*/
void gensec_want_feature(struct gensec_security *gensec_security,
- uint32 feature)
+ uint32_t feature)
{
gensec_security->want_features |= feature;
}
*/
BOOL gensec_have_feature(struct gensec_security *gensec_security,
- uint32 feature)
+ uint32_t feature)
{
if (!gensec_security->ops->have_feature) {
return False;
struct gensec_security_ops {
const char *name;
const char *sasl_name;
- uint8 auth_type; /* 0 if not offered on DCE-RPC */
+ uint8_t auth_type; /* 0 if not offered on DCE-RPC */
const char *oid; /* NULL if not offered by SPENGO */
NTSTATUS (*client_start)(struct gensec_security *gensec_security);
NTSTATUS (*server_start)(struct gensec_security *gensec_security);
NTSTATUS (*session_info)(struct gensec_security *gensec_security,
struct auth_session_info **session_info);
BOOL (*have_feature)(struct gensec_security *gensec_security,
- uint32 feature);
+ uint32_t feature);
BOOL enabled;
};
struct gensec_target target;
enum gensec_role gensec_role;
BOOL subcontext;
- uint32 want_features;
+ uint32_t want_features;
};
/* this structure is used by backends to determine the size of some critical types */
/*
generate a krb5 GSS-API wrapper packet given a ticket
*/
-DATA_BLOB gensec_gssapi_gen_krb5_wrap(TALLOC_CTX *mem_ctx, const DATA_BLOB *ticket, const uint8 tok_id[2])
+DATA_BLOB gensec_gssapi_gen_krb5_wrap(TALLOC_CTX *mem_ctx, const DATA_BLOB *ticket, const uint8_t tok_id[2])
{
struct asn1_data data;
DATA_BLOB ret = data_blob(NULL,0);
/*
parse a krb5 GSS-API wrapper packet giving a ticket
*/
-BOOL gensec_gssapi_parse_krb5_wrap(TALLOC_CTX *mem_ctx, const DATA_BLOB *blob, DATA_BLOB *ticket, uint8 tok_id[2])
+BOOL gensec_gssapi_parse_krb5_wrap(TALLOC_CTX *mem_ctx, const DATA_BLOB *blob, DATA_BLOB *ticket, uint8_t tok_id[2])
{
BOOL ret;
struct asn1_data data;
};
struct spnego_negTokenTarg {
- uint8 negResult;
+ uint8_t negResult;
const char *supportedMech;
DATA_BLOB responseToken;
DATA_BLOB mechListMIC;