svn commit: samba r11261 - in branches/SAMBA_4_0/source: lib/registry librpc/idl rpc_server/winreg torture/rpc

tpot at samba.org tpot at samba.org
Sat Oct 22 08:00:10 GMT 2005


Author: tpot
Date: 2005-10-22 08:00:09 +0000 (Sat, 22 Oct 2005)
New Revision: 11261

WebSVN: http://websvn.samba.org/cgi-bin/viewcvs.cgi?view=rev&root=samba&rev=11261

Log:
Rename access_required field in winreg idl to access_mask so it matches 
the other interfaces.

Modified:
   branches/SAMBA_4_0/source/lib/registry/reg_backend_rpc.c
   branches/SAMBA_4_0/source/librpc/idl/winreg.idl
   branches/SAMBA_4_0/source/rpc_server/winreg/rpc_winreg.c
   branches/SAMBA_4_0/source/torture/rpc/winreg.c


Changeset:
Modified: branches/SAMBA_4_0/source/lib/registry/reg_backend_rpc.c
===================================================================
--- branches/SAMBA_4_0/source/lib/registry/reg_backend_rpc.c	2005-10-22 07:10:13 UTC (rev 11260)
+++ branches/SAMBA_4_0/source/lib/registry/reg_backend_rpc.c	2005-10-22 08:00:09 UTC (rev 11261)
@@ -39,7 +39,7 @@
 	NTSTATUS status; \
 	\
 	r.in.system_name = 0; \
-	r.in.access_required = SEC_FLAG_MAXIMUM_ALLOWED; \
+	r.in.access_mask = SEC_FLAG_MAXIMUM_ALLOWED; \
 	r.out.handle = hnd;\
 	\
 	status = dcerpc_winreg_Open ## u(p, mem_ctx, &r); \
@@ -253,7 +253,7 @@
 	r.in.handle = parent->backend_data;
 	r.out.new_handle = talloc(mem_ctx, struct policy_handle);	
 	r.in.options = 0;
-	r.in.access_required = access_mask;
+	r.in.access_mask = access_mask;
 	r.in.secdesc = NULL;
 
 	status = dcerpc_winreg_CreateKey((struct dcerpc_pipe *)(parent->hive->backend_data), mem_ctx, &r);

Modified: branches/SAMBA_4_0/source/librpc/idl/winreg.idl
===================================================================
--- branches/SAMBA_4_0/source/librpc/idl/winreg.idl	2005-10-22 07:10:13 UTC (rev 11260)
+++ branches/SAMBA_4_0/source/librpc/idl/winreg.idl	2005-10-22 08:00:09 UTC (rev 11261)
@@ -41,7 +41,7 @@
 	/* Function: 0x00 */
 	WERROR winreg_OpenHKCR(
 		[in]      uint16 *system_name,
-		[in]      uint32 access_required,
+		[in]      uint32 access_mask,
 		[out,ref] policy_handle *handle
 	);
 
@@ -49,7 +49,7 @@
 	/* Function: 0x01 */
 	WERROR winreg_OpenHKCU(
 	        [in]      uint16 *system_name,
-		[in]      uint32 access_required,
+		[in]      uint32 access_mask,
 		[out,ref] policy_handle *handle
 	);
 
@@ -57,7 +57,7 @@
 	/* Function: 0x02 */
 	WERROR winreg_OpenHKLM(
 		[in]      uint16 *system_name,
-		[in]      uint32 access_required,
+		[in]      uint32 access_mask,
 		[out,ref] policy_handle *handle
 	);
 
@@ -65,7 +65,7 @@
 	/* Function: 0x03 */
 	WERROR winreg_OpenHKPD(
 		[in]      uint16 *system_name,
-		[in]      uint32 access_required,
+		[in]      uint32 access_mask,
 		[out,ref] policy_handle *handle
 	);
 
@@ -73,7 +73,7 @@
 	/* Function: 0x04 */
 	WERROR winreg_OpenHKU(
 		[in]      uint16 *system_name,
-		[in]      uint32 access_required,
+		[in]      uint32 access_mask,
 		[out,ref] policy_handle *handle
 	);
 
@@ -109,7 +109,7 @@
 		[in] winreg_String name,
 		[in] winreg_String class,
 		[in] uint32 options,
-		[in] uint32 access_required,
+		[in] uint32 access_mask,
 		[in,unique] winreg_SecBuf *secdesc,
 		[out,ref] policy_handle *new_handle,
 		[in,out,unique] winreg_CreateAction *action_taken
@@ -292,7 +292,7 @@
 	/* Function: 0x1b */
 	WERROR winreg_OpenHKCC(
 		[in]      uint16 *system_name,
-		[in]      uint32 access_required,
+		[in]      uint32 access_mask,
 		[out,ref] policy_handle *handle
 	);
 
@@ -300,7 +300,7 @@
 	/* Function: 0x1c */
 	WERROR winreg_OpenHKDD(
 		[in]      uint16 *system_name,
-		[in]      uint32 access_required,
+		[in]      uint32 access_mask,
 		[out,ref] policy_handle *handle
 	);
 
@@ -341,7 +341,7 @@
 	/* Function: 0x20 */
 	WERROR winreg_OpenHKPT(
 		[in]      uint16 *system_name,
-		[in]      uint32 access_required,
+		[in]      uint32 access_mask,
 		[out,ref] policy_handle *handle
 	);
 
@@ -349,7 +349,7 @@
 	/* Function: 0x21 */
 	WERROR winreg_OpenHKPN(
 		[in]      uint16 *system_name,
-		[in]      uint32 access_required,
+		[in]      uint32 access_mask,
 		[out,ref] policy_handle *handle
 	);
 

Modified: branches/SAMBA_4_0/source/rpc_server/winreg/rpc_winreg.c
===================================================================
--- branches/SAMBA_4_0/source/rpc_server/winreg/rpc_winreg.c	2005-10-22 07:10:13 UTC (rev 11260)
+++ branches/SAMBA_4_0/source/rpc_server/winreg/rpc_winreg.c	2005-10-22 08:00:09 UTC (rev 11261)
@@ -122,7 +122,7 @@
 	}
 
 	error = reg_key_add_name(newh, (struct registry_key *)h->data, r->in.name.name, 
-				 r->in.access_required, 
+				 r->in.access_mask, 
 				 r->in.secdesc?&sd:NULL, 
 				 (struct registry_key **)&newh->data);
 	if (W_ERROR_IS_OK(error)) {

Modified: branches/SAMBA_4_0/source/torture/rpc/winreg.c
===================================================================
--- branches/SAMBA_4_0/source/torture/rpc/winreg.c	2005-10-22 07:10:13 UTC (rev 11260)
+++ branches/SAMBA_4_0/source/torture/rpc/winreg.c	2005-10-22 08:00:09 UTC (rev 11261)
@@ -116,7 +116,7 @@
 	init_winreg_String(&r.in.name, name);	
 	init_winreg_String(&r.in.class, class);
 	r.in.options = 0x0;
-	r.in.access_required = SEC_FLAG_MAXIMUM_ALLOWED;
+	r.in.access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
 	r.in.action_taken = r.out.action_taken = &action_taken;
 	r.in.secdesc = NULL;
 
@@ -178,7 +178,7 @@
 	init_winreg_String(&r.in.name, name);	
 	init_winreg_String(&r.in.class, class);
 	r.in.options = 0x0;
-	r.in.access_required = SEC_FLAG_MAXIMUM_ALLOWED;
+	r.in.access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
 	r.in.action_taken = r.out.action_taken = &action_taken;
 	r.in.secdesc = &secbuf;
 
@@ -691,7 +691,7 @@
 	printf("Testing %s\n", name);
 
 	r.in.system_name = 0;
-	r.in.access_required = SEC_FLAG_MAXIMUM_ALLOWED;
+	r.in.access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
 	r.out.handle = &handle;
 	
 	status = open_fn(p, mem_ctx, &r);



More information about the samba-cvs mailing list