summaryrefslogtreecommitdiff
path: root/source3/rpc_server
diff options
context:
space:
mode:
authorAndrew Bartlett <abartlet@samba.org>2010-05-25 15:40:35 +1000
committerGünther Deschner <gd@samba.org>2010-05-31 15:10:44 +0200
commit723ea68d3b69a9fc31dc02256c4fc323dc9278ce (patch)
tree997a1b55d56dca352a50904e322c8c871b26655b /source3/rpc_server
parent3b706865f6bae7a2b04590da160bda939a3bafe5 (diff)
downloadsamba-723ea68d3b69a9fc31dc02256c4fc323dc9278ce.tar.gz
samba-723ea68d3b69a9fc31dc02256c4fc323dc9278ce.tar.bz2
samba-723ea68d3b69a9fc31dc02256c4fc323dc9278ce.zip
s3:auth Remove AUTH_NTLMSSP_STATE typedef.
typedefs are no longer preferred Samba style. Andrew Bartlett Signed-off-by: Stefan Metzmacher <metze@samba.org> Signed-off-by: Günther Deschner <gd@samba.org>
Diffstat (limited to 'source3/rpc_server')
-rw-r--r--source3/rpc_server/srv_pipe.c14
1 files changed, 7 insertions, 7 deletions
diff --git a/source3/rpc_server/srv_pipe.c b/source3/rpc_server/srv_pipe.c
index bd09386dc0..53acc1a68c 100644
--- a/source3/rpc_server/srv_pipe.c
+++ b/source3/rpc_server/srv_pipe.c
@@ -38,7 +38,7 @@
static void free_pipe_ntlmssp_auth_data(struct pipe_auth_data *auth)
{
- AUTH_NTLMSSP_STATE *a = auth->a_u.auth_ntlmssp_state;
+ struct auth_ntlmssp_state *a = auth->a_u.auth_ntlmssp_state;
if (a) {
auth_ntlmssp_end(&a);
@@ -67,7 +67,7 @@ static bool create_next_pdu_ntlmssp(pipes_struct *p)
DATA_BLOB auth_blob;
RPC_HDR_AUTH auth_info;
uint8 auth_type, auth_level;
- AUTH_NTLMSSP_STATE *a = p->auth.a_u.auth_ntlmssp_state;
+ struct auth_ntlmssp_state *a = p->auth.a_u.auth_ntlmssp_state;
/*
* If we're in the fault state, keep returning fault PDU's until
@@ -659,7 +659,7 @@ static bool pipe_ntlmssp_verify_final(pipes_struct *p, DATA_BLOB *p_resp_blob)
{
DATA_BLOB session_key, reply;
NTSTATUS status;
- AUTH_NTLMSSP_STATE *a = p->auth.a_u.auth_ntlmssp_state;
+ struct auth_ntlmssp_state *a = p->auth.a_u.auth_ntlmssp_state;
bool ret;
DEBUG(5,("pipe_ntlmssp_verify_final: pipe %s checking user details\n",
@@ -1215,7 +1215,7 @@ static bool pipe_spnego_auth_bind_negotiate(pipes_struct *p, prs_struct *rpc_in_
int i;
NTSTATUS status;
bool got_kerberos_mechanism = false;
- AUTH_NTLMSSP_STATE *a = NULL;
+ struct auth_ntlmssp_state *a = NULL;
RPC_HDR_AUTH auth_info;
ZERO_STRUCT(secblob);
@@ -1348,7 +1348,7 @@ static bool pipe_spnego_auth_bind_continue(pipes_struct *p, prs_struct *rpc_in_p
DATA_BLOB auth_blob;
DATA_BLOB auth_reply;
DATA_BLOB response;
- AUTH_NTLMSSP_STATE *a = p->auth.a_u.auth_ntlmssp_state;
+ struct auth_ntlmssp_state *a = p->auth.a_u.auth_ntlmssp_state;
ZERO_STRUCT(spnego_blob);
ZERO_STRUCT(auth_blob);
@@ -1578,7 +1578,7 @@ static bool pipe_ntlmssp_auth_bind(pipes_struct *p, prs_struct *rpc_in_p,
DATA_BLOB blob;
DATA_BLOB response;
NTSTATUS status;
- AUTH_NTLMSSP_STATE *a = NULL;
+ struct auth_ntlmssp_state *a = NULL;
ZERO_STRUCT(blob);
ZERO_STRUCT(response);
@@ -2243,7 +2243,7 @@ bool api_pipe_ntlmssp_auth_process(pipes_struct *p, prs_struct *rpc_in,
RPC_HDR_AUTH auth_info;
uint32 auth_len = p->hdr.auth_len;
uint32 save_offset = prs_offset(rpc_in);
- AUTH_NTLMSSP_STATE *a = p->auth.a_u.auth_ntlmssp_state;
+ struct auth_ntlmssp_state *a = p->auth.a_u.auth_ntlmssp_state;
unsigned char *data = NULL;
size_t data_len;
unsigned char *full_packet_data = NULL;