summaryrefslogtreecommitdiff
path: root/source3/include
diff options
context:
space:
mode:
authorJeremy Allison <jra@samba.org>2008-10-31 10:51:45 -0700
committerJeremy Allison <jra@samba.org>2008-10-31 10:51:45 -0700
commit8344e945742ff343702b9667e26082c560014523 (patch)
tree1e63530a7e4d96b47abaab0192f1f302b6aefb2e /source3/include
parent161cb81911fe8877bfefd8bd3553f0b3166299fb (diff)
downloadsamba-8344e945742ff343702b9667e26082c560014523.tar.gz
samba-8344e945742ff343702b9667e26082c560014523.tar.bz2
samba-8344e945742ff343702b9667e26082c560014523.zip
Unify se_access_check with the S4 code. Will make
calculation of SEC_FLAG_MAXIMUM_ALLOWED much easier for files. Jeremy.
Diffstat (limited to 'source3/include')
-rw-r--r--source3/include/proto.h5
1 files changed, 2 insertions, 3 deletions
diff --git a/source3/include/proto.h b/source3/include/proto.h
index 65dda2ac3d..c6609be5d6 100644
--- a/source3/include/proto.h
+++ b/source3/include/proto.h
@@ -1417,9 +1417,8 @@ WERROR registry_push_value(TALLOC_CTX *mem_ctx,
void se_map_generic(uint32 *access_mask, const struct generic_mapping *mapping);
void security_acl_map_generic(struct security_acl *sa, const struct generic_mapping *mapping);
void se_map_standard(uint32 *access_mask, struct standard_mapping *mapping);
-bool se_access_check(const SEC_DESC *sd, const NT_USER_TOKEN *token,
- uint32 acc_desired, uint32 *acc_granted,
- NTSTATUS *status);
+NTSTATUS se_access_check(const SEC_DESC *sd, const NT_USER_TOKEN *token,
+ uint32 acc_desired, uint32 *acc_granted);
NTSTATUS samr_make_sam_obj_sd(TALLOC_CTX *ctx, SEC_DESC **psd, size_t *sd_size);
/* The following definitions come from lib/util_sec.c */