From 3642f3b40d755209a843745f160a9d7962a6deca Mon Sep 17 00:00:00 2001 From: Jelmer Vernooij Date: Sat, 6 Oct 2007 22:16:19 +0000 Subject: r25552: Convert to standard bool type. (This used to be commit b8d6b82f1248d36a0aa91a1c58d06b4f7c66d245) --- source4/auth/gensec/gensec.c | 16 ++++++++-------- source4/auth/gensec/gensec_gssapi.c | 32 ++++++++++++++++---------------- source4/auth/gensec/gensec_krb5.c | 24 ++++++++++++------------ source4/auth/gensec/schannel.c | 16 ++++++++-------- source4/auth/gensec/schannel_state.c | 2 +- source4/auth/gensec/socket.c | 20 ++++++++++---------- source4/auth/gensec/spnego.c | 24 ++++++++++++------------ source4/auth/gensec/spnego_parse.c | 30 +++++++++++++++--------------- 8 files changed, 82 insertions(+), 82 deletions(-) (limited to 'source4/auth/gensec') diff --git a/source4/auth/gensec/gensec.c b/source4/auth/gensec/gensec.c index 9bbf31a7c7..4821e6a19b 100644 --- a/source4/auth/gensec/gensec.c +++ b/source4/auth/gensec/gensec.c @@ -85,13 +85,13 @@ struct gensec_security_ops **gensec_use_kerberos_mechs(TALLOC_CTX *mem_ctx, } switch (use_kerberos) { case CRED_DONT_USE_KERBEROS: - if (old_gensec_list[i]->kerberos == False) { + if (old_gensec_list[i]->kerberos == false) { new_gensec_list[j] = old_gensec_list[i]; j++; } break; case CRED_MUST_USE_KERBEROS: - if (old_gensec_list[i]->kerberos == True) { + if (old_gensec_list[i]->kerberos == true) { new_gensec_list[j] = old_gensec_list[i]; j++; } @@ -489,7 +489,7 @@ static NTSTATUS gensec_start(TALLOC_CTX *mem_ctx, ZERO_STRUCT((*gensec_security)->peer_addr); ZERO_STRUCT((*gensec_security)->my_addr); - (*gensec_security)->subcontext = False; + (*gensec_security)->subcontext = false; (*gensec_security)->want_features = 0; if (ev == NULL) { @@ -525,7 +525,7 @@ _PUBLIC_ NTSTATUS gensec_subcontext_start(TALLOC_CTX *mem_ctx, (*gensec_security)->ops = NULL; (*gensec_security)->private_data = NULL; - (*gensec_security)->subcontext = True; + (*gensec_security)->subcontext = true; (*gensec_security)->event_ctx = parent->event_ctx; (*gensec_security)->msg_ctx = parent->msg_ctx; @@ -1030,11 +1030,11 @@ _PUBLIC_ void gensec_want_feature(struct gensec_security *gensec_security, * */ -_PUBLIC_ BOOL gensec_have_feature(struct gensec_security *gensec_security, +_PUBLIC_ bool gensec_have_feature(struct gensec_security *gensec_security, uint32_t feature) { if (!gensec_security->ops->have_feature) { - return False; + return false; } /* We might 'have' features that we don't 'want', because the @@ -1261,13 +1261,13 @@ static int sort_gensec(struct gensec_security_ops **gs1, struct gensec_security_ */ NTSTATUS gensec_init(void) { - static BOOL initialized = False; + static bool initialized = false; init_module_fn static_init[] = STATIC_gensec_MODULES; init_module_fn *shared_init; if (initialized) return NT_STATUS_OK; - initialized = True; + initialized = true; shared_init = load_samba_modules(NULL, global_loadparm, "gensec"); diff --git a/source4/auth/gensec/gensec_gssapi.c b/source4/auth/gensec/gensec_gssapi.c index f83da1db63..dceb10e7b6 100644 --- a/source4/auth/gensec/gensec_gssapi.c +++ b/source4/auth/gensec/gensec_gssapi.c @@ -65,7 +65,7 @@ struct gensec_gssapi_state { gss_cred_id_t delegated_cred_handle; - BOOL sasl; /* We have two different mechs in this file: One + bool sasl; /* We have two different mechs in this file: One * for SASL wrapped GSSAPI and another for normal * GSSAPI */ enum gensec_gssapi_sasl_state sasl_state; @@ -157,7 +157,7 @@ static NTSTATUS gensec_gssapi_start(struct gensec_security *gensec_security) gensec_gssapi_state->max_wrap_buf_size = lp_parm_int(global_loadparm, NULL, "gensec_gssapi", "max wrap buf size", 65536); - gensec_gssapi_state->sasl = False; + gensec_gssapi_state->sasl = false; gensec_gssapi_state->sasl_state = STAGE_GSS_NEG; gensec_security->private_data = gensec_gssapi_state; @@ -291,7 +291,7 @@ static NTSTATUS gensec_gssapi_sasl_server_start(struct gensec_security *gensec_s if (NT_STATUS_IS_OK(nt_status)) { gensec_gssapi_state = talloc_get_type(gensec_security->private_data, struct gensec_gssapi_state); - gensec_gssapi_state->sasl = True; + gensec_gssapi_state->sasl = true; } return nt_status; } @@ -386,7 +386,7 @@ static NTSTATUS gensec_gssapi_sasl_client_start(struct gensec_security *gensec_s if (NT_STATUS_IS_OK(nt_status)) { gensec_gssapi_state = talloc_get_type(gensec_security->private_data, struct gensec_gssapi_state); - gensec_gssapi_state->sasl = True; + gensec_gssapi_state->sasl = true; } return nt_status; } @@ -632,7 +632,7 @@ static NTSTATUS gensec_gssapi_update(struct gensec_security *gensec_security, maj_stat = gss_wrap(&min_stat, gensec_gssapi_state->gssapi_context, - False, + false, GSS_C_QOP_DEFAULT, &input_token, &conf_state, @@ -697,7 +697,7 @@ static NTSTATUS gensec_gssapi_update(struct gensec_security *gensec_security, maj_stat = gss_wrap(&min_stat, gensec_gssapi_state->gssapi_context, - False, + false, GSS_C_QOP_DEFAULT, &input_token, &conf_state, @@ -1110,7 +1110,7 @@ static NTSTATUS gensec_gssapi_check_packet(struct gensec_security *gensec_securi } /* Try to figure out what features we actually got on the connection */ -static BOOL gensec_gssapi_have_feature(struct gensec_security *gensec_security, +static bool gensec_gssapi_have_feature(struct gensec_security *gensec_security, uint32_t feature) { struct gensec_gssapi_state *gensec_gssapi_state @@ -1136,7 +1136,7 @@ static BOOL gensec_gssapi_have_feature(struct gensec_security *gensec_security, if (feature & GENSEC_FEATURE_SESSION_KEY) { /* Only for GSSAPI/Krb5 */ if (gss_oid_equal(gensec_gssapi_state->gss_oid, gss_mech_krb5)) { - return True; + return true; } } if (feature & GENSEC_FEATURE_DCE_STYLE) { @@ -1144,9 +1144,9 @@ static BOOL gensec_gssapi_have_feature(struct gensec_security *gensec_security, } /* We can always do async (rather than strict request/reply) packets. */ if (feature & GENSEC_FEATURE_ASYNC_REPLIES) { - return True; + return true; } - return False; + return false; } /* @@ -1414,8 +1414,8 @@ static const struct gensec_security_ops gensec_gssapi_spnego_security_ops = { .wrap = gensec_gssapi_wrap, .unwrap = gensec_gssapi_unwrap, .have_feature = gensec_gssapi_have_feature, - .enabled = False, - .kerberos = True, + .enabled = false, + .kerberos = true, .priority = GENSEC_GSSAPI }; @@ -1437,8 +1437,8 @@ static const struct gensec_security_ops gensec_gssapi_krb5_security_ops = { .wrap = gensec_gssapi_wrap, .unwrap = gensec_gssapi_unwrap, .have_feature = gensec_gssapi_have_feature, - .enabled = True, - .kerberos = True, + .enabled = true, + .kerberos = true, .priority = GENSEC_GSSAPI }; @@ -1456,8 +1456,8 @@ static const struct gensec_security_ops gensec_gssapi_sasl_krb5_security_ops = { .wrap = gensec_gssapi_wrap, .unwrap = gensec_gssapi_unwrap, .have_feature = gensec_gssapi_have_feature, - .enabled = True, - .kerberos = True, + .enabled = true, + .kerberos = true, .priority = GENSEC_GSSAPI }; diff --git a/source4/auth/gensec/gensec_krb5.c b/source4/auth/gensec/gensec_krb5.c index 5951ccf879..ca48e85089 100644 --- a/source4/auth/gensec/gensec_krb5.c +++ b/source4/auth/gensec/gensec_krb5.c @@ -54,7 +54,7 @@ struct gensec_krb5_state { krb5_data enc_ticket; krb5_keyblock *keyblock; krb5_ticket *ticket; - BOOL gssapi; + bool gssapi; }; static int gensec_krb5_destroy(struct gensec_krb5_state *gensec_krb5_state) @@ -112,7 +112,7 @@ static NTSTATUS gensec_krb5_start(struct gensec_security *gensec_security) gensec_krb5_state->keyblock = NULL; gensec_krb5_state->session_key = data_blob(NULL, 0); gensec_krb5_state->pac = data_blob(NULL, 0); - gensec_krb5_state->gssapi = False; + gensec_krb5_state->gssapi = false; talloc_set_destructor(gensec_krb5_state, gensec_krb5_destroy); @@ -205,7 +205,7 @@ static NTSTATUS gensec_fake_gssapi_krb5_server_start(struct gensec_security *gen if (NT_STATUS_IS_OK(nt_status)) { struct gensec_krb5_state *gensec_krb5_state; gensec_krb5_state = (struct gensec_krb5_state *)gensec_security->private_data; - gensec_krb5_state->gssapi = True; + gensec_krb5_state->gssapi = true; } return nt_status; } @@ -329,7 +329,7 @@ static NTSTATUS gensec_fake_gssapi_krb5_client_start(struct gensec_security *gen if (NT_STATUS_IS_OK(nt_status)) { struct gensec_krb5_state *gensec_krb5_state; gensec_krb5_state = (struct gensec_krb5_state *)gensec_security->private_data; - gensec_krb5_state->gssapi = True; + gensec_krb5_state->gssapi = true; } return nt_status; } @@ -723,19 +723,19 @@ static NTSTATUS gensec_krb5_unwrap(struct gensec_security *gensec_security, return NT_STATUS_OK; } -static BOOL gensec_krb5_have_feature(struct gensec_security *gensec_security, +static bool gensec_krb5_have_feature(struct gensec_security *gensec_security, uint32_t feature) { struct gensec_krb5_state *gensec_krb5_state = (struct gensec_krb5_state *)gensec_security->private_data; if (feature & GENSEC_FEATURE_SESSION_KEY) { - return True; + return true; } if (!gensec_krb5_state->gssapi && (feature & GENSEC_FEATURE_SEAL)) { - return True; + return true; } - return False; + return false; } static const char *gensec_krb5_oids[] = { @@ -755,8 +755,8 @@ static const struct gensec_security_ops gensec_fake_gssapi_krb5_security_ops = { .session_key = gensec_krb5_session_key, .session_info = gensec_krb5_session_info, .have_feature = gensec_krb5_have_feature, - .enabled = False, - .kerberos = True, + .enabled = false, + .kerberos = true, .priority = GENSEC_KRB5 }; @@ -770,8 +770,8 @@ static const struct gensec_security_ops gensec_krb5_security_ops = { .have_feature = gensec_krb5_have_feature, .wrap = gensec_krb5_wrap, .unwrap = gensec_krb5_unwrap, - .enabled = True, - .kerberos = True, + .enabled = true, + .kerberos = true, .priority = GENSEC_KRB5 }; diff --git a/source4/auth/gensec/schannel.c b/source4/auth/gensec/schannel.c index 6882eab945..4d2c9cfee3 100644 --- a/source4/auth/gensec/schannel.c +++ b/source4/auth/gensec/schannel.c @@ -208,7 +208,7 @@ static NTSTATUS schannel_server_start(struct gensec_security *gensec_security) } state = (struct schannel_state *)gensec_security->private_data; - state->initiator = False; + state->initiator = false; return NT_STATUS_OK; } @@ -224,26 +224,26 @@ static NTSTATUS schannel_client_start(struct gensec_security *gensec_security) } state = (struct schannel_state *)gensec_security->private_data; - state->initiator = True; + state->initiator = true; return NT_STATUS_OK; } -static BOOL schannel_have_feature(struct gensec_security *gensec_security, +static bool schannel_have_feature(struct gensec_security *gensec_security, uint32_t feature) { if (feature & (GENSEC_FEATURE_SIGN | GENSEC_FEATURE_SEAL)) { - return True; + return true; } if (feature & GENSEC_FEATURE_DCE_STYLE) { - return True; + return true; } if (feature & GENSEC_FEATURE_ASYNC_REPLIES) { - return True; + return true; } - return False; + return false; } @@ -261,7 +261,7 @@ static const struct gensec_security_ops gensec_schannel_security_ops = { .session_info = schannel_session_info, .sig_size = schannel_sig_size, .have_feature = schannel_have_feature, - .enabled = True, + .enabled = true, .priority = GENSEC_SCHANNEL }; diff --git a/source4/auth/gensec/schannel_state.c b/source4/auth/gensec/schannel_state.c index 46fb48ffd3..808240c4f4 100644 --- a/source4/auth/gensec/schannel_state.c +++ b/source4/auth/gensec/schannel_state.c @@ -35,7 +35,7 @@ struct ldb_context *schannel_db_connect(TALLOC_CTX *mem_ctx) { char *path; struct ldb_context *ldb; - BOOL existed; + bool existed; const char *init_ldif = "dn: @ATTRIBUTES\n" \ "computerName: CASE_INSENSITIVE\n" \ diff --git a/source4/auth/gensec/socket.c b/source4/auth/gensec/socket.c index 9bd97109fb..4dc05e8cc4 100644 --- a/source4/auth/gensec/socket.c +++ b/source4/auth/gensec/socket.c @@ -34,13 +34,13 @@ struct gensec_socket { struct packet_context *packet; DATA_BLOB read_buffer; /* SASL packets are turned into liniarlised data here, for reading */ size_t orig_send_len; - BOOL eof; + bool eof; NTSTATUS error; - BOOL interrupted; + bool interrupted; void (*recv_handler)(void *, uint16_t); void *recv_private; int in_extra_read; - BOOL wrap; /* Should we be wrapping on this socket at all? */ + bool wrap; /* Should we be wrapping on this socket at all? */ }; static NTSTATUS gensec_socket_init_fn(struct socket_context *sock) @@ -190,7 +190,7 @@ static void gensec_socket_error_handler(void *private, NTSTATUS status) { struct gensec_socket *gensec_socket = talloc_get_type(private, struct gensec_socket); if (NT_STATUS_EQUAL(status, NT_STATUS_END_OF_FILE)) { - gensec_socket->eof = True; + gensec_socket->eof = true; } else { gensec_socket->error = status; } @@ -331,7 +331,7 @@ static NTSTATUS gensec_socket_unwrap(void *private, DATA_BLOB blob) static void send_callback(void *private) { struct gensec_socket *gensec_socket = talloc_get_type(private, struct gensec_socket); - gensec_socket->interrupted = False; + gensec_socket->interrupted = false; } /* @@ -384,7 +384,7 @@ static NTSTATUS gensec_socket_send(struct socket_context *sock, return nt_status; } - gensec_socket->interrupted = True; + gensec_socket->interrupted = true; gensec_socket->error = NT_STATUS_OK; nt_status = packet_send_callback(gensec_socket->packet, @@ -446,17 +446,17 @@ NTSTATUS gensec_socket_init(struct gensec_security *gensec_security, if (!gensec_have_feature(gensec_security, GENSEC_FEATURE_SEAL) && !gensec_have_feature(gensec_security, GENSEC_FEATURE_SIGN)) { - gensec_socket->wrap = False; + gensec_socket->wrap = false; *new_socket = new_sock; return NT_STATUS_OK; } gensec_socket->gensec_security = gensec_security; - gensec_socket->wrap = True; - gensec_socket->eof = False; + gensec_socket->wrap = true; + gensec_socket->eof = false; gensec_socket->error = NT_STATUS_OK; - gensec_socket->interrupted = False; + gensec_socket->interrupted = false; gensec_socket->in_extra_read = 0; gensec_socket->read_buffer = data_blob(NULL, 0); diff --git a/source4/auth/gensec/spnego.c b/source4/auth/gensec/spnego.c index 009d95a3d2..5c1c15935f 100644 --- a/source4/auth/gensec/spnego.c +++ b/source4/auth/gensec/spnego.c @@ -41,7 +41,7 @@ struct spnego_state { enum spnego_message_type expected_packet; enum spnego_state_position state_position; struct gensec_security *sub_sec_security; - BOOL no_response_expected; + bool no_response_expected; const char *neg_oid; }; @@ -59,7 +59,7 @@ static NTSTATUS gensec_spnego_client_start(struct gensec_security *gensec_securi spnego_state->expected_packet = SPNEGO_NEG_TOKEN_INIT; spnego_state->state_position = SPNEGO_CLIENT_START; spnego_state->sub_sec_security = NULL; - spnego_state->no_response_expected = False; + spnego_state->no_response_expected = false; gensec_security->private_data = spnego_state; return NT_STATUS_OK; @@ -77,7 +77,7 @@ static NTSTATUS gensec_spnego_server_start(struct gensec_security *gensec_securi spnego_state->expected_packet = SPNEGO_NEG_TOKEN_INIT; spnego_state->state_position = SPNEGO_SERVER_START; spnego_state->sub_sec_security = NULL; - spnego_state->no_response_expected = False; + spnego_state->no_response_expected = false; gensec_security->private_data = spnego_state; return NT_STATUS_OK; @@ -329,16 +329,16 @@ static NTSTATUS gensec_spnego_server_try_fallback(struct gensec_security *gensec struct gensec_security_ops **all_ops = gensec_security_mechs(gensec_security, out_mem_ctx); for (i=0; all_ops[i]; i++) { - BOOL is_spnego; + bool is_spnego; NTSTATUS nt_status; if (!all_ops[i]->oid) { continue; } - is_spnego = False; + is_spnego = false; for (j=0; all_ops[i]->oid[j]; j++) { if (strcasecmp(GENSEC_OID_SPNEGO,all_ops[i]->oid[j]) == 0) { - is_spnego = True; + is_spnego = true; } } if (is_spnego) { @@ -622,7 +622,7 @@ static NTSTATUS gensec_spnego_create_negTokenInit(struct gensec_security *gensec spnego_state->neg_oid = all_sec[i].oid; if (NT_STATUS_IS_OK(nt_status)) { - spnego_state->no_response_expected = True; + spnego_state->no_response_expected = true; } return NT_STATUS_MORE_PROCESSING_REQUIRED; @@ -820,7 +820,7 @@ static NTSTATUS gensec_spnego_update(struct gensec_security *gensec_security, TA spnego_state->state_position = SPNEGO_CLIENT_TARG; if (NT_STATUS_IS_OK(nt_status)) { - spnego_state->no_response_expected = True; + spnego_state->no_response_expected = true; } spnego_free_data(&spnego); @@ -947,7 +947,7 @@ static NTSTATUS gensec_spnego_update(struct gensec_security *gensec_security, TA &unwrapped_out); if (NT_STATUS_IS_OK(nt_status)) { - spnego_state->no_response_expected = True; + spnego_state->no_response_expected = true; } } @@ -999,12 +999,12 @@ static NTSTATUS gensec_spnego_update(struct gensec_security *gensec_security, TA return NT_STATUS_INVALID_PARAMETER; } -static BOOL gensec_spnego_have_feature(struct gensec_security *gensec_security, +static bool gensec_spnego_have_feature(struct gensec_security *gensec_security, uint32_t feature) { struct spnego_state *spnego_state = (struct spnego_state *)gensec_security->private_data; if (!spnego_state->sub_sec_security) { - return False; + return false; } return gensec_have_feature(spnego_state->sub_sec_security, @@ -1039,7 +1039,7 @@ static const struct gensec_security_ops gensec_spnego_security_ops = { .session_key = gensec_spnego_session_key, .session_info = gensec_spnego_session_info, .have_feature = gensec_spnego_have_feature, - .enabled = True, + .enabled = true, .priority = GENSEC_SPNEGO }; diff --git a/source4/auth/gensec/spnego_parse.c b/source4/auth/gensec/spnego_parse.c index bb674a7aad..37f4f12278 100644 --- a/source4/auth/gensec/spnego_parse.c +++ b/source4/auth/gensec/spnego_parse.c @@ -25,7 +25,7 @@ #include "auth/gensec/gensec.h" #include "libcli/util/asn_1.h" -static BOOL read_negTokenInit(struct asn1_data *asn1, TALLOC_CTX *mem_ctx, +static bool read_negTokenInit(struct asn1_data *asn1, TALLOC_CTX *mem_ctx, struct spnego_negTokenInit *token) { ZERO_STRUCTP(token); @@ -37,7 +37,7 @@ static BOOL read_negTokenInit(struct asn1_data *asn1, TALLOC_CTX *mem_ctx, int i; uint8_t context; if (!asn1_peek_uint8(asn1, &context)) { - asn1->has_error = True; + asn1->has_error = true; break; } @@ -79,7 +79,7 @@ static BOOL read_negTokenInit(struct asn1_data *asn1, TALLOC_CTX *mem_ctx, uint8_t type_peek; asn1_start_tag(asn1, ASN1_CONTEXT(3)); if (!asn1_peek_uint8(asn1, &type_peek)) { - asn1->has_error = True; + asn1->has_error = true; break; } if (type_peek == ASN1_OCTET_STRING) { @@ -101,7 +101,7 @@ static BOOL read_negTokenInit(struct asn1_data *asn1, TALLOC_CTX *mem_ctx, break; } default: - asn1->has_error = True; + asn1->has_error = true; break; } } @@ -112,7 +112,7 @@ static BOOL read_negTokenInit(struct asn1_data *asn1, TALLOC_CTX *mem_ctx, return !asn1->has_error; } -static BOOL write_negTokenInit(struct asn1_data *asn1, struct spnego_negTokenInit *token) +static bool write_negTokenInit(struct asn1_data *asn1, struct spnego_negTokenInit *token) { asn1_push_tag(asn1, ASN1_CONTEXT(0)); asn1_push_tag(asn1, ASN1_SEQUENCE(0)); @@ -175,7 +175,7 @@ static BOOL write_negTokenInit(struct asn1_data *asn1, struct spnego_negTokenIni return !asn1->has_error; } -static BOOL read_negTokenTarg(struct asn1_data *asn1, TALLOC_CTX *mem_ctx, +static bool read_negTokenTarg(struct asn1_data *asn1, TALLOC_CTX *mem_ctx, struct spnego_negTokenTarg *token) { ZERO_STRUCTP(token); @@ -186,7 +186,7 @@ static BOOL read_negTokenTarg(struct asn1_data *asn1, TALLOC_CTX *mem_ctx, while (!asn1->has_error && 0 < asn1_tag_remaining(asn1)) { uint8_t context; if (!asn1_peek_uint8(asn1, &context)) { - asn1->has_error = True; + asn1->has_error = true; break; } @@ -214,7 +214,7 @@ static BOOL read_negTokenTarg(struct asn1_data *asn1, TALLOC_CTX *mem_ctx, asn1_end_tag(asn1); break; default: - asn1->has_error = True; + asn1->has_error = true; break; } } @@ -225,7 +225,7 @@ static BOOL read_negTokenTarg(struct asn1_data *asn1, TALLOC_CTX *mem_ctx, return !asn1->has_error; } -static BOOL write_negTokenTarg(struct asn1_data *asn1, struct spnego_negTokenTarg *token) +static bool write_negTokenTarg(struct asn1_data *asn1, struct spnego_negTokenTarg *token) { asn1_push_tag(asn1, ASN1_CONTEXT(1)); asn1_push_tag(asn1, ASN1_SEQUENCE(0)); @@ -282,7 +282,7 @@ ssize_t spnego_read_data(TALLOC_CTX *mem_ctx, DATA_BLOB data, struct spnego_data asn1_load(asn1, data); if (!asn1_peek_uint8(asn1, &context)) { - asn1->has_error = True; + asn1->has_error = true; } else { switch (context) { case ASN1_APPLICATION(0): @@ -299,7 +299,7 @@ ssize_t spnego_read_data(TALLOC_CTX *mem_ctx, DATA_BLOB data, struct spnego_data } break; default: - asn1->has_error = True; + asn1->has_error = true; break; } } @@ -330,7 +330,7 @@ ssize_t spnego_write_data(TALLOC_CTX *mem_ctx, DATA_BLOB *blob, struct spnego_da write_negTokenTarg(asn1, &spnego->negTokenTarg); break; default: - asn1->has_error = True; + asn1->has_error = true; break; } @@ -343,9 +343,9 @@ ssize_t spnego_write_data(TALLOC_CTX *mem_ctx, DATA_BLOB *blob, struct spnego_da return ret; } -BOOL spnego_free_data(struct spnego_data *spnego) +bool spnego_free_data(struct spnego_data *spnego) { - BOOL ret = True; + bool ret = true; if (!spnego) goto out; @@ -366,7 +366,7 @@ BOOL spnego_free_data(struct spnego_data *spnego) data_blob_free(&spnego->negTokenTarg.mechListMIC); break; default: - ret = False; + ret = false; break; } ZERO_STRUCTP(spnego); -- cgit