int rc;
ber_len_t credlen;
+#ifdef NEW_LOGGING
+ LDAP_LOG (( "kbind", LDAP_LEVEL_ENTRY, "ldap_kerberos_bind1\n" ));
+#else
Debug( LDAP_DEBUG_TRACE, "ldap_kerberos_bind1\n", 0, 0, 0 );
+#endif
if( ld->ld_version > LDAP_VERSION2 ) {
ld->ld_errno = LDAP_NOT_SUPPORTED;
int msgid;
LDAPMessage *res;
+#ifdef NEW_LOGGING
+ LDAP_LOG (( "kbind", LDAP_LEVEL_ENTRY, "ldap_kerberos_bind1_s\n" ));
+#else
Debug( LDAP_DEBUG_TRACE, "ldap_kerberos_bind1_s\n", 0, 0, 0 );
+#endif
/* initiate the bind */
if ( (msgid = ldap_kerberos_bind1( ld, dn )) == -1 )
int rc;
ber_len_t credlen;
+#ifdef NEW_LOGGING
+ LDAP_LOG (( "kbind", LDAP_LEVEL_ENTRY, "ldap_kerberos_bind2\n" ));
+#else
Debug( LDAP_DEBUG_TRACE, "ldap_kerberos_bind2\n", 0, 0, 0 );
+#endif
if( ld->ld_version > LDAP_VERSION2 ) {
ld->ld_errno = LDAP_NOT_SUPPORTED;
int msgid;
LDAPMessage *res;
+#ifdef NEW_LOGGING
+ LDAP_LOG (( "kbind", LDAP_LEVEL_ENTRY, "ldap_kerberos_bind2_s\n" ));
+#else
Debug( LDAP_DEBUG_TRACE, "ldap_kerberos_bind2_s\n", 0, 0, 0 );
+#endif
/* initiate the bind */
if ( (msgid = ldap_kerberos_bind2( ld, dn )) == -1 )
{
int err;
+#ifdef NEW_LOGGING
+ LDAP_LOG (( "kbind", LDAP_LEVEL_ENTRY, "ldap_kerberos_bind_s\n" ));
+#else
Debug( LDAP_DEBUG_TRACE, "ldap_kerberos_bind_s\n", 0, 0, 0 );
+#endif
if ( (err = ldap_kerberos_bind1_s( ld, dn )) != LDAP_SUCCESS )
return( err );
int err;
char realm[REALM_SZ], *cred, *krbinstance;
+#ifdef NEW_LOGGING
+ LDAP_LOG (( "kbind", LDAP_LEVEL_ENTRY,
+ "ldap_get_kerberosv4_credentials\n" ));
+#else
Debug( LDAP_DEBUG_TRACE, "ldap_get_kerberosv4_credentials\n", 0, 0, 0 );
+#endif
if ( (err = krb_get_tf_realm( tkt_string(), realm )) != KSUCCESS ) {
+#ifdef NEW_LOGGING
+ LDAP_LOG (( "kbind", LDAP_LEVEL_ERR,
+ "ldap_get_kerberosv4_credentials: krb_get_tf_realm failed: %s\n",
+ krb_err_txt[err] ));
+#else
Debug( LDAP_DEBUG_ANY, "ldap_get_kerberosv4_credentials: "
"krb_get_tf_realm failed: %s\n", krb_err_txt[err], 0, 0 );
+#endif
ld->ld_errno = LDAP_AUTH_UNKNOWN;
return( NULL );
}
if ( (err = krb_mk_req( &ktxt, service, krbinstance, realm, 0 ))
!= KSUCCESS )
{
+#ifdef NEW_LOGGING
+ LDAP_LOG (( "kbind", LDAP_LEVEL_ERR,
+ "ldap_get_kerberosv4_credentials: krb_mk_req failed: %s\n",
+ krb_err_txt[err] ));
+#else
Debug( LDAP_DEBUG_ANY, "ldap_get_kerberosv4_credentials: "
"krb_mk_req failed (%s)\n", krb_err_txt[err], 0, 0 );
+#endif
ld->ld_errno = LDAP_AUTH_UNKNOWN;
return( NULL );
}
* }
*/
+#ifdef NEW_LOGGING
+ LDAP_LOG (( "modify", LDAP_LEVEL_ENTRY, "ldap_modify_ext\n" ));
+#else
Debug( LDAP_DEBUG_TRACE, "ldap_modify_ext\n", 0, 0, 0 );
+#endif
/* check client controls */
rc = ldap_int_client_controls( ld, cctrls );
{
int rc, msgid;
+#ifdef NEW_LOGGING
+ LDAP_LOG (( "modify", LDAP_LEVEL_ENTRY, "ldap_modify\n" ));
+#else
Debug( LDAP_DEBUG_TRACE, "ldap_modify\n", 0, 0, 0 );
+#endif
rc = ldap_modify_ext( ld, dn, mods, NULL, NULL, &msgid );