diff options
author | Andrew Bartlett <abartlet@samba.org> | 2011-12-29 22:36:14 +1100 |
---|---|---|
committer | Andrew Bartlett <abartlet@samba.org> | 2011-12-29 14:14:06 +0100 |
commit | c76ffcf3c4e6e46a8ca62b355efc90ff3bf48d2d (patch) | |
tree | 77b46d0e40134cc784b929e6800e51a88fb418e2 /source4 | |
parent | e3f4a6692cd2e22ebd5d7be01719d2bc85cabe40 (diff) | |
download | samba-c76ffcf3c4e6e46a8ca62b355efc90ff3bf48d2d.tar.gz samba-c76ffcf3c4e6e46a8ca62b355efc90ff3bf48d2d.tar.bz2 samba-c76ffcf3c4e6e46a8ca62b355efc90ff3bf48d2d.zip |
s4-toture: Rename memory contexts in rpc.pac for greater clarity
This should better follow the mem_ctx/tmp_ctx pattern used elsewhere in Samba.
Thankyou Simo for the suggestion.
Andrew Bartlett
Autobuild-User: Andrew Bartlett <abartlet@samba.org>
Autobuild-Date: Thu Dec 29 14:14:06 CET 2011 on sn-devel-104
Diffstat (limited to 'source4')
-rw-r--r-- | source4/torture/rpc/remote_pac.c | 26 |
1 files changed, 13 insertions, 13 deletions
diff --git a/source4/torture/rpc/remote_pac.c b/source4/torture/rpc/remote_pac.c index aca518799d..caec1fda3e 100644 --- a/source4/torture/rpc/remote_pac.c +++ b/source4/torture/rpc/remote_pac.c @@ -46,7 +46,7 @@ * generate the session info, as we just want to verify the PAC * details, not the full local token */ static NTSTATUS test_generate_session_info_pac(struct auth4_context *auth_ctx, - TALLOC_CTX *mem_ctx_out, + TALLOC_CTX *mem_ctx, struct smb_krb5_context *smb_krb5_context, DATA_BLOB *pac_blob, const char *principal_name, @@ -58,41 +58,41 @@ static NTSTATUS test_generate_session_info_pac(struct auth4_context *auth_ctx, struct auth_user_info_dc *user_info_dc; struct PAC_SIGNATURE_DATA *pac_srv_sig = NULL; struct PAC_SIGNATURE_DATA *pac_kdc_sig = NULL; - TALLOC_CTX *mem_ctx; + TALLOC_CTX *tmp_ctx; - mem_ctx = talloc_named(mem_ctx_out, 0, "gensec_gssapi_session_info context"); - NT_STATUS_HAVE_NO_MEMORY(mem_ctx); + tmp_ctx = talloc_named(mem_ctx, 0, "gensec_gssapi_session_info context"); + NT_STATUS_HAVE_NO_MEMORY(tmp_ctx); - pac_srv_sig = talloc(mem_ctx, struct PAC_SIGNATURE_DATA); + pac_srv_sig = talloc(tmp_ctx, struct PAC_SIGNATURE_DATA); if (!pac_srv_sig) { - talloc_free(mem_ctx); + talloc_free(tmp_ctx); return NT_STATUS_NO_MEMORY; } - pac_kdc_sig = talloc(mem_ctx, struct PAC_SIGNATURE_DATA); + pac_kdc_sig = talloc(tmp_ctx, struct PAC_SIGNATURE_DATA); if (!pac_kdc_sig) { - talloc_free(mem_ctx); + talloc_free(tmp_ctx); return NT_STATUS_NO_MEMORY; } - nt_status = kerberos_pac_blob_to_user_info_dc(mem_ctx, + nt_status = kerberos_pac_blob_to_user_info_dc(tmp_ctx, *pac_blob, smb_krb5_context->krb5_context, &user_info_dc, pac_srv_sig, pac_kdc_sig); if (!NT_STATUS_IS_OK(nt_status)) { - talloc_free(mem_ctx); + talloc_free(tmp_ctx); return nt_status; } session_info_flags |= AUTH_SESSION_INFO_SIMPLE_PRIVILEGES; - nt_status = auth_generate_session_info(mem_ctx_out, + nt_status = auth_generate_session_info(mem_ctx, NULL, NULL, user_info_dc, session_info_flags, session_info); if (!NT_STATUS_IS_OK(nt_status)) { - talloc_free(mem_ctx); + talloc_free(tmp_ctx); return nt_status; } @@ -103,7 +103,7 @@ static NTSTATUS test_generate_session_info_pac(struct auth4_context *auth_ctx, = talloc_steal((*session_info)->torture, pac_kdc_sig); } - talloc_free(mem_ctx); + talloc_free(tmp_ctx); return nt_status; } |