,("dcesrv_auth_response: creds2.length[%u] != sig_size[%u] pad[%u] stub[%u]\n",
-                               creds2.length, (uint32_t)sig_size,
-                               dce_conn->auth_state.auth_info->auth_pad_length,
-                               pkt->u.response.stub_and_verifier.length));
+                                (unsigned)creds2.length, (uint32_t)sig_size,
+                                (unsigned)dce_conn->auth_state.auth_info->auth_pad_length,
+                                (unsigned)pkt->u.response.stub_and_verifier.length));
                        data_blob_free(&creds2);
                        status = NT_STATUS_INTERNAL_ERROR;
                }