mirror of
https://github.com/samba-team/samba.git
synced 2024-12-22 13:34:15 +03:00
Fix some types
Autobuild-User: Jelmer Vernooij <jelmer@samba.org> Autobuild-Date: Mon Feb 28 23:30:06 CET 2011 on sn-devel-104
This commit is contained in:
parent
f7b4209f99
commit
59a077d8f5
@ -156,7 +156,7 @@
|
|||||||
could cause the helper to authenticate the
|
could cause the helper to authenticate the
|
||||||
user). </para>
|
user). </para>
|
||||||
|
|
||||||
<para>Curently implemented parameters from the
|
<para>Currently implemented parameters from the
|
||||||
external program to the helper are:</para>
|
external program to the helper are:</para>
|
||||||
<variablelist>
|
<variablelist>
|
||||||
<varlistentry>
|
<varlistentry>
|
||||||
|
@ -123,7 +123,7 @@
|
|||||||
|
|
||||||
<varlistentry>
|
<varlistentry>
|
||||||
<term>-f, --rcfile</term>
|
<term>-f, --rcfile</term>
|
||||||
<listitem><para>Use specified rcfile. This will be loaded in the order it was specified - e.g. if you specify any options before this one, they might get overriden by the contents of the rcfile.</para></listitem>
|
<listitem><para>Use specified rcfile. This will be loaded in the order it was specified - e.g. if you specify any options before this one, they might get overridden by the contents of the rcfile.</para></listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
<varlistentry>
|
<varlistentry>
|
||||||
|
@ -152,7 +152,7 @@ enum lsa_SidType ds_atype_map(uint32_t atype)
|
|||||||
}
|
}
|
||||||
|
|
||||||
/* get the default primary group RID for a given userAccountControl
|
/* get the default primary group RID for a given userAccountControl
|
||||||
* (informations according to MS-SAMR 3.1.1.8.1) */
|
* (information according to MS-SAMR 3.1.1.8.1) */
|
||||||
uint32_t ds_uf2prim_group_rid(uint32_t uf)
|
uint32_t ds_uf2prim_group_rid(uint32_t uf)
|
||||||
{
|
{
|
||||||
uint32_t prim_group_rid = DOMAIN_RID_USERS;
|
uint32_t prim_group_rid = DOMAIN_RID_USERS;
|
||||||
|
@ -557,7 +557,7 @@ static void smb_traffic_analyzer_send_data(vfs_handle_struct *handle,
|
|||||||
|
|
||||||
} else {
|
} else {
|
||||||
DEBUG(1, ("smb_traffic_analyzer_send_data_socket: "
|
DEBUG(1, ("smb_traffic_analyzer_send_data_socket: "
|
||||||
"error, unkown protocol given!\n"));
|
"error, unknown protocol given!\n"));
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -4814,7 +4814,7 @@ static bool ldapgroup2displayentry(struct ldap_search_state *state,
|
|||||||
break;
|
break;
|
||||||
|
|
||||||
default:
|
default:
|
||||||
DEBUG(0,("unkown group type: %d\n", group_type));
|
DEBUG(0,("unknown group type: %d\n", group_type));
|
||||||
return False;
|
return False;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -6625,7 +6625,7 @@ NTSTATUS pdb_init_ldapsam(struct pdb_methods **pdb_method, const char *location)
|
|||||||
"info, nor add one to the domain\n"));
|
"info, nor add one to the domain\n"));
|
||||||
DEBUGADD(2, ("pdb_init_ldapsam: Continuing on regardless, "
|
DEBUGADD(2, ("pdb_init_ldapsam: Continuing on regardless, "
|
||||||
"will be unable to allocate new users/groups, "
|
"will be unable to allocate new users/groups, "
|
||||||
"and will risk BDCs having inconsistant SIDs\n"));
|
"and will risk BDCs having inconsistent SIDs\n"));
|
||||||
sid_copy(&ldap_state->domain_sid, get_global_sam_sid());
|
sid_copy(&ldap_state->domain_sid, get_global_sam_sid());
|
||||||
return NT_STATUS_OK;
|
return NT_STATUS_OK;
|
||||||
}
|
}
|
||||||
|
@ -144,7 +144,7 @@ const char *get_short_archi(const char *long_archi)
|
|||||||
{
|
{
|
||||||
int i=-1;
|
int i=-1;
|
||||||
|
|
||||||
DEBUG(107,("Getting architecture dependant directory\n"));
|
DEBUG(107,("Getting architecture dependent directory\n"));
|
||||||
do {
|
do {
|
||||||
i++;
|
i++;
|
||||||
} while ( (archi_table[i].long_archi!=NULL ) &&
|
} while ( (archi_table[i].long_archi!=NULL ) &&
|
||||||
|
@ -3743,7 +3743,7 @@ WERROR _spoolss_RouterRefreshPrinterChangeNotify(struct pipes_struct *p,
|
|||||||
* We are now using the change value, and
|
* We are now using the change value, and
|
||||||
* I should check for PRINTER_NOTIFY_OPTIONS_REFRESH but as
|
* I should check for PRINTER_NOTIFY_OPTIONS_REFRESH but as
|
||||||
* I don't have a global notification system, I'm sending back all the
|
* I don't have a global notification system, I'm sending back all the
|
||||||
* informations even when _NOTHING_ has changed.
|
* information even when _NOTHING_ has changed.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
/* We need to keep track of the change value to send back in
|
/* We need to keep track of the change value to send back in
|
||||||
|
@ -77,7 +77,7 @@ static const char *cmd_spoolss_get_short_archi(const char *long_archi)
|
|||||||
{
|
{
|
||||||
int i=-1;
|
int i=-1;
|
||||||
|
|
||||||
DEBUG(107,("Getting architecture dependant directory\n"));
|
DEBUG(107,("Getting architecture dependent directory\n"));
|
||||||
do {
|
do {
|
||||||
i++;
|
i++;
|
||||||
} while ( (archi_table[i].long_archi!=NULL ) &&
|
} while ( (archi_table[i].long_archi!=NULL ) &&
|
||||||
@ -1722,7 +1722,7 @@ static WERROR cmd_spoolss_addprinterdriver(struct rpc_pipe_client *cli,
|
|||||||
|
|
||||||
arch = cmd_spoolss_get_short_archi(argv[1]);
|
arch = cmd_spoolss_get_short_archi(argv[1]);
|
||||||
if (!arch) {
|
if (!arch) {
|
||||||
printf ("Error Unknown architechture [%s]\n", argv[1]);
|
printf ("Error Unknown architecture [%s]\n", argv[1]);
|
||||||
return WERR_INVALID_PARAM;
|
return WERR_INVALID_PARAM;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -586,7 +586,7 @@ static struct cmd_set rpcclient_commands[] = {
|
|||||||
{ "seal", RPC_RTYPE_NTSTATUS, cmd_seal, NULL, NULL, NULL, "Force RPC pipe connections to be sealed", "" },
|
{ "seal", RPC_RTYPE_NTSTATUS, cmd_seal, NULL, NULL, NULL, "Force RPC pipe connections to be sealed", "" },
|
||||||
{ "schannel", RPC_RTYPE_NTSTATUS, cmd_schannel, NULL, NULL, NULL, "Force RPC pipe connections to be sealed with 'schannel'. Assumes valid machine account to this domain controller.", "" },
|
{ "schannel", RPC_RTYPE_NTSTATUS, cmd_schannel, NULL, NULL, NULL, "Force RPC pipe connections to be sealed with 'schannel'. Assumes valid machine account to this domain controller.", "" },
|
||||||
{ "schannelsign", RPC_RTYPE_NTSTATUS, cmd_schannel_sign, NULL, NULL, NULL, "Force RPC pipe connections to be signed (not sealed) with 'schannel'. Assumes valid machine account to this domain controller.", "" },
|
{ "schannelsign", RPC_RTYPE_NTSTATUS, cmd_schannel_sign, NULL, NULL, NULL, "Force RPC pipe connections to be signed (not sealed) with 'schannel'. Assumes valid machine account to this domain controller.", "" },
|
||||||
{ "timeout", RPC_RTYPE_NTSTATUS, cmd_timeout, NULL, NULL, NULL, "Set timeout (in milliseonds) for RPC operations", "" },
|
{ "timeout", RPC_RTYPE_NTSTATUS, cmd_timeout, NULL, NULL, NULL, "Set timeout (in milliseconds) for RPC operations", "" },
|
||||||
{ "transport", RPC_RTYPE_NTSTATUS, cmd_choose_transport, NULL, NULL, NULL, "Choose ncacn transport for RPC operations", "" },
|
{ "transport", RPC_RTYPE_NTSTATUS, cmd_choose_transport, NULL, NULL, NULL, "Choose ncacn transport for RPC operations", "" },
|
||||||
{ "none", RPC_RTYPE_NTSTATUS, cmd_none, NULL, NULL, NULL, "Force RPC pipe connections to have no special properties", "" },
|
{ "none", RPC_RTYPE_NTSTATUS, cmd_none, NULL, NULL, NULL, "Force RPC pipe connections to have no special properties", "" },
|
||||||
|
|
||||||
|
@ -1830,7 +1830,7 @@ static int net_ads_printer_publish(struct net_context *c, int argc, const char *
|
|||||||
Undefined);
|
Undefined);
|
||||||
|
|
||||||
if (NT_STATUS_IS_ERR(nt_status)) {
|
if (NT_STATUS_IS_ERR(nt_status)) {
|
||||||
d_fprintf(stderr, _("Unable to open a connnection to %s to "
|
d_fprintf(stderr, _("Unable to open a connection to %s to "
|
||||||
"obtain data for %s\n"),
|
"obtain data for %s\n"),
|
||||||
servername, printername);
|
servername, printername);
|
||||||
ads_destroy(&ads);
|
ads_destroy(&ads);
|
||||||
@ -1879,7 +1879,7 @@ static int net_ads_printer_publish(struct net_context *c, int argc, const char *
|
|||||||
|
|
||||||
nt_status = cli_rpc_pipe_open_noauth(cli, &ndr_table_spoolss.syntax_id, &pipe_hnd);
|
nt_status = cli_rpc_pipe_open_noauth(cli, &ndr_table_spoolss.syntax_id, &pipe_hnd);
|
||||||
if (!NT_STATUS_IS_OK(nt_status)) {
|
if (!NT_STATUS_IS_OK(nt_status)) {
|
||||||
d_fprintf(stderr, _("Unable to open a connnection to the spoolss pipe on %s\n"),
|
d_fprintf(stderr, _("Unable to open a connection to the spoolss pipe on %s\n"),
|
||||||
servername);
|
servername);
|
||||||
SAFE_FREE(prt_dn);
|
SAFE_FREE(prt_dn);
|
||||||
ads_destroy(&ads);
|
ads_destroy(&ads);
|
||||||
|
@ -1333,7 +1333,7 @@ static NTSTATUS rpc_printer_publish_internals_args(struct rpc_pipe_client *pipe_
|
|||||||
break;
|
break;
|
||||||
default:
|
default:
|
||||||
action_str = N_("unknown action");
|
action_str = N_("unknown action");
|
||||||
printf(_("unkown action: %d\n"), action);
|
printf(_("unknown action: %d\n"), action);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -1498,7 +1498,7 @@ NTSTATUS rpc_printer_publish_list_internals(struct net_context *c,
|
|||||||
sharename);
|
sharename);
|
||||||
break;
|
break;
|
||||||
default:
|
default:
|
||||||
printf(_("unkown state: %d\n"), state);
|
printf(_("unknown state: %d\n"), state);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -706,7 +706,7 @@ _PUBLIC_ int cli_credentials_get_server_gss_creds(struct cli_credentials *cred,
|
|||||||
|
|
||||||
ret = principal_from_credentials(mem_ctx, cred, smb_krb5_context, &princ, &obtained, &error_string);
|
ret = principal_from_credentials(mem_ctx, cred, smb_krb5_context, &princ, &obtained, &error_string);
|
||||||
if (ret) {
|
if (ret) {
|
||||||
DEBUG(1,("cli_credentials_get_server_gss_creds: makeing krb5 principal failed (%s)\n",
|
DEBUG(1,("cli_credentials_get_server_gss_creds: making krb5 principal failed (%s)\n",
|
||||||
error_string));
|
error_string));
|
||||||
talloc_free(mem_ctx);
|
talloc_free(mem_ctx);
|
||||||
return ret;
|
return ret;
|
||||||
|
@ -189,7 +189,7 @@ NTSTATUS fill_netlogon_samlogon_response(struct ldb_context *sam_ctx,
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (dom_res == NULL) {
|
if (dom_res == NULL) {
|
||||||
DEBUG(2,(__location__ ": Unable to get domain informations with no inputs\n"));
|
DEBUG(2,(__location__ ": Unable to get domain information with no inputs\n"));
|
||||||
return NT_STATUS_NO_SUCH_DOMAIN;
|
return NT_STATUS_NO_SUCH_DOMAIN;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -2021,7 +2021,7 @@ int samdb_set_password_callback(struct ldb_request *req, struct ldb_reply *ares)
|
|||||||
* Sets the user password using plaintext UTF16 (attribute "new_password") or
|
* Sets the user password using plaintext UTF16 (attribute "new_password") or
|
||||||
* LM (attribute "lmNewHash") or NT (attribute "ntNewHash") hash. Also pass
|
* LM (attribute "lmNewHash") or NT (attribute "ntNewHash") hash. Also pass
|
||||||
* the old LM and/or NT hash (attributes "lmOldHash"/"ntOldHash") if it is a
|
* the old LM and/or NT hash (attributes "lmOldHash"/"ntOldHash") if it is a
|
||||||
* user change or not. The "rejectReason" gives some more informations if the
|
* user change or not. The "rejectReason" gives some more information if the
|
||||||
* change failed.
|
* change failed.
|
||||||
*
|
*
|
||||||
* Results: NT_STATUS_OK, NT_STATUS_INVALID_PARAMETER, NT_STATUS_UNSUCCESSFUL,
|
* Results: NT_STATUS_OK, NT_STATUS_INVALID_PARAMETER, NT_STATUS_UNSUCCESSFUL,
|
||||||
@ -2203,7 +2203,7 @@ NTSTATUS samdb_set_password(struct ldb_context *ldb, TALLOC_CTX *mem_ctx,
|
|||||||
* Sets the user password using plaintext UTF16 (attribute "new_password") or
|
* Sets the user password using plaintext UTF16 (attribute "new_password") or
|
||||||
* LM (attribute "lmNewHash") or NT (attribute "ntNewHash") hash. Also pass
|
* LM (attribute "lmNewHash") or NT (attribute "ntNewHash") hash. Also pass
|
||||||
* the old LM and/or NT hash (attributes "lmOldHash"/"ntOldHash") if it is a
|
* the old LM and/or NT hash (attributes "lmOldHash"/"ntOldHash") if it is a
|
||||||
* user change or not. The "rejectReason" gives some more informations if the
|
* user change or not. The "rejectReason" gives some more information if the
|
||||||
* change failed.
|
* change failed.
|
||||||
*
|
*
|
||||||
* This wrapper function for "samdb_set_password" takes a SID as input rather
|
* This wrapper function for "samdb_set_password" takes a SID as input rather
|
||||||
|
@ -996,7 +996,7 @@ static int acl_modify(struct ldb_module *module, struct ldb_request *req)
|
|||||||
|
|
||||||
/* This basic attribute existence check with the right errorcode
|
/* This basic attribute existence check with the right errorcode
|
||||||
* is needed since this module is the first one which requests
|
* is needed since this module is the first one which requests
|
||||||
* schema attribute informations.
|
* schema attribute information.
|
||||||
* The complete attribute checking is done in the
|
* The complete attribute checking is done in the
|
||||||
* "objectclass_attrs" module behind this one.
|
* "objectclass_attrs" module behind this one.
|
||||||
*/
|
*/
|
||||||
|
@ -903,7 +903,7 @@ static int oc_modify_callback(struct ldb_request *req, struct ldb_reply *ares)
|
|||||||
talloc_free(ares);
|
talloc_free(ares);
|
||||||
|
|
||||||
/* this looks up the real existing object for fetching some important
|
/* this looks up the real existing object for fetching some important
|
||||||
* informations (objectclasses) */
|
* information (objectclasses) */
|
||||||
ret = ldb_build_search_req(&search_req, ldb,
|
ret = ldb_build_search_req(&search_req, ldb,
|
||||||
ac, ac->req->op.mod.message->dn,
|
ac, ac->req->op.mod.message->dn,
|
||||||
LDB_SCOPE_BASE,
|
LDB_SCOPE_BASE,
|
||||||
@ -1220,7 +1220,7 @@ static int objectclass_rename(struct ldb_module *module, struct ldb_request *req
|
|||||||
}
|
}
|
||||||
|
|
||||||
/* this looks up the parent object for fetching some important
|
/* this looks up the parent object for fetching some important
|
||||||
* informations (objectclasses, DN normalisation...) */
|
* information (objectclasses, DN normalisation...) */
|
||||||
ret = ldb_build_search_req(&search_req, ldb,
|
ret = ldb_build_search_req(&search_req, ldb,
|
||||||
ac, parent_dn, LDB_SCOPE_BASE,
|
ac, parent_dn, LDB_SCOPE_BASE,
|
||||||
"(objectClass=*)",
|
"(objectClass=*)",
|
||||||
@ -1272,7 +1272,7 @@ static int objectclass_do_rename(struct oc_context *ac)
|
|||||||
ac->search_res = NULL;
|
ac->search_res = NULL;
|
||||||
|
|
||||||
/* this looks up the real existing object for fetching some important
|
/* this looks up the real existing object for fetching some important
|
||||||
* informations (objectclasses) */
|
* information (objectclasses) */
|
||||||
ret = ldb_build_search_req(&search_req, ldb,
|
ret = ldb_build_search_req(&search_req, ldb,
|
||||||
ac, ac->req->op.rename.olddn,
|
ac, ac->req->op.rename.olddn,
|
||||||
LDB_SCOPE_BASE,
|
LDB_SCOPE_BASE,
|
||||||
@ -1451,7 +1451,7 @@ static int objectclass_delete(struct ldb_module *module, struct ldb_request *req
|
|||||||
}
|
}
|
||||||
|
|
||||||
/* this looks up the entry object for fetching some important
|
/* this looks up the entry object for fetching some important
|
||||||
* informations (object classes, system flags...) */
|
* information (object classes, system flags...) */
|
||||||
ret = ldb_build_search_req(&search_req, ldb,
|
ret = ldb_build_search_req(&search_req, ldb,
|
||||||
ac, req->op.del.dn, LDB_SCOPE_BASE,
|
ac, req->op.del.dn, LDB_SCOPE_BASE,
|
||||||
"(objectClass=*)",
|
"(objectClass=*)",
|
||||||
|
@ -299,7 +299,7 @@ static int attr_handler2(struct oc_context *ac)
|
|||||||
}
|
}
|
||||||
|
|
||||||
/* We can use "str_list_check" with "strcmp" here since the
|
/* We can use "str_list_check" with "strcmp" here since the
|
||||||
* attribute informations from the schema are always equal
|
* attribute information from the schema are always equal
|
||||||
* up-down-cased. */
|
* up-down-cased. */
|
||||||
found = str_list_check(must_contain, attr->lDAPDisplayName);
|
found = str_list_check(must_contain, attr->lDAPDisplayName);
|
||||||
if (found) {
|
if (found) {
|
||||||
|
@ -556,7 +556,7 @@ static int samldb_fill_object(struct samldb_ctx *ac)
|
|||||||
struct ldb_context *ldb = ldb_module_get_ctx(ac->module);
|
struct ldb_context *ldb = ldb_module_get_ctx(ac->module);
|
||||||
int ret;
|
int ret;
|
||||||
|
|
||||||
/* Add informations for the different account types */
|
/* Add information for the different account types */
|
||||||
if (strcmp(ac->type, "user") == 0) {
|
if (strcmp(ac->type, "user") == 0) {
|
||||||
struct ldb_control *rodc_control = ldb_request_get_control(ac->req,
|
struct ldb_control *rodc_control = ldb_request_get_control(ac->req,
|
||||||
LDB_CONTROL_RODC_DCPROMO_OID);
|
LDB_CONTROL_RODC_DCPROMO_OID);
|
||||||
@ -1074,7 +1074,7 @@ static int samldb_prim_group_change(struct samldb_ctx *ac)
|
|||||||
return LDB_SUCCESS;
|
return LDB_SUCCESS;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Fetch informations from the existing object */
|
/* Fetch information from the existing object */
|
||||||
|
|
||||||
ret = dsdb_module_search(ac->module, ac, &res, ac->msg->dn, LDB_SCOPE_BASE, attrs,
|
ret = dsdb_module_search(ac->module, ac, &res, ac->msg->dn, LDB_SCOPE_BASE, attrs,
|
||||||
DSDB_FLAG_NEXT_MODULE, ac->req, NULL);
|
DSDB_FLAG_NEXT_MODULE, ac->req, NULL);
|
||||||
@ -1467,7 +1467,7 @@ static int samldb_member_check(struct samldb_ctx *ac)
|
|||||||
int cnt;
|
int cnt;
|
||||||
int ret;
|
int ret;
|
||||||
|
|
||||||
/* Fetch informations from the existing object */
|
/* Fetch information from the existing object */
|
||||||
|
|
||||||
ret = dsdb_module_search(ac->module, ac, &res, ac->msg->dn, LDB_SCOPE_BASE, attrs,
|
ret = dsdb_module_search(ac->module, ac, &res, ac->msg->dn, LDB_SCOPE_BASE, attrs,
|
||||||
DSDB_FLAG_NEXT_MODULE, ac->req, NULL);
|
DSDB_FLAG_NEXT_MODULE, ac->req, NULL);
|
||||||
@ -1581,7 +1581,7 @@ static int samldb_description_check(struct samldb_ctx *ac, bool *modified)
|
|||||||
unsigned int i;
|
unsigned int i;
|
||||||
int ret;
|
int ret;
|
||||||
|
|
||||||
/* Fetch informations from the existing object */
|
/* Fetch information from the existing object */
|
||||||
ret = dsdb_module_search(ac->module, ac, &res, ac->msg->dn, LDB_SCOPE_BASE, attrs,
|
ret = dsdb_module_search(ac->module, ac, &res, ac->msg->dn, LDB_SCOPE_BASE, attrs,
|
||||||
DSDB_FLAG_NEXT_MODULE | DSDB_SEARCH_SHOW_DELETED, ac->req,
|
DSDB_FLAG_NEXT_MODULE | DSDB_SEARCH_SHOW_DELETED, ac->req,
|
||||||
"(|(objectclass=user)(objectclass=group)(objectclass=samDomain)(objectclass=samServer))");
|
"(|(objectclass=user)(objectclass=group)(objectclass=samDomain)(objectclass=samServer))");
|
||||||
@ -1717,7 +1717,7 @@ static int samldb_service_principal_names_change(struct samldb_ctx *ac)
|
|||||||
}
|
}
|
||||||
|
|
||||||
if ((dns_hostname == NULL) && (sam_accountname == NULL)) {
|
if ((dns_hostname == NULL) && (sam_accountname == NULL)) {
|
||||||
/* Well, there are informations missing (old name(s)) or the
|
/* Well, there are information missing (old name(s)) or the
|
||||||
* names didn't change. We've nothing to do and can exit here */
|
* names didn't change. We've nothing to do and can exit here */
|
||||||
return LDB_SUCCESS;
|
return LDB_SUCCESS;
|
||||||
}
|
}
|
||||||
|
@ -1470,7 +1470,7 @@ static NTSTATUS dcesrv_netr_LogonGetDomainInfo(struct dcesrv_call_state *dce_cal
|
|||||||
update_dns_hostname = false;
|
update_dns_hostname = false;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Gets host informations and put them into our directory */
|
/* Gets host information and put them into our directory */
|
||||||
|
|
||||||
new_msg = ldb_msg_new(mem_ctx);
|
new_msg = ldb_msg_new(mem_ctx);
|
||||||
NT_STATUS_HAVE_NO_MEMORY(new_msg);
|
NT_STATUS_HAVE_NO_MEMORY(new_msg);
|
||||||
@ -1486,7 +1486,7 @@ static NTSTATUS dcesrv_netr_LogonGetDomainInfo(struct dcesrv_call_state *dce_cal
|
|||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Sets informations from "os_version". On an empty structure
|
* Sets information from "os_version". On an empty structure
|
||||||
* the values are cleared.
|
* the values are cleared.
|
||||||
*/
|
*/
|
||||||
if (r->in.query->workstation_info->os_version.os != NULL) {
|
if (r->in.query->workstation_info->os_version.os != NULL) {
|
||||||
@ -1620,7 +1620,7 @@ static NTSTATUS dcesrv_netr_LogonGetDomainInfo(struct dcesrv_call_state *dce_cal
|
|||||||
"msDS-SupportedEncryptionTypes",
|
"msDS-SupportedEncryptionTypes",
|
||||||
default_supported_enc_types);
|
default_supported_enc_types);
|
||||||
|
|
||||||
/* Other host domain informations */
|
/* Other host domain information */
|
||||||
|
|
||||||
lsa_policy_info = talloc(mem_ctx,
|
lsa_policy_info = talloc(mem_ctx,
|
||||||
struct netr_LsaPolicyInformation);
|
struct netr_LsaPolicyInformation);
|
||||||
|
@ -63,7 +63,7 @@ static bool test_multibind(struct ldap_connection *conn, const char *userdn, con
|
|||||||
{
|
{
|
||||||
bool ret = true;
|
bool ret = true;
|
||||||
|
|
||||||
printf("Testing multiple binds on a single connnection as anonymous and user\n");
|
printf("Testing multiple binds on a single connection as anonymous and user\n");
|
||||||
|
|
||||||
ret = test_bind_simple(conn, NULL, NULL);
|
ret = test_bind_simple(conn, NULL, NULL);
|
||||||
if (!ret) {
|
if (!ret) {
|
||||||
|
@ -156,7 +156,7 @@ static bool test_create_trust_and_set_info(struct dcerpc_pipe *p,
|
|||||||
} else {
|
} else {
|
||||||
if (strcmp(info->info_ex.netbios_name.string, trustinfo.netbios_name.string) != 0) {
|
if (strcmp(info->info_ex.netbios_name.string, trustinfo.netbios_name.string) != 0) {
|
||||||
torture_comment(tctx,
|
torture_comment(tctx,
|
||||||
"QueryTrustedDomainInfo returned inconsistant short name: %s != %s\n",
|
"QueryTrustedDomainInfo returned inconsistent short name: %s != %s\n",
|
||||||
info->info_ex.netbios_name.string,
|
info->info_ex.netbios_name.string,
|
||||||
trustinfo.netbios_name.string);
|
trustinfo.netbios_name.string);
|
||||||
ret = false;
|
ret = false;
|
||||||
|
@ -2353,7 +2353,7 @@ static bool test_CreateTrustedDomain(struct dcerpc_binding_handle *b,
|
|||||||
ret = false;
|
ret = false;
|
||||||
} else {
|
} else {
|
||||||
if (strcmp(info->info_ex.netbios_name.string, trustinfo.name.string) != 0) {
|
if (strcmp(info->info_ex.netbios_name.string, trustinfo.name.string) != 0) {
|
||||||
torture_comment(tctx, "QueryTrustedDomainInfo returned inconsistant short name: %s != %s\n",
|
torture_comment(tctx, "QueryTrustedDomainInfo returned inconsistent short name: %s != %s\n",
|
||||||
info->info_ex.netbios_name.string, trustinfo.name.string);
|
info->info_ex.netbios_name.string, trustinfo.name.string);
|
||||||
ret = false;
|
ret = false;
|
||||||
}
|
}
|
||||||
@ -2509,7 +2509,7 @@ static bool test_CreateTrustedDomainEx2(struct dcerpc_pipe *p,
|
|||||||
ret = false;
|
ret = false;
|
||||||
} else {
|
} else {
|
||||||
if (strcmp(info->info_ex.netbios_name.string, trustinfo.netbios_name.string) != 0) {
|
if (strcmp(info->info_ex.netbios_name.string, trustinfo.netbios_name.string) != 0) {
|
||||||
torture_comment(tctx, "QueryTrustedDomainInfo returned inconsistant short name: %s != %s\n",
|
torture_comment(tctx, "QueryTrustedDomainInfo returned inconsistent short name: %s != %s\n",
|
||||||
info->info_ex.netbios_name.string, trustinfo.netbios_name.string);
|
info->info_ex.netbios_name.string, trustinfo.netbios_name.string);
|
||||||
ret = false;
|
ret = false;
|
||||||
}
|
}
|
||||||
|
@ -590,7 +590,7 @@ static bool test_SetPassword2(struct torture_context *tctx,
|
|||||||
new_password.length = IVAL(password_buf.data, 512);
|
new_password.length = IVAL(password_buf.data, 512);
|
||||||
|
|
||||||
torture_comment(tctx,
|
torture_comment(tctx,
|
||||||
"Testing a third ServerPasswordSet2 on machine account, with a compleatly random password\n");
|
"Testing a third ServerPasswordSet2 on machine account, with a completely random password\n");
|
||||||
|
|
||||||
netlogon_creds_client_authenticator(creds, &credential);
|
netlogon_creds_client_authenticator(creds, &credential);
|
||||||
|
|
||||||
|
@ -782,7 +782,7 @@ static bool torture_winbind_struct_show_sequence(struct torture_context *torture
|
|||||||
uint32_t seq;
|
uint32_t seq;
|
||||||
|
|
||||||
torture_assert(torture, s[i].netbios_name,
|
torture_assert(torture, s[i].netbios_name,
|
||||||
"more domains recieved in second run");
|
"more domains received in second run");
|
||||||
torture_assert_str_equal(torture, domlist[i].netbios_name,
|
torture_assert_str_equal(torture, domlist[i].netbios_name,
|
||||||
s[i].netbios_name,
|
s[i].netbios_name,
|
||||||
"inconsistent order of domain lists");
|
"inconsistent order of domain lists");
|
||||||
|
Loading…
Reference in New Issue
Block a user