diff options
Diffstat (limited to 'source4/auth/kerberos')
-rw-r--r-- | source4/auth/kerberos/gssapi_parse.c | 14 | ||||
-rw-r--r-- | source4/auth/kerberos/kerberos_util.c | 12 |
2 files changed, 13 insertions, 13 deletions
diff --git a/source4/auth/kerberos/gssapi_parse.c b/source4/auth/kerberos/gssapi_parse.c index 27c96770a6..4b1b178238 100644 --- a/source4/auth/kerberos/gssapi_parse.c +++ b/source4/auth/kerberos/gssapi_parse.c @@ -64,14 +64,14 @@ DATA_BLOB gensec_gssapi_gen_krb5_wrap(TALLOC_CTX *mem_ctx, const DATA_BLOB *tick /* parse a krb5 GSS-API wrapper packet giving a ticket */ -BOOL gensec_gssapi_parse_krb5_wrap(TALLOC_CTX *mem_ctx, const DATA_BLOB *blob, DATA_BLOB *ticket, uint8_t tok_id[2]) +bool gensec_gssapi_parse_krb5_wrap(TALLOC_CTX *mem_ctx, const DATA_BLOB *blob, DATA_BLOB *ticket, uint8_t tok_id[2]) { - BOOL ret; + bool ret; struct asn1_data *data = asn1_init(mem_ctx); int data_remaining; if (!data) { - return False; + return false; } asn1_load(data, *blob); @@ -81,7 +81,7 @@ BOOL gensec_gssapi_parse_krb5_wrap(TALLOC_CTX *mem_ctx, const DATA_BLOB *blob, D data_remaining = asn1_tag_remaining(data); if (data_remaining < 3) { - data->has_error = True; + data->has_error = true; } else { asn1_read(data, tok_id, 2); data_remaining -= 2; @@ -102,12 +102,12 @@ BOOL gensec_gssapi_parse_krb5_wrap(TALLOC_CTX *mem_ctx, const DATA_BLOB *blob, D /* check a GSS-API wrapper packet givin an expected OID */ -BOOL gensec_gssapi_check_oid(const DATA_BLOB *blob, const char *oid) +bool gensec_gssapi_check_oid(const DATA_BLOB *blob, const char *oid) { - BOOL ret; + bool ret; struct asn1_data *data = asn1_init(NULL); - if (!data) return False; + if (!data) return false; asn1_load(data, *blob); asn1_start_tag(data, ASN1_APPLICATION(0)); diff --git a/source4/auth/kerberos/kerberos_util.c b/source4/auth/kerberos/kerberos_util.c index 918c28cf33..70e2961d55 100644 --- a/source4/auth/kerberos/kerberos_util.c +++ b/source4/auth/kerberos/kerberos_util.c @@ -343,7 +343,7 @@ static int create_keytab(TALLOC_CTX *parent_ctx, struct smb_krb5_context *smb_krb5_context, const char **enctype_strings, krb5_keytab keytab, - BOOL add_old) + bool add_old) { krb5_error_code ret; const char *password_s; @@ -484,7 +484,7 @@ static int create_keytab(TALLOC_CTX *parent_ctx, static krb5_error_code remove_old_entries(TALLOC_CTX *parent_ctx, struct cli_credentials *machine_account, struct smb_krb5_context *smb_krb5_context, - krb5_keytab keytab, BOOL *found_previous) + krb5_keytab keytab, bool *found_previous) { krb5_error_code ret, ret2; krb5_kt_cursor cursor; @@ -496,7 +496,7 @@ static krb5_error_code remove_old_entries(TALLOC_CTX *parent_ctx, return ENOMEM; } - *found_previous = False; + *found_previous = false; princ_string = cli_credentials_get_principal(machine_account, mem_ctx); /* Get the principal we will store the new keytab entries under */ @@ -575,7 +575,7 @@ static krb5_error_code remove_old_entries(TALLOC_CTX *parent_ctx, } } else { - *found_previous = True; + *found_previous = true; } /* Free the entry, we don't need it any more */ @@ -609,7 +609,7 @@ int smb_krb5_update_keytab(TALLOC_CTX *parent_ctx, struct keytab_container *keytab_container) { krb5_error_code ret; - BOOL found_previous; + bool found_previous; TALLOC_CTX *mem_ctx = talloc_new(parent_ctx); if (!mem_ctx) { return ENOMEM; @@ -629,7 +629,7 @@ int smb_krb5_update_keytab(TALLOC_CTX *parent_ctx, ret = create_keytab(mem_ctx, machine_account, smb_krb5_context, enctype_strings, keytab_container->keytab, - found_previous ? False : True); + found_previous ? false : true); talloc_free(mem_ctx); return ret; } |