plaintext, password_state);
if (NT_STATUS_IS_OK(result)) {
/* We have tried mapping */
- (*user_info)->mapped_state = True;
+ (*user_info)->mapped_state = true;
/* did we actually map the user to a different name? */
(*user_info)->was_mapped = was_mapped;
}
if (NT_STATUS_IS_OK(status)) {
(*user_info)->logon_parameters = logon_parameters;
}
- ret = NT_STATUS_IS_OK(status) ? True : False;
+ ret = NT_STATUS_IS_OK(status) ? true : False;
data_blob_free(&lm_blob);
data_blob_free(&nt_blob);
(*user_info)->logon_parameters = logon_parameters;
}
- ret = NT_STATUS_IS_OK(nt_status) ? True : False;
+ ret = NT_STATUS_IS_OK(nt_status) ? true : False;
data_blob_free(&local_lm_blob);
data_blob_free(&local_nt_blob);
return ret;
}
data_blob_free(&local_lm_blob);
- return NT_STATUS_IS_OK(ret) ? True : False;
+ return NT_STATUS_IS_OK(ret) ? true : False;
}
/****************************************************************************
NULL,
AUTH_PASSWORD_RESPONSE);
- return NT_STATUS_IS_OK(nt_status) ? True : False;
+ return NT_STATUS_IS_OK(nt_status) ? true : False;
}
static NTSTATUS log_nt_token(struct security_token *token)
goto done;
}
- (*server_info)->guest = True;
+ (*server_info)->guest = true;
/* This should not be done here (we should produce a server
* info, and later construct a session info from it), but for
bool init_guest_info(void)
{
if (guest_info != NULL)
- return True;
+ return true;
return NT_STATUS_IS_OK(make_new_session_info_guest(&guest_info, &guest_server_info));
}
dst->ut.ngroups = src->ut.ngroups;
dst->ut.groups = groups;
dst->nt_user_token = nt_token;
- return True;
+ return true;
}
/***************************************************************************
return NT_STATUS_NO_MEMORY;
}
- passwd = smb_getpwnam(mem_ctx, dom_user, &real_username, True );
+ passwd = smb_getpwnam(mem_ctx, dom_user, &real_username, true );
if (!passwd) {
DEBUG(3, ("Failed to find authenticated user %s via "
"getpwnam(), denying access.\n", dom_user));
ret = pdb_get_trusteddom_pw(dom_name, NULL, NULL, NULL);
unbecome_root();
if (ret)
- return True;
+ return true;
}
else {
wbcErr result;
result = wb_is_trusted_domain(dom_name);
if (result == WBC_ERR_SUCCESS) {
- return True;
+ return true;
}
if (result == WBC_ERR_DOMAIN_NOT_FOUND) {
* domains (like a domain member would use */
if ( trustdom_cache_fetch(dom_name, &trustdom_sid) ) {
- return True;
+ return true;
}
return False;