[SCM] Samba Shared Repository - branch master updated
Jeremy Allison
jra at samba.org
Tue May 5 23:04:04 MDT 2015
The branch, master has been updated
via 704592c Last lot of convert uint32 to uint32_t in winbindd, I promise.
via 6abd986 Convert all uses of uint8/16/32 to _t in source3/smbd.
via e60cc28 Convert all uint8/16/32 to _t in all modules.
via f9056de lib: Fix indentation
via 7294754 lib: Fix whitespace
from 3278b69 s3:winbindd: list local groups for our internal domains too (as AD DC)
https://git.samba.org/?p=samba.git;a=shortlog;h=master
- Log -----------------------------------------------------------------
commit 704592c14dfedbe98e95d43860d062dc6338bca3
Author: Richard Sharpe <rsharpe at samba.org>
Date: Sat May 2 21:07:06 2015 -0700
Last lot of convert uint32 to uint32_t in winbindd, I promise.
Signed-off-by: Richard Sharpe <rsharpe at samba.org>
Reviewed-by: Jeremy Allison <jra at samba.org>
Autobuild-User(master): Jeremy Allison <jra at samba.org>
Autobuild-Date(master): Wed May 6 07:03:27 CEST 2015 on sn-devel-104
commit 6abd986704291b051af5eeb67f670a0e8cf845fd
Author: Richard Sharpe <rsharpe at samba.org>
Date: Sat May 2 21:01:14 2015 -0700
Convert all uses of uint8/16/32 to _t in source3/smbd.
Signed-off-by: Richard Sharpe <rsharpe at samba.org>
Reviewed-by: Jeremy Allison <jra at samba.org>
commit e60cc280d6ba824c53bb91a29b5b24e177eec823
Author: Richard Sharpe <rsharpe at samba.org>
Date: Sat May 2 20:11:02 2015 -0700
Convert all uint8/16/32 to _t in all modules.
Signed-off-by: Richard Sharpe <rsharpe at samba.org>
Reviewed-by: Jeremy Allison <jra at samba.org>
commit f9056de9bf5548507579a22778cc25aaba51d3f9
Author: Volker Lendecke <vl at samba.org>
Date: Tue May 5 08:34:11 2015 +0000
lib: Fix indentation
Signed-off-by: Volker Lendecke <vl at samba.org>
Reviewed-by: Jeremy Allison <jra at samba.org>
commit 729475425bfd4df9185638036186b016cd2d080c
Author: Volker Lendecke <vl at samba.org>
Date: Tue May 5 08:32:59 2015 +0000
lib: Fix whitespace
Signed-off-by: Volker Lendecke <vl at samba.org>
Reviewed-by: Jeremy Allison <jra at samba.org>
-----------------------------------------------------------------------
Summary of changes:
source3/lib/sysacls.c | 40 ++++++++---------
source3/modules/nfs4_acls.c | 18 ++++----
source3/modules/nfs4_acls.h | 24 +++++-----
source3/modules/vfs_acl_tdb.c | 6 +--
source3/modules/vfs_afsacl.c | 60 ++++++++++++-------------
source3/modules/vfs_aio_linux.c | 4 +-
source3/modules/vfs_aio_pthread.c | 4 +-
source3/modules/vfs_aixacl2.c | 20 ++++-----
source3/modules/vfs_audit.c | 2 +-
source3/modules/vfs_cap.c | 2 +-
source3/modules/vfs_catia.c | 4 +-
source3/modules/vfs_ceph.c | 6 +--
source3/modules/vfs_default_quota.c | 4 +-
source3/modules/vfs_dirsort.c | 4 +-
source3/modules/vfs_extd_audit.c | 2 +-
source3/modules/vfs_fruit.c | 4 +-
source3/modules/vfs_glusterfs.c | 8 ++--
source3/modules/vfs_gpfs.c | 18 ++++----
source3/modules/vfs_media_harmony.c | 6 +--
source3/modules/vfs_netatalk.c | 4 +-
source3/modules/vfs_nfs4acl_xattr.c | 16 +++----
source3/modules/vfs_notify_fam.c | 6 +--
source3/modules/vfs_scannedonly.c | 4 +-
source3/modules/vfs_shadow_copy2.c | 6 +--
source3/modules/vfs_snapper.c | 4 +-
source3/modules/vfs_streams_depot.c | 2 +-
source3/modules/vfs_streams_xattr.c | 8 ++--
source3/modules/vfs_unityed_media.c | 6 +--
source3/modules/vfs_zfsacl.c | 16 +++----
source3/smbd/blocking.c | 8 ++--
source3/smbd/dir.c | 20 ++++-----
source3/smbd/dmapi.c | 6 +--
source3/smbd/dosmode.c | 18 ++++----
source3/smbd/error.c | 10 ++---
source3/smbd/file_access.c | 2 +-
source3/smbd/files.c | 8 ++--
source3/smbd/globals.h | 4 +-
source3/smbd/ipc.c | 8 ++--
source3/smbd/negprot.c | 16 +++----
source3/smbd/notify.c | 20 ++++-----
source3/smbd/open.c | 4 +-
source3/smbd/oplock.c | 8 ++--
source3/smbd/pipes.c | 2 +-
source3/smbd/posix_acls.c | 36 +++++++--------
source3/smbd/process.c | 12 ++---
source3/smbd/proto.h | 86 ++++++++++++++++++------------------
source3/smbd/pysmbd.c | 4 +-
source3/smbd/reply.c | 8 ++--
source3/smbd/server.c | 2 +-
source3/smbd/service.c | 2 +-
source3/smbd/sesssetup.c | 16 +++----
source3/smbd/smbd.h | 12 ++---
source3/smbd/srvstr.c | 8 ++--
source3/smbd/trans2.c | 28 ++++++------
source3/winbindd/winbindd.c | 4 +-
source3/winbindd/winbindd.h | 2 +-
source3/winbindd/winbindd_ads.c | 4 +-
source3/winbindd/winbindd_cache.c | 4 +-
source3/winbindd/winbindd_creds.c | 4 +-
source3/winbindd/winbindd_dual.c | 2 +-
source3/winbindd/winbindd_getgrnam.c | 2 +-
source3/winbindd/winbindd_proto.h | 16 +++----
62 files changed, 347 insertions(+), 347 deletions(-)
Changeset truncated at 500 lines:
diff --git a/source3/lib/sysacls.c b/source3/lib/sysacls.c
index 2ec3d68..7cff488 100644
--- a/source3/lib/sysacls.c
+++ b/source3/lib/sysacls.c
@@ -1,20 +1,20 @@
-/*
+/*
Unix SMB/CIFS implementation.
Samba system utilities for ACL support.
Copyright (C) Jeremy Allison 2000.
Copyright (C) Volker Lendecke 2006
Copyright (C) Michael Adam 2006,2008
-
+
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 3 of the License, or
(at your option) any later version.
-
+
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
-
+
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
@@ -104,14 +104,14 @@ void *sys_acl_get_qualifier(SMB_ACL_ENTRY_T entry_d)
{
if (entry_d->a_type == SMB_ACL_USER) {
return &entry_d->info.user.uid;
- }
+ }
if (entry_d->a_type == SMB_ACL_GROUP) {
return &entry_d->info.group.gid;
}
errno = EINVAL;
- return NULL;
+ return NULL;
}
int sys_acl_clear_perms(SMB_ACL_PERMSET_T permset_d)
@@ -127,15 +127,15 @@ int sys_acl_add_perm(SMB_ACL_PERMSET_T permset_d, SMB_ACL_PERM_T perm)
&& perm != SMB_ACL_EXECUTE) {
errno = EINVAL;
return -1;
- }
-
+ }
+
if (permset_d == NULL) {
errno = EINVAL;
return -1;
}
*permset_d |= perm;
-
+
return 0;
}
@@ -183,7 +183,7 @@ char *sys_acl_to_text(const struct smb_acl_t *acl_d, ssize_t *len_p)
ap->a_type);
tag = tagbuf;
break;
-
+
case SMB_ACL_USER:
id = uidtoname(ap->info.user.uid);
/* FALL TROUGH */
@@ -255,7 +255,7 @@ SMB_ACL_T sys_acl_init(TALLOC_CTX *mem_ctx)
errno = ENOMEM;
return NULL;
}
-
+
a->count = 0;
a->next = -1;
@@ -319,7 +319,7 @@ int sys_acl_set_qualifier(SMB_ACL_ENTRY_T entry_d, void *qual_p)
if (entry_d->a_type == SMB_ACL_USER) {
entry_d->info.user.uid = *((uid_t *)qual_p);
return 0;
- }
+ }
if (entry_d->a_type == SMB_ACL_GROUP) {
entry_d->info.group.gid = *((gid_t *)qual_p);
return 0;
@@ -337,7 +337,7 @@ int sys_acl_set_permset(SMB_ACL_ENTRY_T entry_d, SMB_ACL_PERMSET_T permset_d)
}
entry_d->a_perm = *permset_d;
-
+
return 0;
}
@@ -358,26 +358,26 @@ int sys_acl_valid(SMB_ACL_T acl_d)
* sys_acl_delete_def_file are to be redirected to the default
* statically-bound acl vfs module, but they are replacable.
*/
-
+
#if defined(HAVE_POSIX_ACLS)
-
-SMB_ACL_T sys_acl_get_file(vfs_handle_struct *handle,
+
+SMB_ACL_T sys_acl_get_file(vfs_handle_struct *handle,
const char *path_p, SMB_ACL_TYPE_T type, TALLOC_CTX *mem_ctx)
{
return posixacl_sys_acl_get_file(handle, path_p, type, mem_ctx);
}
-
+
SMB_ACL_T sys_acl_get_fd(vfs_handle_struct *handle, files_struct *fsp, TALLOC_CTX *mem_ctx)
{
return posixacl_sys_acl_get_fd(handle, fsp, mem_ctx);
}
-
+
int sys_acl_set_file(vfs_handle_struct *handle,
const char *name, SMB_ACL_TYPE_T type, SMB_ACL_T acl_d)
{
return posixacl_sys_acl_set_file(handle, name, type, acl_d);
}
-
+
int sys_acl_set_fd(vfs_handle_struct *handle, files_struct *fsp,
SMB_ACL_T acl_d)
{
@@ -424,7 +424,7 @@ int sys_acl_delete_def_file(vfs_handle_struct *handle,
}
#elif defined(HAVE_TRU64_ACLS)
-
+
SMB_ACL_T sys_acl_get_file(vfs_handle_struct *handle,
const char *path_p, SMB_ACL_TYPE_T type,
TALLOC_CTX *mem_ctx)
diff --git a/source3/modules/nfs4_acls.c b/source3/modules/nfs4_acls.c
index f7daa8d..9475248 100644
--- a/source3/modules/nfs4_acls.c
+++ b/source3/modules/nfs4_acls.c
@@ -40,7 +40,7 @@ extern const struct generic_mapping file_generic_mapping;
#define SMB_ACE4_INT_MAGIC 0x76F8A967
typedef struct _SMB_ACE4_INT_T
{
- uint32 magic;
+ uint32_t magic;
SMB_ACE4PROP_T prop;
void *next;
} SMB_ACE4_INT_T;
@@ -48,9 +48,9 @@ typedef struct _SMB_ACE4_INT_T
#define SMB_ACL4_INT_MAGIC 0x29A3E792
typedef struct _SMB_ACL4_INT_T
{
- uint32 magic;
+ uint32_t magic;
uint16_t controlflags;
- uint32 naces;
+ uint32_t naces;
SMB_ACE4_INT_T *first;
SMB_ACE4_INT_T *last;
} SMB_ACL4_INT_T;
@@ -281,7 +281,7 @@ SMB4ACE_T *smb_first_ace4(SMB4ACL_T *theacl)
return (SMB4ACE_T *)aclint->first;
}
-uint32 smb_get_naces(SMB4ACL_T *theacl)
+uint32_t smb_get_naces(SMB4ACL_T *theacl)
{
SMB_ACL4_INT_T *aclint = get_validated_aclint(theacl);
if (aclint==NULL)
@@ -525,7 +525,7 @@ static bool smbacl4_nfs42win(TALLOC_CTX *mem_ctx,
static NTSTATUS smb_get_nt_acl_nfs4_common(const SMB_STRUCT_STAT *sbuf,
smbacl4_vfs_params *params,
- uint32 security_info,
+ uint32_t security_info,
TALLOC_CTX *mem_ctx,
struct security_descriptor **ppdesc,
SMB4ACL_T *theacl)
@@ -583,7 +583,7 @@ static NTSTATUS smb_get_nt_acl_nfs4_common(const SMB_STRUCT_STAT *sbuf,
}
NTSTATUS smb_fget_nt_acl_nfs4(files_struct *fsp,
- uint32 security_info,
+ uint32_t security_info,
TALLOC_CTX *mem_ctx,
struct security_descriptor **ppdesc,
SMB4ACL_T *theacl)
@@ -608,7 +608,7 @@ NTSTATUS smb_fget_nt_acl_nfs4(files_struct *fsp,
NTSTATUS smb_get_nt_acl_nfs4(struct connection_struct *conn,
const char *name,
- uint32 security_info,
+ uint32_t security_info,
TALLOC_CTX *mem_ctx,
struct security_descriptor **ppdesc,
SMB4ACL_T *theacl)
@@ -915,7 +915,7 @@ static SMB4ACL_T *smbacl4_win2nfs4(
)
{
SMB4ACL_T *theacl;
- uint32 i;
+ uint32_t i;
const char *filename = fsp->fsp_name->base_name;
DEBUG(10, ("smbacl4_win2nfs4 invoked\n"));
@@ -959,7 +959,7 @@ static SMB4ACL_T *smbacl4_win2nfs4(
}
NTSTATUS smb_set_nt_acl_nfs4(vfs_handle_struct *handle, files_struct *fsp,
- uint32 security_info_sent,
+ uint32_t security_info_sent,
const struct security_descriptor *psd,
set_nfs4acl_native_fn_t set_nfs4_native)
{
diff --git a/source3/modules/nfs4_acls.h b/source3/modules/nfs4_acls.h
index 68abebf..1922010 100644
--- a/source3/modules/nfs4_acls.h
+++ b/source3/modules/nfs4_acls.h
@@ -31,9 +31,9 @@
* used in the NFS4 ACL structures.
*/
typedef union _SMB_NFS4_ACEWHOID_T {
- uid_t uid; /* User id */
- gid_t gid; /* Group id */
- uint32 special_id; /* Identifies special identities in NFS4 */
+ uid_t uid; /* User id */
+ gid_t gid; /* Group id */
+ uint32_t special_id; /* Identifies special identities in NFS4 */
#define SMB_ACE4_WHO_OWNER 0x00000001 /*The owner of the file. */
#define SMB_ACE4_WHO_GROUP 0x00000002 /*The group associated with the file. */
@@ -46,11 +46,11 @@ typedef union _SMB_NFS4_ACEWHOID_T {
#define SMB_ACE4_WHO_AUTHENTICATED 0x00000009 /*Any authenticated user (opposite of ANONYMOUS) */
#define SMB_ACE4_WHO_SERVICE 0x0000000A /*Access from a system service. */
#define SMB_ACE4_WHO_MAX SMB_ACE4_WHO_SERVICE /* largest valid ACE4_WHO */
- uint32 id;
+ uint32_t id;
} SMB_NFS4_ACEWHOID_T;
typedef struct _SMB_ACE4PROP_T {
- uint32 flags; /* Bit mask defining details of ACE */
+ uint32_t flags; /* Bit mask defining details of ACE */
/*The following are constants for flags field */
/* #define SMB_ACE4_ID_NOT_VALID 0x00000001 - from aix/jfs2 */
#define SMB_ACE4_ID_SPECIAL 0x00000002
@@ -59,7 +59,7 @@ typedef struct _SMB_ACE4PROP_T {
/* The following part of ACE has the same layout as NFSv4 wire format. */
- uint32 aceType; /* Type of ACE PERMIT/ALLOW etc*/
+ uint32_t aceType; /* Type of ACE PERMIT/ALLOW etc*/
/*The constants used for the type field (acetype4) are as follows: */
#define SMB_ACE4_ACCESS_ALLOWED_ACE_TYPE 0x00000000
#define SMB_ACE4_ACCESS_DENIED_ACE_TYPE 0x00000001
@@ -67,7 +67,7 @@ typedef struct _SMB_ACE4PROP_T {
#define SMB_ACE4_SYSTEM_ALARM_ACE_TYPE 0x00000003
#define SMB_ACE4_MAX_TYPE ACE4_SYSTEM_ALARM_ACE_TYPE /* largest valid ACE4_TYPE */
- uint32 aceFlags; /* Controls Inheritance and such */
+ uint32_t aceFlags; /* Controls Inheritance and such */
/*The bitmask constants used for the flag field are as follows: */
#define SMB_ACE4_FILE_INHERIT_ACE 0x00000001
#define SMB_ACE4_DIRECTORY_INHERIT_ACE 0x00000002
@@ -81,7 +81,7 @@ typedef struct _SMB_ACE4PROP_T {
| SMB_ACE4_NO_PROPAGATE_INHERIT_ACE | SMB_ACE4_INHERIT_ONLY_ACE | SMB_ACE4_SUCCESSFUL_ACCESS_ACE_FLAG \
| SMB_ACE4_FAILED_ACCESS_ACE_FLAG | SMB_ACE4_IDENTIFIER_GROUP | SMB_ACE4_INHERITED_ACE)
- uint32 aceMask; /* Access rights */
+ uint32_t aceMask; /* Access rights */
/*The bitmask constants used for the access mask field are as follows: */
#define SMB_ACE4_READ_DATA 0x00000001
#define SMB_ACE4_LIST_DIRECTORY 0x00000001
@@ -128,20 +128,20 @@ SMB4ACE_T *smb_first_ace4(SMB4ACL_T *theacl);
/* Returns NULL in the end - or error */
SMB4ACE_T *smb_next_ace4(SMB4ACE_T *ace);
-uint32 smb_get_naces(SMB4ACL_T *theacl);
+uint32_t smb_get_naces(SMB4ACL_T *theacl);
uint16_t smbacl4_get_controlflags(SMB4ACL_T *theacl);
bool smbacl4_set_controlflags(SMB4ACL_T *theacl, uint16_t controlflags);
NTSTATUS smb_fget_nt_acl_nfs4(files_struct *fsp,
- uint32 security_info,
+ uint32_t security_info,
TALLOC_CTX *mem_ctx,
struct security_descriptor **ppdesc, SMB4ACL_T *theacl);
NTSTATUS smb_get_nt_acl_nfs4(connection_struct *conn,
const char *name,
- uint32 security_info,
+ uint32_t security_info,
TALLOC_CTX *mem_ctx,
struct security_descriptor **ppdesc, SMB4ACL_T *theacl);
@@ -150,7 +150,7 @@ NTSTATUS smb_get_nt_acl_nfs4(connection_struct *conn,
typedef bool (*set_nfs4acl_native_fn_t)(vfs_handle_struct *handle, files_struct *, SMB4ACL_T *);
NTSTATUS smb_set_nt_acl_nfs4(vfs_handle_struct *handle, files_struct *fsp,
- uint32 security_info_sent,
+ uint32_t security_info_sent,
const struct security_descriptor *psd,
set_nfs4acl_native_fn_t set_nfs4_native);
diff --git a/source3/modules/vfs_acl_tdb.c b/source3/modules/vfs_acl_tdb.c
index e02993b..1537ba3 100644
--- a/source3/modules/vfs_acl_tdb.c
+++ b/source3/modules/vfs_acl_tdb.c
@@ -99,7 +99,7 @@ static struct db_record *acl_tdb_lock(TALLOC_CTX *mem_ctx,
struct db_context *db,
const struct file_id *id)
{
- uint8 id_buf[16];
+ uint8_t id_buf[16];
/* For backwards compatibility only store the dev/inode. */
push_file_id_16((char *)id_buf, id);
@@ -146,7 +146,7 @@ static NTSTATUS get_acl_blob(TALLOC_CTX *ctx,
const char *name,
DATA_BLOB *pblob)
{
- uint8 id_buf[16];
+ uint8_t id_buf[16];
TDB_DATA data;
struct file_id id;
struct db_context *db = acl_db;
@@ -202,7 +202,7 @@ static NTSTATUS store_acl_blob_fsp(vfs_handle_struct *handle,
files_struct *fsp,
DATA_BLOB *pblob)
{
- uint8 id_buf[16];
+ uint8_t id_buf[16];
struct file_id id;
TDB_DATA data;
struct db_context *db = acl_db;
diff --git a/source3/modules/vfs_afsacl.c b/source3/modules/vfs_afsacl.c
index a794e95..aa8de9a 100644
--- a/source3/modules/vfs_afsacl.c
+++ b/source3/modules/vfs_afsacl.c
@@ -52,7 +52,7 @@ struct afs_ace {
char *name;
struct dom_sid sid;
enum lsa_SidType type;
- uint32 rights;
+ uint32_t rights;
struct afs_ace *next;
};
@@ -65,7 +65,7 @@ struct afs_acl {
struct afs_iob {
char *in, *out;
- uint16 in_size, out_size;
+ uint16_t in_size, out_size;
};
@@ -110,7 +110,7 @@ static struct afs_ace *clone_afs_ace(TALLOC_CTX *mem_ctx, struct afs_ace *ace)
static struct afs_ace *new_afs_ace(TALLOC_CTX *mem_ctx,
bool positive,
- const char *name, uint32 rights)
+ const char *name, uint32_t rights)
{
struct dom_sid sid;
enum lsa_SidType type;
@@ -193,7 +193,7 @@ static struct afs_ace *new_afs_ace(TALLOC_CTX *mem_ctx,
static void add_afs_ace(struct afs_acl *acl,
bool positive,
- const char *name, uint32 rights)
+ const char *name, uint32_t rights)
{
struct afs_ace *ace;
@@ -262,7 +262,7 @@ static bool parse_afs_acl(struct afs_acl *acl, const char *acl_str)
const char *namep;
fstring name;
- uint32 rights;
+ uint32_t rights;
char *space;
namep = p;
@@ -333,9 +333,9 @@ static bool unparse_afs_acl(struct afs_acl *acl, char *acl_str)
return true;
}
-static uint32 afs_to_nt_file_rights(uint32 rights)
+static uint32_t afs_to_nt_file_rights(uint32_t rights)
{
- uint32 result = 0;
+ uint32_t result = 0;
if (rights & PRSFS_READ)
result |= FILE_READ_DATA | FILE_READ_EA |
@@ -355,8 +355,8 @@ static uint32 afs_to_nt_file_rights(uint32 rights)
return result;
}
-static void afs_to_nt_dir_rights(uint32 afs_rights, uint32 *nt_rights,
- uint8 *flag)
+static void afs_to_nt_dir_rights(uint32_t afs_rights, uint32_t *nt_rights,
+ uint8_t *flag)
{
*nt_rights = 0;
*flag = SEC_ACE_FLAG_OBJECT_INHERIT |
@@ -475,10 +475,10 @@ static void merge_afs_acls(struct afs_acl *dir_acl,
#define PERMS_FULL 0x001f01ff
static struct static_dir_ace_mapping {
- uint8 type;
- uint8 flags;
- uint32 mask;
- uint32 afs_rights;
+ uint8_t type;
+ uint8_t flags;
+ uint32_t mask;
+ uint32_t afs_rights;
} ace_mappings[] = {
/* Full control */
@@ -532,11 +532,11 @@ static struct static_dir_ace_mapping {
{ 0, 0, 0, 9999 }
};
-static uint32 nt_to_afs_dir_rights(const char *filename, const struct security_ace *ace)
+static uint32_t nt_to_afs_dir_rights(const char *filename, const struct security_ace *ace)
{
- uint32 result = 0;
- uint32 rights = ace->access_mask;
- uint8 flags = ace->flags;
+ uint32_t result = 0;
+ uint32_t rights = ace->access_mask;
+ uint8_t flags = ace->flags;
struct static_dir_ace_mapping *m;
@@ -573,10 +573,10 @@ static uint32 nt_to_afs_dir_rights(const char *filename, const struct security_a
return result;
}
-static uint32 nt_to_afs_file_rights(const char *filename, const struct security_ace *ace)
+static uint32_t nt_to_afs_file_rights(const char *filename, const struct security_ace *ace)
{
- uint32 result = 0;
- uint32 rights = ace->access_mask;
+ uint32_t result = 0;
+ uint32_t rights = ace->access_mask;
if (rights & (GENERIC_READ_ACCESS|FILE_READ_DATA)) {
result |= PRSFS_READ;
@@ -591,7 +591,7 @@ static uint32 nt_to_afs_file_rights(const char *filename, const struct security_
static size_t afs_to_nt_acl_common(struct afs_acl *afs_acl,
SMB_STRUCT_STAT *psbuf,
- uint32 security_info,
+ uint32_t security_info,
TALLOC_CTX *mem_ctx,
struct security_descriptor **ppdesc)
{
@@ -620,7 +620,7 @@ static size_t afs_to_nt_acl_common(struct afs_acl *afs_acl,
while (afs_ace != NULL) {
uint32_t nt_rights;
- uint8 flag = SEC_ACE_FLAG_OBJECT_INHERIT |
+ uint8_t flag = SEC_ACE_FLAG_OBJECT_INHERIT |
SEC_ACE_FLAG_CONTAINER_INHERIT;
if (afs_ace->type == SID_NAME_UNKNOWN) {
@@ -660,7 +660,7 @@ static size_t afs_to_nt_acl_common(struct afs_acl *afs_acl,
static size_t afs_to_nt_acl(struct afs_acl *afs_acl,
struct connection_struct *conn,
struct smb_filename *smb_fname,
- uint32 security_info,
+ uint32_t security_info,
TALLOC_CTX *mem_ctx,
struct security_descriptor **ppdesc)
{
@@ -682,7 +682,7 @@ static size_t afs_to_nt_acl(struct afs_acl *afs_acl,
static size_t afs_fto_nt_acl(struct afs_acl *afs_acl,
struct files_struct *fsp,
- uint32 security_info,
+ uint32_t security_info,
TALLOC_CTX *mem_ctx,
struct security_descriptor **ppdesc)
{
@@ -727,9 +727,9 @@ static bool mappable_sid(const struct dom_sid *sid)
}
--
Samba Shared Repository
More information about the samba-cvs
mailing list