}
if (lret == LDB_ERR_NO_SUCH_OBJECT) {
- krb5_warnx(context, "samba_kdc_fetch: could not find KRBTGT number %u in DB!",
+ krb5_warnx(context, "samba_kdc_fetch_krbtgt: could not find KRBTGT number %u in DB!",
(unsigned)(krbtgt_number));
krb5_set_error_message(context, SDB_ERR_NOENTRY,
- "samba_kdc_fetch: could not find KRBTGT number %u in DB!",
+ "samba_kdc_fetch_krbtgt: could not find KRBTGT number %u in DB!",
(unsigned)(krbtgt_number));
return SDB_ERR_NOENTRY;
} else if (lret != LDB_SUCCESS) {
- krb5_warnx(context, "samba_kdc_fetch: could not find KRBTGT number %u in DB!",
+ krb5_warnx(context, "samba_kdc_fetch_krbtgt: could not find KRBTGT number %u in DB!",
(unsigned)(krbtgt_number));
krb5_set_error_message(context, SDB_ERR_NOENTRY,
- "samba_kdc_fetch: could not find KRBTGT number %u in DB!",
+ "samba_kdc_fetch_krbtgt: could not find KRBTGT number %u in DB!",
(unsigned)(krbtgt_number));
return SDB_ERR_NOENTRY;
}
principal, SAMBA_KDC_ENT_TYPE_KRBTGT,
flags, kvno, realm_dn, msg, entry);
if (ret != 0) {
- krb5_warnx(context, "samba_kdc_fetch: self krbtgt message2entry failed");
+ krb5_warnx(context, "samba_kdc_fetch_krbtgt: self krbtgt message2entry failed");
}
return ret;
direction = OUTBOUND;
realm = realm_from_princ;
} else {
- krb5_warnx(context, "samba_kdc_fetch: not our realm for trusts ('%s', '%s')",
+ krb5_warnx(context, "samba_kdc_fetch_krbtgt: not our realm for trusts ('%s', '%s')",
realm_from_princ,
realm_princ_comp);
- krb5_set_error_message(context, SDB_ERR_NOENTRY, "samba_kdc_fetch: not our realm for trusts ('%s', '%s')",
+ krb5_set_error_message(context, SDB_ERR_NOENTRY, "samba_kdc_fetch_krbtgt: not our realm for trusts ('%s', '%s')",
realm_from_princ,
realm_princ_comp);
return SDB_ERR_NOENTRY;
realm, realm_dn, &msg);
if (ret != 0) {
- krb5_warnx(context, "samba_kdc_fetch: could not find principal in DB");
- krb5_set_error_message(context, ret, "samba_kdc_fetch: could not find principal in DB");
+ krb5_warnx(context, "samba_kdc_fetch_krbtgt: could not find principal in DB");
+ krb5_set_error_message(context, ret, "samba_kdc_fetch_krbtgt: could not find principal in DB");
return ret;
}
direction,
realm_dn, flags, kvno, msg, entry);
if (ret != 0) {
- krb5_warnx(context, "samba_kdc_fetch: trust_message2entry failed for %s",
+ krb5_warnx(context, "samba_kdc_fetch_krbtgt: trust_message2entry failed for %s",
ldb_dn_get_linearized(msg->dn));
- krb5_set_error_message(context, ret, "samba_kdc_fetch: "
+ krb5_set_error_message(context, ret, "samba_kdc_fetch_krbtgt: "
"trust_message2entry failed for %s",
ldb_dn_get_linearized(msg->dn));
}
enterprise_principal = NULL;
if (ret != 0) {
- krb5_set_error_message(context, ret, "samba_kdc_lookup_principal: could not parse principal");
- krb5_warnx(context, "samba_kdc_lookup_principal: could not parse principal");
+ krb5_set_error_message(context, ret, "samba_kdc_lookup_server: could not parse principal");
+ krb5_warnx(context, "samba_kdc_lookup_server: could not parse principal");
return ret;
}
code = krb5_unparse_name(context, principal, &client_name);
if (code == 0) {
krb5_warnx(context,
- "samba_kdc_fetch: message2entry failed for "
+ "samba_kdc_fetch_server: message2entry failed for "
"%s",
client_name);
} else {
krb5_warnx(context,
- "samba_kdc_fetch: message2entry and "
+ "samba_kdc_fetch_server: message2entry and "
"krb5_unparse_name failed");
}
SAFE_FREE(client_name);
if (!mem_ctx) {
ret = ENOMEM;
- krb5_set_error_message(context, ret, "samba_kdc_fetch: talloc_named() failed!");
+ krb5_set_error_message(context, ret, "samba_kdc_check_pkinit_ms_upn_match: talloc_named() failed!");
return ret;
}
"(&(objectClass=user)(samAccountName=krbtgt))");
if (ldb_ret != LDB_SUCCESS) {
- DEBUG(1, ("samba_kdc_fetch: could not find own KRBTGT in DB: %s\n", ldb_errstring(kdc_db_ctx->samdb)));
+ DEBUG(1, ("samba_kdc_setup_db_ctx: could not find own KRBTGT in DB: %s\n", ldb_errstring(kdc_db_ctx->samdb)));
talloc_free(kdc_db_ctx);
return NT_STATUS_CANT_ACCESS_DOMAIN_INFO;
}