diff options
author | Stefan Metzmacher <metze@samba.org> | 2007-10-08 14:18:19 +0000 |
---|---|---|
committer | Gerald (Jerry) Carter <jerry@samba.org> | 2007-10-10 15:07:58 -0500 |
commit | b3393247a20ff227bf64c02d8d31c8c3375d9ed9 (patch) | |
tree | 66d9f6618dc2b13610d874bbdd7634bdc833716d /source4/auth | |
parent | ffc9f2e05de1e350790739ad12dc977318b5b5c0 (diff) | |
download | samba-b3393247a20ff227bf64c02d8d31c8c3375d9ed9.tar.gz samba-b3393247a20ff227bf64c02d8d31c8c3375d9ed9.tar.bz2 samba-b3393247a20ff227bf64c02d8d31c8c3375d9ed9.zip |
r25576: BOOL -> bool
metze
(This used to be commit 9fd96e1989e348f87355ed120786399493a9e447)
Diffstat (limited to 'source4/auth')
-rw-r--r-- | source4/auth/auth_server.c | 14 | ||||
-rw-r--r-- | source4/auth/auth_unix.c | 2 |
2 files changed, 8 insertions, 8 deletions
diff --git a/source4/auth/auth_server.c b/source4/auth/auth_server.c index 1513228bd9..abc052c9ea 100644 --- a/source4/auth/auth_server.c +++ b/source4/auth/auth_server.c @@ -31,13 +31,13 @@ static struct smbcli_state *server_cryptkey(TALLOC_CTX *mem_ctx) struct ipv4_addr dest_ip; const char *p; char *pserver; - BOOL connected_ok = False; + bool connected_ok = false; if (!(cli = smbcli_initialise(cli))) return NULL; /* security = server just can't function with spnego */ - cli->use_spnego = False; + cli->use_spnego = false; pserver = talloc_strdup(mem_ctx, lp_passwordserver()); p = pserver; @@ -66,7 +66,7 @@ static struct smbcli_state *server_cryptkey(TALLOC_CTX *mem_ctx) if (smbcli_connect(cli, desthost, &dest_ip)) { DEBUG(3,("connected to password server %s\n",desthost)); - connected_ok = True; + connected_ok = true; break; } } @@ -198,7 +198,7 @@ static NTSTATUS check_smbserver_security(const struct auth_context *auth_context static bool tested_password_server = false; static bool bad_password_server = false; NTSTATUS nt_status = NT_STATUS_LOGON_FAILURE; - BOOL locally_made_cli = False; + bool locally_made_cli = false; /* * Check that the requested domain is not our own machine name. @@ -216,7 +216,7 @@ static NTSTATUS check_smbserver_security(const struct auth_context *auth_context if (cli) { } else { cli = server_cryptkey(mem_ctx); - locally_made_cli = True; + locally_made_cli = true; } if (!cli || !cli->initialised) { @@ -273,7 +273,7 @@ static NTSTATUS check_smbserver_security(const struct auth_context *auth_context * We connected to the password server so we * can say we've tested it. */ - tested_password_server = True; + tested_password_server = true; if ((SVAL(cli->inbuf,smb_vwv2) & 1) == 0) { DEBUG(0,("server_validate: password server %s allows users as non-guest \ @@ -285,7 +285,7 @@ use this machine as the password server.\n")); /* * Password server has the bug. */ - bad_password_server = True; + bad_password_server = true; return NT_STATUS_LOGON_FAILURE; } smbcli_ulogoff(cli); diff --git a/source4/auth/auth_unix.c b/source4/auth/auth_unix.c index b5abaa2980..8b4e23a2c4 100644 --- a/source4/auth/auth_unix.c +++ b/source4/auth/auth_unix.c @@ -499,7 +499,7 @@ core of password checking routine static NTSTATUS password_check(const char *username, const char *password, const char *crypted, const char *salt) { - BOOL ret; + bool ret; #ifdef WITH_AFS if (afs_auth(username, password)) |