diff options
author | Jelmer Vernooij <jelmer@samba.org> | 2007-08-27 18:10:19 +0000 |
---|---|---|
committer | Gerald (Jerry) Carter <jerry@samba.org> | 2007-10-10 15:02:54 -0500 |
commit | 61ffa08f4c95e29d301de9fbabd6e71c2dbc1056 (patch) | |
tree | 5639bb3b7628532080737e4e1b1ff0b835ee4977 /source4/auth | |
parent | 4fb038b0b8e7a4bb69ac0d9022684eeaca8a491a (diff) | |
download | samba-61ffa08f4c95e29d301de9fbabd6e71c2dbc1056.tar.gz samba-61ffa08f4c95e29d301de9fbabd6e71c2dbc1056.tar.bz2 samba-61ffa08f4c95e29d301de9fbabd6e71c2dbc1056.zip |
r24712: No longer expose the 'BOOL' data type in any interfaces.
(This used to be commit 1ce32673d960c8b05b6c1b1b99e1976a402417ae)
Diffstat (limited to 'source4/auth')
-rw-r--r-- | source4/auth/auth.h | 6 | ||||
-rw-r--r-- | source4/auth/credentials/credentials.h | 6 | ||||
-rw-r--r-- | source4/auth/gensec/gensec.h | 8 | ||||
-rw-r--r-- | source4/auth/gensec/schannel.h | 2 | ||||
-rw-r--r-- | source4/auth/kerberos/kerberos.h | 6 | ||||
-rw-r--r-- | source4/auth/ntlmssp/ntlmssp.h | 14 |
6 files changed, 21 insertions, 21 deletions
diff --git a/source4/auth/auth.h b/source4/auth/auth.h index c694141373..be8221d79e 100644 --- a/source4/auth/auth.h +++ b/source4/auth/auth.h @@ -56,7 +56,7 @@ struct auth_usersupplied_info uint32_t logon_parameters; - BOOL mapped_state; + bool mapped_state; /* the values the client gives us */ struct { const char *account_name; @@ -113,7 +113,7 @@ struct auth_serversupplied_info uint32_t acct_flags; - BOOL authenticated; + bool authenticated; }; struct auth_session_info { @@ -161,7 +161,7 @@ struct auth_context { /* Who set this up in the first place? */ const char *set_by; - BOOL may_be_modified; + bool may_be_modified; DATA_BLOB data; } challenge; diff --git a/source4/auth/credentials/credentials.h b/source4/auth/credentials/credentials.h index ca034a8504..1cecb97055 100644 --- a/source4/auth/credentials/credentials.h +++ b/source4/auth/credentials/credentials.h @@ -104,10 +104,10 @@ struct cli_credentials { /* We are flagged to get machine account details from the * secrets.ldb when we are asked for a username or password */ - BOOL machine_account_pending; + bool machine_account_pending; /* Is this a machine account? */ - BOOL machine_account; + bool machine_account; /* Should we be trying to use kerberos? */ enum credentials_use_kerberos use_kerberos; @@ -119,7 +119,7 @@ struct cli_credentials { int tries; /* Whether any callback is currently running */ - BOOL callback_running; + bool callback_running; /* an event context for anyone wanting to use the credentials */ struct event_context *ev; diff --git a/source4/auth/gensec/gensec.h b/source4/auth/gensec/gensec.h index 7ddc2859cc..d129b194af 100644 --- a/source4/auth/gensec/gensec.h +++ b/source4/auth/gensec/gensec.h @@ -134,10 +134,10 @@ struct gensec_security_ops { NTSTATUS (*session_key)(struct gensec_security *gensec_security, DATA_BLOB *session_key); NTSTATUS (*session_info)(struct gensec_security *gensec_security, struct auth_session_info **session_info); - BOOL (*have_feature)(struct gensec_security *gensec_security, + bool (*have_feature)(struct gensec_security *gensec_security, uint32_t feature); - BOOL enabled; - BOOL kerberos; + bool enabled; + bool kerberos; enum gensec_priority priority; }; @@ -154,7 +154,7 @@ struct gensec_security { struct cli_credentials *credentials; struct gensec_target target; enum gensec_role gensec_role; - BOOL subcontext; + bool subcontext; uint32_t want_features; struct event_context *event_ctx; struct messaging_context *msg_ctx; /* only valid as server */ diff --git a/source4/auth/gensec/schannel.h b/source4/auth/gensec/schannel.h index c3dcd68cfa..2ddea29006 100644 --- a/source4/auth/gensec/schannel.h +++ b/source4/auth/gensec/schannel.h @@ -30,7 +30,7 @@ enum schannel_position { struct schannel_state { enum schannel_position state; uint32_t seq_num; - BOOL initiator; + bool initiator; struct creds_CredentialState *creds; }; diff --git a/source4/auth/kerberos/kerberos.h b/source4/auth/kerberos/kerberos.h index 48402caeda..a3005b5019 100644 --- a/source4/auth/kerberos/kerberos.h +++ b/source4/auth/kerberos/kerberos.h @@ -80,14 +80,14 @@ int create_kerberos_key_from_string_direct(krb5_context context, krb5_principal krb5_const_principal get_principal_from_tkt(krb5_ticket *tkt); krb5_error_code get_kerberos_allowed_etypes(krb5_context context, krb5_enctype **enctypes); void free_kerberos_etypes(krb5_context context, krb5_enctype *enctypes); -BOOL get_krb5_smb_session_key(krb5_context context, krb5_auth_context auth_context, DATA_BLOB *session_key, BOOL remote); +bool get_krb5_smb_session_key(krb5_context context, krb5_auth_context auth_context, DATA_BLOB *session_key, bool remote); krb5_error_code ads_krb5_mk_req(krb5_context context, krb5_auth_context *auth_context, const krb5_flags ap_req_options, const char *principal, krb5_ccache ccache, krb5_data *outbuf); -BOOL get_auth_data_from_tkt(TALLOC_CTX *mem_ctx, DATA_BLOB *auth_data, krb5_ticket *tkt); +bool get_auth_data_from_tkt(TALLOC_CTX *mem_ctx, DATA_BLOB *auth_data, krb5_ticket *tkt); NTSTATUS ads_verify_ticket(TALLOC_CTX *mem_ctx, struct smb_krb5_context *smb_krb5_context, krb5_auth_context *auth_context, @@ -107,7 +107,7 @@ krb5_principal kerberos_fetch_salt_princ_for_host_princ(krb5_context context, krb5_principal host_princ, int enctype); void kerberos_set_creds_enctype(krb5_creds *pcreds, int enctype); -BOOL kerberos_compatible_enctypes(krb5_context context, krb5_enctype enctype1, krb5_enctype enctype2); +bool kerberos_compatible_enctypes(krb5_context context, krb5_enctype enctype1, krb5_enctype enctype2); void kerberos_free_data_contents(krb5_context context, krb5_data *pdata); krb5_error_code smb_krb5_kt_free_entry(krb5_context context, krb5_keytab_entry *kt_entry); char *smb_get_krb5_error_message(krb5_context context, krb5_error_code code, TALLOC_CTX *mem_ctx); diff --git a/source4/auth/ntlmssp/ntlmssp.h b/source4/auth/ntlmssp/ntlmssp.h index 577239771c..282fcbc510 100644 --- a/source4/auth/ntlmssp/ntlmssp.h +++ b/source4/auth/ntlmssp/ntlmssp.h @@ -83,13 +83,13 @@ struct gensec_ntlmssp_state enum samr_Role server_role; uint32_t expected_state; - BOOL unicode; - BOOL use_ntlmv2; - BOOL use_nt_response; /* Set to 'False' to debug what happens when the NT response is omited */ - BOOL allow_lm_key; /* The LM_KEY code is not functional at this point, and it's not + bool unicode; + bool use_ntlmv2; + bool use_nt_response; /* Set to 'False' to debug what happens when the NT response is omited */ + bool allow_lm_key; /* The LM_KEY code is not functional at this point, and it's not very secure anyway */ - BOOL server_multiple_authentications; /* Set to 'True' to allow squid 2.5 + bool server_multiple_authentications; /* Set to 'True' to allow squid 2.5 style 'challenge caching' */ char *user; @@ -128,7 +128,7 @@ struct gensec_ntlmssp_state * @return Can the challenge be set to arbitary values? * */ - BOOL (*may_set_challenge)(const struct gensec_ntlmssp_state *); + bool (*may_set_challenge)(const struct gensec_ntlmssp_state *); /** * Callback to set the 'challenge' used for NTLM authentication. @@ -158,7 +158,7 @@ struct gensec_ntlmssp_state const char *server_name; const char *(*get_domain)(void); - BOOL doing_ntlm2; + bool doing_ntlm2; union { /* NTLM */ |