summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorVicentiu Ciorbaru <cvicentiu@gmail.com>2011-08-21 19:37:10 +0300
committerMichael Adam <obnox@samba.org>2011-08-22 13:59:24 +0200
commitb46655bd18a92560524ea8d1a6859ac56feea2a9 (patch)
treee7fac02b25de31dc3196403540680c68dcfcddb5
parent43c0863333355961a9a3951459005bba0e714f4f (diff)
downloadsamba-b46655bd18a92560524ea8d1a6859ac56feea2a9.tar.gz
samba-b46655bd18a92560524ea8d1a6859ac56feea2a9.tar.bz2
samba-b46655bd18a92560524ea8d1a6859ac56feea2a9.zip
s3-net: Fixed whitespace errors
Fixed previously existing whitespace errors in net_rpc.c Signed-off-by: Michael Adam <obnox@samba.org>
-rw-r--r--source3/utils/net_rpc.c14
1 files changed, 7 insertions, 7 deletions
diff --git a/source3/utils/net_rpc.c b/source3/utils/net_rpc.c
index c2fc08693c..6e71c56f83 100644
--- a/source3/utils/net_rpc.c
+++ b/source3/utils/net_rpc.c
@@ -4472,7 +4472,7 @@ static NTSTATUS rpc_aliaslist_dump(struct net_context *c,
for (j=0; j<alias->num_members; j++)
DEBUG(1, ("%s\\%s (%d); ",
- domains[j] ? domains[j] : "*unknown*",
+ domains[j] ? domains[j] : "*unknown*",
names[j] ? names[j] : "*unknown*",types[j]));
DEBUG(1, ("\n"));
}
@@ -4811,7 +4811,7 @@ static bool get_user_tokens_from_file(FILE *f,
token->token.sids = NULL;
continue;
}
-
+
return false;
}
@@ -4901,7 +4901,7 @@ static void show_userlist(struct rpc_pipe_client *pipe_hnd,
cli_close(cli, fnum);
cli_tdis(cli);
cli_state_set_tid(cli, cnum);
-
+
return;
}
@@ -6632,7 +6632,7 @@ static int rpc_trustdom_vampire(struct net_context *c, int argc,
print_trusted_domain(dom_list.domains[i].sid,
dom_list.domains[i].name.string);
- nt_status = vampire_trusted_domain(pipe_hnd, mem_ctx, &connect_hnd,
+ nt_status = vampire_trusted_domain(pipe_hnd, mem_ctx, &connect_hnd,
*dom_list.domains[i].sid,
dom_list.domains[i].name.string);
if (!NT_STATUS_IS_OK(nt_status)) {
@@ -6751,7 +6751,7 @@ static int rpc_trustdom_list(struct net_context *c, int argc, const char **argv)
talloc_destroy(mem_ctx);
return -1;
};
-
+
/* query info level 5 to obtain sid of a domain being queried */
nt_status = dcerpc_lsa_QueryInfoPolicy(b, mem_ctx,
&connect_hnd,
@@ -6834,13 +6834,13 @@ static int rpc_trustdom_list(struct net_context *c, int argc, const char **argv)
talloc_destroy(mem_ctx);
return -1;
};
-
+
TALLOC_FREE(pipe_hnd);
/*
* Listing trusting domains (stored in passdb backend, if local)
*/
-
+
d_printf(_("\nTrusting domains list:\n\n"));
/*