From b92c399d97d1b0a1242489f4af0bdfb79906ee29 Mon Sep 17 00:00:00 2001 From: Jeremy Allison Date: Thu, 17 Sep 2009 11:16:54 -0700 Subject: Check in modified generated files for systems where pidl can't run. Jeremy. --- librpc/gen_ndr/security.h | 74 +++++++++++++++++++++++------------------------ 1 file changed, 37 insertions(+), 37 deletions(-) (limited to 'librpc/gen_ndr/security.h') diff --git a/librpc/gen_ndr/security.h b/librpc/gen_ndr/security.h index e0a3528251..5bd2cbafd5 100644 --- a/librpc/gen_ndr/security.h +++ b/librpc/gen_ndr/security.h @@ -153,31 +153,31 @@ struct dom_sid { enum sec_privilege #ifndef USE_UINT_ENUMS { - SEC_PRIV_SECURITY=1, - SEC_PRIV_BACKUP=2, - SEC_PRIV_RESTORE=3, - SEC_PRIV_SYSTEMTIME=4, - SEC_PRIV_SHUTDOWN=5, - SEC_PRIV_REMOTE_SHUTDOWN=6, - SEC_PRIV_TAKE_OWNERSHIP=7, - SEC_PRIV_DEBUG=8, - SEC_PRIV_SYSTEM_ENVIRONMENT=9, - SEC_PRIV_SYSTEM_PROFILE=10, - SEC_PRIV_PROFILE_SINGLE_PROCESS=11, - SEC_PRIV_INCREASE_BASE_PRIORITY=12, - SEC_PRIV_LOAD_DRIVER=13, - SEC_PRIV_CREATE_PAGEFILE=14, - SEC_PRIV_INCREASE_QUOTA=15, - SEC_PRIV_CHANGE_NOTIFY=16, - SEC_PRIV_UNDOCK=17, - SEC_PRIV_MANAGE_VOLUME=18, - SEC_PRIV_IMPERSONATE=19, - SEC_PRIV_CREATE_GLOBAL=20, - SEC_PRIV_ENABLE_DELEGATION=21, - SEC_PRIV_INTERACTIVE_LOGON=22, - SEC_PRIV_NETWORK_LOGON=23, - SEC_PRIV_REMOTE_INTERACTIVE_LOGON=24, - SEC_PRIV_MACHINE_ACCOUNT=25 + SEC_PRIV_SECURITY=(int)1, + SEC_PRIV_BACKUP=(int)2, + SEC_PRIV_RESTORE=(int)3, + SEC_PRIV_SYSTEMTIME=(int)4, + SEC_PRIV_SHUTDOWN=(int)5, + SEC_PRIV_REMOTE_SHUTDOWN=(int)6, + SEC_PRIV_TAKE_OWNERSHIP=(int)7, + SEC_PRIV_DEBUG=(int)8, + SEC_PRIV_SYSTEM_ENVIRONMENT=(int)9, + SEC_PRIV_SYSTEM_PROFILE=(int)10, + SEC_PRIV_PROFILE_SINGLE_PROCESS=(int)11, + SEC_PRIV_INCREASE_BASE_PRIORITY=(int)12, + SEC_PRIV_LOAD_DRIVER=(int)13, + SEC_PRIV_CREATE_PAGEFILE=(int)14, + SEC_PRIV_INCREASE_QUOTA=(int)15, + SEC_PRIV_CHANGE_NOTIFY=(int)16, + SEC_PRIV_UNDOCK=(int)17, + SEC_PRIV_MANAGE_VOLUME=(int)18, + SEC_PRIV_IMPERSONATE=(int)19, + SEC_PRIV_CREATE_GLOBAL=(int)20, + SEC_PRIV_ENABLE_DELEGATION=(int)21, + SEC_PRIV_INTERACTIVE_LOGON=(int)22, + SEC_PRIV_NETWORK_LOGON=(int)23, + SEC_PRIV_REMOTE_INTERACTIVE_LOGON=(int)24, + SEC_PRIV_MACHINE_ACCOUNT=(int)25 } #else { __donnot_use_enum_sec_privilege=0x7FFFFFFF} @@ -222,15 +222,15 @@ enum sec_privilege enum security_ace_type #ifndef USE_UINT_ENUMS { - SEC_ACE_TYPE_ACCESS_ALLOWED=0, - SEC_ACE_TYPE_ACCESS_DENIED=1, - SEC_ACE_TYPE_SYSTEM_AUDIT=2, - SEC_ACE_TYPE_SYSTEM_ALARM=3, - SEC_ACE_TYPE_ALLOWED_COMPOUND=4, - SEC_ACE_TYPE_ACCESS_ALLOWED_OBJECT=5, - SEC_ACE_TYPE_ACCESS_DENIED_OBJECT=6, - SEC_ACE_TYPE_SYSTEM_AUDIT_OBJECT=7, - SEC_ACE_TYPE_SYSTEM_ALARM_OBJECT=8 + SEC_ACE_TYPE_ACCESS_ALLOWED=(int)0, + SEC_ACE_TYPE_ACCESS_DENIED=(int)1, + SEC_ACE_TYPE_SYSTEM_AUDIT=(int)2, + SEC_ACE_TYPE_SYSTEM_ALARM=(int)3, + SEC_ACE_TYPE_ALLOWED_COMPOUND=(int)4, + SEC_ACE_TYPE_ACCESS_ALLOWED_OBJECT=(int)5, + SEC_ACE_TYPE_ACCESS_DENIED_OBJECT=(int)6, + SEC_ACE_TYPE_SYSTEM_AUDIT_OBJECT=(int)7, + SEC_ACE_TYPE_SYSTEM_ALARM_OBJECT=(int)8 } #else { __donnot_use_enum_security_ace_type=0x7FFFFFFF} @@ -280,8 +280,8 @@ struct security_ace { enum security_acl_revision #ifndef USE_UINT_ENUMS { - SECURITY_ACL_REVISION_NT4=2, - SECURITY_ACL_REVISION_ADS=4 + SECURITY_ACL_REVISION_NT4=(int)2, + SECURITY_ACL_REVISION_ADS=(int)4 } #else { __donnot_use_enum_security_acl_revision=0x7FFFFFFF} @@ -300,7 +300,7 @@ struct security_acl { enum security_descriptor_revision #ifndef USE_UINT_ENUMS { - SECURITY_DESCRIPTOR_REVISION_1=1 + SECURITY_DESCRIPTOR_REVISION_1=(int)1 } #else { __donnot_use_enum_security_descriptor_revision=0x7FFFFFFF} -- cgit