summaryrefslogtreecommitdiff
path: root/librpc/gen_ndr/ndr_lsa.c
diff options
context:
space:
mode:
authorGünther Deschner <gd@samba.org>2009-09-29 23:33:48 +0200
committerGünther Deschner <gd@samba.org>2009-09-29 23:38:56 +0200
commitd31e4c2944a7ef0b903e14db5fb444d626fa3500 (patch)
tree91b7c7c9d04c7127d21fc1ef8853bf35177eddcc /librpc/gen_ndr/ndr_lsa.c
parent4365b7b408b2c328e983d96794eec4df1cc31926 (diff)
downloadsamba-d31e4c2944a7ef0b903e14db5fb444d626fa3500.tar.gz
samba-d31e4c2944a7ef0b903e14db5fb444d626fa3500.tar.bz2
samba-d31e4c2944a7ef0b903e14db5fb444d626fa3500.zip
s3: re-run make idl_full.
Guenther
Diffstat (limited to 'librpc/gen_ndr/ndr_lsa.c')
-rw-r--r--librpc/gen_ndr/ndr_lsa.c8
1 files changed, 8 insertions, 0 deletions
diff --git a/librpc/gen_ndr/ndr_lsa.c b/librpc/gen_ndr/ndr_lsa.c
index b43cfca831..37784dab37 100644
--- a/librpc/gen_ndr/ndr_lsa.c
+++ b/librpc/gen_ndr/ndr_lsa.c
@@ -1496,6 +1496,7 @@ static enum ndr_err_code ndr_push_lsa_PolicyInformation(struct ndr_push *ndr, in
if (ndr_flags & NDR_SCALARS) {
int level = ndr_push_get_switch_value(ndr, r);
NDR_CHECK(ndr_push_uint16(ndr, NDR_SCALARS, level));
+ NDR_CHECK(ndr_push_union_align(ndr, 8));
switch (level) {
case LSA_POLICY_INFO_AUDIT_LOG: {
NDR_CHECK(ndr_push_lsa_AuditLogInfo(ndr, NDR_SCALARS, &r->audit_log));
@@ -1627,6 +1628,7 @@ static enum ndr_err_code ndr_pull_lsa_PolicyInformation(struct ndr_pull *ndr, in
if (_level != level) {
return ndr_pull_error(ndr, NDR_ERR_BAD_SWITCH, "Bad switch value %u for r at %s", _level, __location__);
}
+ NDR_CHECK(ndr_pull_union_align(ndr, 8));
switch (level) {
case LSA_POLICY_INFO_AUDIT_LOG: {
NDR_CHECK(ndr_pull_lsa_AuditLogInfo(ndr, NDR_SCALARS, &r->audit_log));
@@ -3613,6 +3615,7 @@ static enum ndr_err_code ndr_push_lsa_TrustedDomainInfo(struct ndr_push *ndr, in
if (ndr_flags & NDR_SCALARS) {
int level = ndr_push_get_switch_value(ndr, r);
NDR_CHECK(ndr_push_lsa_TrustDomInfoEnum(ndr, NDR_SCALARS, level));
+ NDR_CHECK(ndr_push_union_align(ndr, 5));
switch (level) {
case LSA_TRUSTED_DOMAIN_INFO_NAME: {
NDR_CHECK(ndr_push_lsa_TrustDomainInfoName(ndr, NDR_SCALARS, &r->name));
@@ -3740,6 +3743,7 @@ static enum ndr_err_code ndr_pull_lsa_TrustedDomainInfo(struct ndr_pull *ndr, in
if (_level != level) {
return ndr_pull_error(ndr, NDR_ERR_BAD_SWITCH, "Bad switch value %u for r at %s", _level, __location__);
}
+ NDR_CHECK(ndr_pull_union_align(ndr, 5));
switch (level) {
case LSA_TRUSTED_DOMAIN_INFO_NAME: {
NDR_CHECK(ndr_pull_lsa_TrustDomainInfoName(ndr, NDR_SCALARS, &r->name));
@@ -4255,6 +4259,7 @@ static enum ndr_err_code ndr_push_lsa_DomainInformationPolicy(struct ndr_push *n
if (ndr_flags & NDR_SCALARS) {
int level = ndr_push_get_switch_value(ndr, r);
NDR_CHECK(ndr_push_uint16(ndr, NDR_SCALARS, level));
+ NDR_CHECK(ndr_push_union_align(ndr, 8));
switch (level) {
case LSA_DOMAIN_INFO_POLICY_EFS: {
NDR_CHECK(ndr_push_lsa_DomainInfoEfs(ndr, NDR_SCALARS, &r->efs_info));
@@ -4295,6 +4300,7 @@ static enum ndr_err_code ndr_pull_lsa_DomainInformationPolicy(struct ndr_pull *n
if (_level != level) {
return ndr_pull_error(ndr, NDR_ERR_BAD_SWITCH, "Bad switch value %u for r at %s", _level, __location__);
}
+ NDR_CHECK(ndr_pull_union_align(ndr, 8));
switch (level) {
case LSA_DOMAIN_INFO_POLICY_EFS: {
NDR_CHECK(ndr_pull_lsa_DomainInfoEfs(ndr, NDR_SCALARS, &r->efs_info));
@@ -4923,6 +4929,7 @@ static enum ndr_err_code ndr_push_lsa_ForestTrustData(struct ndr_push *ndr, int
if (ndr_flags & NDR_SCALARS) {
int level = ndr_push_get_switch_value(ndr, r);
NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, level));
+ NDR_CHECK(ndr_push_union_align(ndr, 5));
switch (level) {
case LSA_FOREST_TRUST_TOP_LEVEL_NAME: {
NDR_CHECK(ndr_push_lsa_String(ndr, NDR_SCALARS, &r->top_level_name));
@@ -4976,6 +4983,7 @@ static enum ndr_err_code ndr_pull_lsa_ForestTrustData(struct ndr_pull *ndr, int
if (_level != level) {
return ndr_pull_error(ndr, NDR_ERR_BAD_SWITCH, "Bad switch value %u for r at %s", _level, __location__);
}
+ NDR_CHECK(ndr_pull_union_align(ndr, 5));
switch (level) {
case LSA_FOREST_TRUST_TOP_LEVEL_NAME: {
NDR_CHECK(ndr_pull_lsa_String(ndr, NDR_SCALARS, &r->top_level_name));