summaryrefslogtreecommitdiff
path: root/source4/auth
diff options
context:
space:
mode:
Diffstat (limited to 'source4/auth')
-rw-r--r--source4/auth/auth.h6
-rw-r--r--source4/auth/credentials/credentials.h6
-rw-r--r--source4/auth/gensec/gensec.h8
-rw-r--r--source4/auth/gensec/schannel.h2
-rw-r--r--source4/auth/kerberos/kerberos.h6
-rw-r--r--source4/auth/ntlmssp/ntlmssp.h14
6 files changed, 21 insertions, 21 deletions
diff --git a/source4/auth/auth.h b/source4/auth/auth.h
index c694141373..be8221d79e 100644
--- a/source4/auth/auth.h
+++ b/source4/auth/auth.h
@@ -56,7 +56,7 @@ struct auth_usersupplied_info
uint32_t logon_parameters;
- BOOL mapped_state;
+ bool mapped_state;
/* the values the client gives us */
struct {
const char *account_name;
@@ -113,7 +113,7 @@ struct auth_serversupplied_info
uint32_t acct_flags;
- BOOL authenticated;
+ bool authenticated;
};
struct auth_session_info {
@@ -161,7 +161,7 @@ struct auth_context {
/* Who set this up in the first place? */
const char *set_by;
- BOOL may_be_modified;
+ bool may_be_modified;
DATA_BLOB data;
} challenge;
diff --git a/source4/auth/credentials/credentials.h b/source4/auth/credentials/credentials.h
index ca034a8504..1cecb97055 100644
--- a/source4/auth/credentials/credentials.h
+++ b/source4/auth/credentials/credentials.h
@@ -104,10 +104,10 @@ struct cli_credentials {
/* We are flagged to get machine account details from the
* secrets.ldb when we are asked for a username or password */
- BOOL machine_account_pending;
+ bool machine_account_pending;
/* Is this a machine account? */
- BOOL machine_account;
+ bool machine_account;
/* Should we be trying to use kerberos? */
enum credentials_use_kerberos use_kerberos;
@@ -119,7 +119,7 @@ struct cli_credentials {
int tries;
/* Whether any callback is currently running */
- BOOL callback_running;
+ bool callback_running;
/* an event context for anyone wanting to use the credentials */
struct event_context *ev;
diff --git a/source4/auth/gensec/gensec.h b/source4/auth/gensec/gensec.h
index 7ddc2859cc..d129b194af 100644
--- a/source4/auth/gensec/gensec.h
+++ b/source4/auth/gensec/gensec.h
@@ -134,10 +134,10 @@ struct gensec_security_ops {
NTSTATUS (*session_key)(struct gensec_security *gensec_security, DATA_BLOB *session_key);
NTSTATUS (*session_info)(struct gensec_security *gensec_security,
struct auth_session_info **session_info);
- BOOL (*have_feature)(struct gensec_security *gensec_security,
+ bool (*have_feature)(struct gensec_security *gensec_security,
uint32_t feature);
- BOOL enabled;
- BOOL kerberos;
+ bool enabled;
+ bool kerberos;
enum gensec_priority priority;
};
@@ -154,7 +154,7 @@ struct gensec_security {
struct cli_credentials *credentials;
struct gensec_target target;
enum gensec_role gensec_role;
- BOOL subcontext;
+ bool subcontext;
uint32_t want_features;
struct event_context *event_ctx;
struct messaging_context *msg_ctx; /* only valid as server */
diff --git a/source4/auth/gensec/schannel.h b/source4/auth/gensec/schannel.h
index c3dcd68cfa..2ddea29006 100644
--- a/source4/auth/gensec/schannel.h
+++ b/source4/auth/gensec/schannel.h
@@ -30,7 +30,7 @@ enum schannel_position {
struct schannel_state {
enum schannel_position state;
uint32_t seq_num;
- BOOL initiator;
+ bool initiator;
struct creds_CredentialState *creds;
};
diff --git a/source4/auth/kerberos/kerberos.h b/source4/auth/kerberos/kerberos.h
index 48402caeda..a3005b5019 100644
--- a/source4/auth/kerberos/kerberos.h
+++ b/source4/auth/kerberos/kerberos.h
@@ -80,14 +80,14 @@ int create_kerberos_key_from_string_direct(krb5_context context, krb5_principal
krb5_const_principal get_principal_from_tkt(krb5_ticket *tkt);
krb5_error_code get_kerberos_allowed_etypes(krb5_context context, krb5_enctype **enctypes);
void free_kerberos_etypes(krb5_context context, krb5_enctype *enctypes);
-BOOL get_krb5_smb_session_key(krb5_context context, krb5_auth_context auth_context, DATA_BLOB *session_key, BOOL remote);
+bool get_krb5_smb_session_key(krb5_context context, krb5_auth_context auth_context, DATA_BLOB *session_key, bool remote);
krb5_error_code ads_krb5_mk_req(krb5_context context,
krb5_auth_context *auth_context,
const krb5_flags ap_req_options,
const char *principal,
krb5_ccache ccache,
krb5_data *outbuf);
-BOOL get_auth_data_from_tkt(TALLOC_CTX *mem_ctx, DATA_BLOB *auth_data, krb5_ticket *tkt);
+bool get_auth_data_from_tkt(TALLOC_CTX *mem_ctx, DATA_BLOB *auth_data, krb5_ticket *tkt);
NTSTATUS ads_verify_ticket(TALLOC_CTX *mem_ctx,
struct smb_krb5_context *smb_krb5_context,
krb5_auth_context *auth_context,
@@ -107,7 +107,7 @@ krb5_principal kerberos_fetch_salt_princ_for_host_princ(krb5_context context,
krb5_principal host_princ,
int enctype);
void kerberos_set_creds_enctype(krb5_creds *pcreds, int enctype);
-BOOL kerberos_compatible_enctypes(krb5_context context, krb5_enctype enctype1, krb5_enctype enctype2);
+bool kerberos_compatible_enctypes(krb5_context context, krb5_enctype enctype1, krb5_enctype enctype2);
void kerberos_free_data_contents(krb5_context context, krb5_data *pdata);
krb5_error_code smb_krb5_kt_free_entry(krb5_context context, krb5_keytab_entry *kt_entry);
char *smb_get_krb5_error_message(krb5_context context, krb5_error_code code, TALLOC_CTX *mem_ctx);
diff --git a/source4/auth/ntlmssp/ntlmssp.h b/source4/auth/ntlmssp/ntlmssp.h
index 577239771c..282fcbc510 100644
--- a/source4/auth/ntlmssp/ntlmssp.h
+++ b/source4/auth/ntlmssp/ntlmssp.h
@@ -83,13 +83,13 @@ struct gensec_ntlmssp_state
enum samr_Role server_role;
uint32_t expected_state;
- BOOL unicode;
- BOOL use_ntlmv2;
- BOOL use_nt_response; /* Set to 'False' to debug what happens when the NT response is omited */
- BOOL allow_lm_key; /* The LM_KEY code is not functional at this point, and it's not
+ bool unicode;
+ bool use_ntlmv2;
+ bool use_nt_response; /* Set to 'False' to debug what happens when the NT response is omited */
+ bool allow_lm_key; /* The LM_KEY code is not functional at this point, and it's not
very secure anyway */
- BOOL server_multiple_authentications; /* Set to 'True' to allow squid 2.5
+ bool server_multiple_authentications; /* Set to 'True' to allow squid 2.5
style 'challenge caching' */
char *user;
@@ -128,7 +128,7 @@ struct gensec_ntlmssp_state
* @return Can the challenge be set to arbitary values?
*
*/
- BOOL (*may_set_challenge)(const struct gensec_ntlmssp_state *);
+ bool (*may_set_challenge)(const struct gensec_ntlmssp_state *);
/**
* Callback to set the 'challenge' used for NTLM authentication.
@@ -158,7 +158,7 @@ struct gensec_ntlmssp_state
const char *server_name;
const char *(*get_domain)(void);
- BOOL doing_ntlm2;
+ bool doing_ntlm2;
union {
/* NTLM */