struct policy_handle *hnd, void *data_ptr)
{
struct dcesrv_handle *rpc_hnd;
- static uint32 pol_hnd_low = 0;
- static uint32 pol_hnd_high = 0;
+ static uint32_t pol_hnd_low = 0;
+ static uint32_t pol_hnd_high = 0;
time_t t = time(NULL);
if (p->pipe_handles->count > MAX_OPEN_POLS) {
for (h = p->pipe_handles->handles; h != NULL; h = h->next) {
if (memcmp(&h->wire_handle, hnd, sizeof(*hnd)) == 0) {
DEBUG(6,("Found policy hnd[%u] ", count));
- dump_data(6, (const uint8 *)hnd, sizeof(*hnd));
+ dump_data(6, (const uint8_t *)hnd, sizeof(*hnd));
if (data_p) {
*data_p = h->data;
}
NTSTATUS access_check_object( struct security_descriptor *psd, struct security_token *token,
enum sec_privilege needed_priv_1, enum sec_privilege needed_priv_2,
- uint32 rights_mask,
- uint32 des_access, uint32 *acc_granted,
+ uint32_t rights_mask,
+ uint32_t des_access, uint32 *acc_granted,
const char *debug )
{
NTSTATUS status = NT_STATUS_ACCESS_DENIED;
- uint32 saved_mask = 0;
+ uint32_t saved_mask = 0;
bool priv_granted = false;
bool is_system = false;
bool is_root = false;
NTSTATUS access_check_object( struct security_descriptor *psd, struct security_token *token,
enum sec_privilege needed_priv_1, enum sec_privilege needed_priv_2,
- uint32 rights_mask,
- uint32 des_access, uint32 *acc_granted,
+ uint32_t rights_mask,
+ uint32_t des_access, uint32 *acc_granted,
const char *debug );
void map_max_allowed_access(const struct security_token *nt_token,
const struct security_unix_token *unix_token,
struct ncacn_packet *pkt)
{
struct dcerpc_auth auth_info = {0};
- uint16 assoc_gid;
+ uint16_t assoc_gid;
unsigned int auth_type = DCERPC_AUTH_TYPE_NONE;
NTSTATUS status;
struct ndr_syntax_id id;
struct ncacn_packet *pkt)
{
struct dcerpc_auth auth_info = {0};
- uint16 assoc_gid;
+ uint16_t assoc_gid;
NTSTATUS status;
union dcerpc_payload u;
struct dcerpc_ack_ctx bind_ack_ctx;