Author: hpoussin
Date: Sat Nov 10 20:12:43 2007
New Revision: 30336
URL:
http://svn.reactos.org/svn/reactos?rev=30336&view=rev
Log:
Don't mix ReactOS and Wine debug style
Modified:
trunk/reactos/base/system/winlogon/sas.c
Modified: trunk/reactos/base/system/winlogon/sas.c
URL:
http://svn.reactos.org/svn/reactos/trunk/reactos/base/system/winlogon/sas.c…
==============================================================================
--- trunk/reactos/base/system/winlogon/sas.c (original)
+++ trunk/reactos/base/system/winlogon/sas.c Sat Nov 10 20:12:43 2007
@@ -354,12 +354,12 @@
// Might as well store it when the user logs on?
if(!AllocateAndInitializeSid(&WorldAuthority,
- 1,
- SECURITY_WORLD_RID,
- 0, 0, 0, 0, 0, 0, 0,
- &pEveryoneSID))
- {
- DPRINT("Failed to initialize security descriptor for logoff thread!\n");
+ 1,
+ SECURITY_WORLD_RID,
+ 0, 0, 0, 0, 0, 0, 0,
+ &pEveryoneSID))
+ {
+ ERR("Failed to initialize security descriptor for logoff thread!\n");
return STATUS_UNSUCCESSFUL;
}
@@ -373,7 +373,7 @@
sizeof(ACL));
if (!pMem)
{
- DPRINT("Failed to allocate memory for logoff security descriptor!\n");
+ ERR("Failed to allocate memory for logoff security descriptor!\n");
return STATUS_NO_MEMORY;
}
@@ -396,8 +396,8 @@
if (SetEntriesInAcl(1, &Access, NULL, &pACL) != ERROR_SUCCESS)
{
- // SetEntriesInAcl is not implemented yet
- DPRINT1 ("Failed to set Access Rights for logoff thread. Logging out will
most likely fail.\n");
+ // SetEntriesInAcl is not implemented yet
+ ERR("Failed to set Access Rights for logoff thread. Logging out will most likely
fail.\n");
HeapFree(GetProcessHeap(), 0, pMem);
return STATUS_UNSUCCESSFUL;
@@ -405,17 +405,17 @@
if (!InitializeSecurityDescriptor(SecurityDescriptor, SECURITY_DESCRIPTOR_REVISION))
{
+ ERR("Failed to initialize security descriptor for logoff thread!\n");
HeapFree(GetProcessHeap(), 0, pMem);
- DPRINT("Failed to initialize security descriptor for logoff thread!\n");
return STATUS_UNSUCCESSFUL;
}
if (!SetSecurityDescriptorDacl(SecurityDescriptor,
- TRUE, // bDaclPresent flag
- pACL,
- FALSE)) // not a default DACL
- {
- DPRINT("SetSecurityDescriptorDacl Error %u\n", GetLastError());
+ TRUE, // bDaclPresent flag
+ pACL,
+ FALSE)) // not a default DACL
+ {
+ ERR("SetSecurityDescriptorDacl Error %u\n", GetLastError());
HeapFree(GetProcessHeap(), 0, pMem);
return STATUS_UNSUCCESSFUL;
}