From b3393247a20ff227bf64c02d8d31c8c3375d9ed9 Mon Sep 17 00:00:00 2001 From: Stefan Metzmacher Date: Mon, 8 Oct 2007 14:18:19 +0000 Subject: r25576: BOOL -> bool metze (This used to be commit 9fd96e1989e348f87355ed120786399493a9e447) --- source4/auth/auth_server.c | 14 +++++++------- source4/auth/auth_unix.c | 2 +- 2 files changed, 8 insertions(+), 8 deletions(-) (limited to 'source4/auth') diff --git a/source4/auth/auth_server.c b/source4/auth/auth_server.c index 1513228bd9..abc052c9ea 100644 --- a/source4/auth/auth_server.c +++ b/source4/auth/auth_server.c @@ -31,13 +31,13 @@ static struct smbcli_state *server_cryptkey(TALLOC_CTX *mem_ctx) struct ipv4_addr dest_ip; const char *p; char *pserver; - BOOL connected_ok = False; + bool connected_ok = false; if (!(cli = smbcli_initialise(cli))) return NULL; /* security = server just can't function with spnego */ - cli->use_spnego = False; + cli->use_spnego = false; pserver = talloc_strdup(mem_ctx, lp_passwordserver()); p = pserver; @@ -66,7 +66,7 @@ static struct smbcli_state *server_cryptkey(TALLOC_CTX *mem_ctx) if (smbcli_connect(cli, desthost, &dest_ip)) { DEBUG(3,("connected to password server %s\n",desthost)); - connected_ok = True; + connected_ok = true; break; } } @@ -198,7 +198,7 @@ static NTSTATUS check_smbserver_security(const struct auth_context *auth_context static bool tested_password_server = false; static bool bad_password_server = false; NTSTATUS nt_status = NT_STATUS_LOGON_FAILURE; - BOOL locally_made_cli = False; + bool locally_made_cli = false; /* * Check that the requested domain is not our own machine name. @@ -216,7 +216,7 @@ static NTSTATUS check_smbserver_security(const struct auth_context *auth_context if (cli) { } else { cli = server_cryptkey(mem_ctx); - locally_made_cli = True; + locally_made_cli = true; } if (!cli || !cli->initialised) { @@ -273,7 +273,7 @@ static NTSTATUS check_smbserver_security(const struct auth_context *auth_context * We connected to the password server so we * can say we've tested it. */ - tested_password_server = True; + tested_password_server = true; if ((SVAL(cli->inbuf,smb_vwv2) & 1) == 0) { DEBUG(0,("server_validate: password server %s allows users as non-guest \ @@ -285,7 +285,7 @@ use this machine as the password server.\n")); /* * Password server has the bug. */ - bad_password_server = True; + bad_password_server = true; return NT_STATUS_LOGON_FAILURE; } smbcli_ulogoff(cli); diff --git a/source4/auth/auth_unix.c b/source4/auth/auth_unix.c index b5abaa2980..8b4e23a2c4 100644 --- a/source4/auth/auth_unix.c +++ b/source4/auth/auth_unix.c @@ -499,7 +499,7 @@ core of password checking routine static NTSTATUS password_check(const char *username, const char *password, const char *crypted, const char *salt) { - BOOL ret; + bool ret; #ifdef WITH_AFS if (afs_auth(username, password)) -- cgit